{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:23:07Z","timestamp":1772644987581,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cibim.2013.6607909","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:38:24Z","timestamp":1380652704000},"page":"22-30","source":"Crossref","is-referenced-by-count":36,"title":["Contactless fingerprint recognition: A neural approach for perspective and rotation effects reduction"],"prefix":"10.1109","author":[{"given":"Ruggero Donida","family":"Labati","sequence":"first","affiliation":[]},{"given":"Angelo","family":"Genovese","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Scotti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Illumination scheme for high-contrast, contactless fingerprint images","volume":"7429","author":"wang","year":"2009","journal-title":"SPIE"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2011.5975739"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2004.1439111"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2062177"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1117\/2.1200912.002552"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2012.6252519"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1117\/12.828555"},{"key":"11","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/11608288_33","article-title":"The surround imagertm: A multi-camera touchless device to acquire 3d rolled-equivalent fingerprints","volume":"3832","author":"parziale","year":"2005","journal-title":"Advances in Biometrics Ser Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/BIOMS.2011.6053684"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.83"},{"key":"20","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/11815921_39","article-title":"A study of touchless fingerprint recognition system","volume":"4109","author":"lee","year":"2006","journal-title":"Structural Syntactic and Statistical Pattern Recognition Ser Lecture Notes in Computer Science"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2038758"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.036"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/34.709565"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2009.12.003"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/83.841531"},{"key":"27","article-title":"A neural-based minutiae pair identification method for touchless fingeprint images","author":"donida labati","year":"2011","journal-title":"Proc IEEE Workshop on Computational Intelligence in Biometrics and Identity Management"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7392","author":"watson","year":"2007","journal-title":"User's Guide to NIST Biometric Image Software (NBIS)"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2010.5596694"},{"key":"3","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1007\/978-1-4419-5906-5_740","article-title":"Fingerprint","author":"donida labati","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-921-7_2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-385-3_4"},{"key":"30","author":"gonzalez","year":"2006","journal-title":"Digital Image Processing"},{"key":"7","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/CGIV.2006.27","article-title":"Automatic digital camera based fingerprint image preprocessing","author":"hiew","year":"2006","journal-title":"Proc Int Conf on Computer Graphics Imaging and Visualisation"},{"key":"6","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/11608288_47","article-title":"Preprocessing of a fingerprint image captured with a mobile camera","volume":"3832","author":"lee","year":"2005","journal-title":"Advances in Biometrics Ser Lecture Notes in Computer Science"},{"key":"5","first-page":"136","volume":"94","author":"derawi","year":"2011","journal-title":"Fingerprint Recognition with Embedded Cameras on Mobile Phone"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699379"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2006.345189"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICTMICC.2007.4448572"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","location":"Singapore, Singapore","start":{"date-parts":[[2013,4,16]]},"end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595340\/6607904\/06607909.pdf?arnumber=6607909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T04:19:04Z","timestamp":1596601144000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6607909\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cibim.2013.6607909","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}