{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:06:39Z","timestamp":1725462399409},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/fskd.2014.6980975","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T16:43:41Z","timestamp":1419957821000},"page":"995-999","source":"Crossref","is-referenced-by-count":3,"title":["The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication"],"prefix":"10.1109","author":[{"given":"Wencheng","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Song","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"VeriFinger S D K Neuro Technology","year":"2010","author":"veri finger","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2012.6292454"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/BF00977785"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSA.2008.52"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1047865"},{"key":"13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-319-03584-0_7","article-title":"Cancelable fingerprint templates with delaunay triangle-based local structures","author":"yang","year":"2013","journal-title":"Cyberspace Safety and Security"},{"key":"14","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1007\/11527923_68","article-title":"A fingerprint matching algorithm based on radial structure and a structure-rewarding scoring strategy","author":"yu","year":"2005","journal-title":"Audio- and Video-Based Biometric Person Authentication"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2011.5975740"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.23"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_71"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.02.027"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.225"},{"key":"7","first-page":"630","article-title":"Dual layer structure check (dlsc) fingerprint verification scheme designed for biometric mobile template protection","author":"xi","year":"2009","journal-title":"Industrial Electronics and Applications 2009 ICIEA 2009 4th IEEE Conference on"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198785"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2008.4582896"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.04.016"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2010.5707945"}],"event":{"name":"2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2014,8,19]]},"location":"Xiamen, China","end":{"date-parts":[[2014,8,21]]}},"container-title":["2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6962871\/6980796\/06980975.pdf?arnumber=6980975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:52:25Z","timestamp":1498171945000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6980975\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/fskd.2014.6980975","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}