{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:46:23Z","timestamp":1729662383251,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/iceei.2011.6021525","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T16:25:16Z","timestamp":1318436716000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Image correlation analysis for biometric identification"],"prefix":"10.1109","author":[{"family":"Yan Hu","sequence":"first","affiliation":[]},{"family":"Jin Zhang","sequence":"additional","affiliation":[]},{"family":"Wenfeng Hang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"14","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.jss.2006.06.016","article-title":"A novel data hiding scheme for color images using a BSP tree","volume":"80","author":"tsai","year":"2007","journal-title":"Journal of System and Software"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2009.2036259"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/357744.357902"},{"key":"2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-45344-X_32","article-title":"An analysis of minutae matching strength","author":"ratha","year":"2001","journal-title":"Proceeding of Third Internal Conference Audeo- Based Biometric Person Authentication"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/310930.310988"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001411008701"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.08.019"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.003"},{"key":"5","first-page":"5","article-title":"Comparing robustness of watermarking algorithms on biometrics data","author":"vatsa","year":"2004","journal-title":"Proceedings of the Workshop on Biometric Challenges from Theory to Practice-ICPR Workshop"},{"key":"4","first-page":"756","article-title":"Hiding a face in a fingerprint image","volume":"3","author":"jain","year":"2002","journal-title":"Proc Int Conf Pattern Recognition"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.12.004"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.12.004"}],"event":{"name":"2011 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2011,7,17]]},"location":"Bandung, Indonesia","end":{"date-parts":[[2011,7,19]]}},"container-title":["Proceedings of the 2011 International Conference on Electrical Engineering and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6011492\/6021499\/06021525.pdf?arnumber=6021525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T03:50:19Z","timestamp":1497930619000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6021525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iceei.2011.6021525","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}