{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:14:38Z","timestamp":1763640878942,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/icpr.2004.1334413","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T16:27:50Z","timestamp":1099931270000},"page":"935-942 Vol.2","source":"Crossref","is-referenced-by-count":167,"title":["Biometrics: a grand challenge"],"prefix":"10.1109","author":[{"given":"A.K.","family":"Jain","sequence":"first","affiliation":[]},{"given":"S.","family":"Pankanti","sequence":"additional","affiliation":[]},{"given":"S.","family":"Prabhakar","sequence":"additional","affiliation":[]},{"family":"Lin Hong","sequence":"additional","affiliation":[]},{"given":"A.","family":"Ross","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"FVC2000 Fingerprint Verification Competition","year":"0","key":"19"},{"journal-title":"Guide to Biometrics","year":"2003","author":"bolle","key":"17"},{"journal-title":"Alphonse Bertillon Father of Scientific Detection","year":"1956","author":"rhodes","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2003.1217896"},{"journal-title":"Biometrics Personal Identification in Networked Society","year":"1998","author":"jain","key":"16"},{"key":"13","article-title":"Can facial recognition help snag terrorists?","author":"lee","year":"2001","journal-title":"The Wall Street Journal"},{"journal-title":"NYC Visit Homepage","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0348-5737-6"},{"journal-title":"FRVT 2002 Evaluation Report","year":"2003","author":"phillips","key":"12"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25948-0_99","article-title":"Soft biometrie traits for personal recognition systems","author":"jain","year":"2004","journal-title":"Proc Int Conf Biometric Authentication"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/962081.962102"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.12.021"},{"key":"24","article-title":"Future speaker recognition systems: Challenges and solutions","author":"chaudhari","year":"2002","journal-title":"Proceedings of AUTOID-2002"},{"journal-title":"Streamlined Airport Services Take Flight - Case Study","year":"0","key":"25"},{"journal-title":"Airport Tests Passenger Eye IDs","year":"0","key":"26"},{"key":"27","article-title":"Technical testing and evaluation of biometric identification devices","author":"wayman","year":"1998","journal-title":"Biometrics Personal Identification in Networked Society"},{"year":"0","key":"28"},{"journal-title":"NIST Report to the United States Congress","article-title":"Summary of NIST standards for biometric accuracy, tamper resistance, and interoperability","year":"2002","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"2","article-title":"Summary of NIST standards for biometrie accuracy, tamper resistance, and interoperability","author":"mccabe","year":"2002","journal-title":"NIST Report to the US Congress"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1023799"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00038-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(97)00073-1"},{"key":"32","first-page":"788","article-title":"Biometrics systems: Anatomy of performance","volume":"e84 d","author":"jain","year":"2001","journal-title":"IEICE Transactions Fundamentals"},{"journal-title":"Transparent Society Will Technology Force Us to Choose Between Privacy and Freedom?","year":"1998","author":"brin","key":"5"},{"journal-title":"Eyematic Homepage","year":"0","key":"31"},{"journal-title":"BBC News","article-title":"Long lashes thwart ID scan trial","year":"2004","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/99.641608"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"}],"event":{"name":"Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.","start":{"date-parts":[[2004,8,26]]},"location":"Cambridge, UK","end":{"date-parts":[[2004,8,26]]}},"container-title":["Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9258\/29386\/01334413.pdf?arnumber=1334413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T11:37:15Z","timestamp":1497613035000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1334413\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icpr.2004.1334413","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}