{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:56:39Z","timestamp":1729673799904,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/cisda.2012.6291539","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T19:58:22Z","timestamp":1347047902000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating replay attacks using Darwinian-based Feature Extraction"],"prefix":"10.1109","author":[{"given":"Joseph","family":"Shelton","sequence":"first","affiliation":[]},{"given":"Joshua","family":"Adams","sequence":"additional","affiliation":[]},{"given":"Aniesha","family":"Alford","sequence":"additional","affiliation":[]},{"given":"Melissa","family":"Venable","sequence":"additional","affiliation":[]},{"given":"Sabra","family":"Neal","sequence":"additional","affiliation":[]},{"given":"Gerry","family":"Dozier","sequence":"additional","affiliation":[]},{"given":"Kelvin","family":"Bryant","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2011.5949211"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903538"},{"key":"17","article-title":"GEFeWS: A Hybrid Genetic-Based Feature Weighting and Selection Algorithm for Multi- BiometricRecognition","author":"alford","year":"0","journal-title":"Proceedings of the 2011 Midwest Artificial Intelligence and Cognitive Science Conference (MAICS) April 16-17 Cincinnati OH 2011"},{"key":"36","first-page":"572","article-title":"Cracking Cancelable Fingerprint Template of Ratha","volume":"2","author":"feng","year":"2008","journal-title":"International Symposium on Computer Science and Computational Technology (ISCSCT'08)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SECon.2012.6197061"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECon.2012.6197069"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/FGR.2006.78"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.59"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.10.025"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"11","first-page":"1221","article-title":"Multimodal Biometrics: An overview","author":"ross","year":"2004","journal-title":"Proceedings of 12th European Signal Processing Conference"},{"key":"12","article-title":"Cancellable Biometrics: Problems and Solutions for Improving Accuracy","author":"nanni","year":"2010","journal-title":"Biometrics Methods Applications and Analyses"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.A0820460"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2007.380619"},{"key":"22","first-page":"315","article-title":"Facial feature extraction in frontal views using biometric analogies","volume":"1","author":"tsekeridou","year":"1998","journal-title":"Proc of the IX European Signal Processing Conference"},{"key":"23","article-title":"Face Recognition Using Particle Swarm Optimization-Based Selected Features","volume":"2","author":"ramadan","year":"2009","journal-title":"International Journal of Signal Processing Image Processing and Pattern Recognition"},{"key":"24","article-title":"Comparison of Genetic-based Feature Extraction Methods for Facial Recognition","author":"shelton","year":"0","journal-title":"Proceedings of the 2011 Midwest Artificial Intelligence and Cognitive Science Conference (MAICS-2011) April 16-17 Cincinnati 2011"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/2016039.2016094"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.244"},{"key":"28","first-page":"971","article-title":"Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns","author":"pietikainen","year":"2002","journal-title":"IEEE Trans Pattern Analysis and Machine Intelligence"},{"key":"29","first-page":"301","article-title":"An analysis of multipoint crossover","author":"spears","year":"1991","journal-title":"Proc 1990 Workshop Foundations of Genetic Algorithms"},{"key":"3","article-title":"Pixel Consistency, K-Tournament Selection, and Darwinian-Based Feature Extraction","author":"shelton","year":"0","journal-title":"Proceedings of the Midwest Artificial Intelligence and Cognitive Science Conference 2012"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6253011"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596787"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.01.072"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1996.4.2.113"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227981"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1539-5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"31","article-title":"Genetic and Evolutionary Feature Extraction via X-TOOLSS","author":"shelton","year":"0","journal-title":"The 8th Annual International Conference on Genetic and Evolutionary Methods (GEM) 2011"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISDPE.2010.15"},{"key":"9","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-48157-5_22","article-title":"Token-Based Acces to Digital Information","author":"holmquist","year":"1999","journal-title":"Proc 1st Int l Symp Handheld and Ubiquitous Computing (HUC 99)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"}],"event":{"name":"2012 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2012,7,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,7,13]]}},"container-title":["2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6279634\/6291498\/06291539.pdf?arnumber=6291539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:54:34Z","timestamp":1498002874000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6291539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/cisda.2012.6291539","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}