{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:54:07Z","timestamp":1730213647444,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927942","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication Strategies"],"prefix":"10.1109","author":[{"given":"Pratibha","family":"Singh","sequence":"first","affiliation":[{"name":"Concordia University of Edmonton,Alberta,Canada"}]},{"given":"Hamman","family":"Samuel","sequence":"additional","affiliation":[{"name":"Concordia University of Edmonton,Alberta,Canada"}]},{"given":"Fehmi","family":"Jaafar","sequence":"additional","affiliation":[{"name":"Quebec Uinversity at Chicoutimi,Quebec,Canada"}]},{"given":"Darine","family":"Ameyed","sequence":"additional","affiliation":[{"name":"Ecole de Technologie Superieure,Quebec,Canada"}]}],"member":"263","reference":[{"key":"ref10","first-page":"19","article-title":"Optimal finger combinations in multi-finger biometric systems","author":"michels","year":"2010","journal-title":"Proceedings of the 11th Annual Information Security Symposium"},{"key":"ref11","article-title":"Evaluation and combination of biometric authentication systems","author":"hitchcock","year":"2003","journal-title":"Ph D diss"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383385"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EmergiTech.2016.7737333"},{"key":"ref14","article-title":"Fingerprint Recognition Using Minutiae Matching","author":"muhammad hanis","year":"2014","journal-title":"Diss UTeM"},{"year":"0","key":"ref15","article-title":"Biometrics Ideal Test"},{"key":"ref16","article-title":"A survey of biometric recognition methods","author":"delac","year":"2004","journal-title":"Proceedings Elmar-2004 46th International Symposium on Electronics in Marine ELMAR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_45"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.57"},{"key":"ref19","article-title":"A survey of biometric gait recognition: Approaches, security and challenges","author":"gafurov","year":"2007","journal-title":"Annual Norwegian Computer Science Conference"},{"key":"ref4","first-page":"295","article-title":"Fingerprint-Based Gender Identification using frequency domain analysis","volume":"3","author":"kaur","year":"2012","journal-title":"International Journal of Advances in Engineering & Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996261"},{"journal-title":"Cstimeclocks","article-title":"FMR \/ FAR \/ FRR Settings","year":"2017","key":"ref6"},{"journal-title":"Fingerprint image quality","year":"2009","author":"tabassi","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00103-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854246"},{"key":"ref2","article-title":"Biometric authentication system","author":"peirce","year":"2009","journal-title":"U S Patent"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref9","first-page":"1","article-title":"Fusion of Iris & Fingerprint Biometric for Security Purpose","volume":"3","author":"lahane","year":"2012","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.906204"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2013.253721"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2022,9,12]]},"location":"Falerna, Italy","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09927942.pdf?arnumber=9927942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:44Z","timestamp":1674504764000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927942","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}