{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T01:11:21Z","timestamp":1773364281473,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ghtc.2014.6970336","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T17:21:59Z","timestamp":1418059319000},"page":"541-547","source":"Crossref","is-referenced-by-count":12,"title":["Development of mobile-based hand vein biometrics for global health patient identification"],"prefix":"10.1109","author":[{"given":"Richard Ribon","family":"Fletcher","sequence":"first","affiliation":[]},{"given":"Varsha","family":"Raghavan","sequence":"additional","affiliation":[]},{"given":"Rujia","family":"Zha","sequence":"additional","affiliation":[]},{"given":"Miriam","family":"Haverkamp","sequence":"additional","affiliation":[]},{"given":"Patricia L.","family":"Hibberd","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11552499_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi:20070009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/1523-1747.ep12479191"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.01.018"},{"key":"ref15","first-page":"87201","article-title":"Personal authentication through dorsal hand vein patterns","volume":"8","author":"chih-bin","year":"2011","journal-title":"Optical Engineering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.01.020"},{"key":"ref17","first-page":"959","article-title":"Image representation using 2D Gabor wavelets","volume":"10","author":"lee","year":"1996","journal-title":"Pattern Analysis and Machine Intelligence IEEE Transactions on"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.12.015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref28","first-page":"1520","article-title":"A novel biometric system based on palm vein image","volume":"12","author":"jen-chun","year":"2012","journal-title":"Pattern Recognition Letters"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2002.1134388"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1994.576361"},{"key":"ref3","article-title":"Biometric authentication by hand vein patterns","volume":"1","author":"tanaka","year":"2004","journal-title":"SICE 2004 Annual Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"ref5","year":"0","journal-title":"Biometric Specifications for Personal Identity Verification NIST Special Publication 800-76-2"},{"key":"ref8","year":"0"},{"key":"ref7","year":"0"},{"key":"ref2","year":"0","journal-title":"Unique Identification Authority of India"},{"key":"ref9","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2005.1626888"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1016\/j.proeng.2012.06.149","article-title":"Enhancement of vein patterns in hand image for biometric and biomedical application using various image enhancement techniques","volume":"38","author":"deepak","year":"2012","journal-title":"Procedia Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIG.2007.97"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0013"},{"key":"ref23","article-title":"A threshold selection method from gray level histograms","volume":"smc 9","author":"otsu","year":"1979","journal-title":"IEEE Trans on Systems Man and Cybernetics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.06.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.1261097"}],"event":{"name":"2014 IEEE Global Humanitarian Technology Conference (GHTC)","location":"San Jose, CA","start":{"date-parts":[[2014,10,10]]},"end":{"date-parts":[[2014,10,13]]}},"container-title":["IEEE Global Humanitarian Technology Conference (GHTC 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6958780\/6970242\/06970336.pdf?arnumber=6970336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T21:44:24Z","timestamp":1498167864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6970336\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ghtc.2014.6970336","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}