{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:36:34Z","timestamp":1756312594819,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/iisa.2017.8316356","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T16:46:49Z","timestamp":1521132409000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Minutiae and corner detection in fingerprints without image enhancement for real time recognition"],"prefix":"10.1109","author":[{"given":"Rabih","family":"Nachar","sequence":"first","affiliation":[]},{"given":"Elie","family":"Inaty","sequence":"additional","affiliation":[]},{"given":"Patrick J.","family":"Bonnin","sequence":"additional","affiliation":[]},{"given":"Yasser","family":"Alayli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A New Algorithm for Minutiae Extraction and Matching in Fingerprint","author":"nour","year":"2012","journal-title":"Dissertation submitted to the School of Engineering and Design at Brunel University UK in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Electronic & Computer Engineering Uxbridge London"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467814500181"},{"key":"ref12","first-page":"433","article-title":"Image registration based on edge dominant corners","author":"nachar","year":"2014","journal-title":"9th International Conference on Computer Vision Theory and Applications"},{"key":"ref13","first-page":"247","article-title":"Polygonal Approximation of an Object Contour by Detecting Edge Dominant Corners Using Iterative Corner Suppression","author":"nachar","year":"2014","journal-title":"9th International Conference on Computer Vision Theory and Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1316"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/34.709565"},{"key":"ref16","article-title":"Minutiae Extraction from Fingerprint Images - a Review","volume":"8","author":"bansal","year":"2011","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WISES.2007.4408496"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5121\/ijcseit.2012.2301"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0010-4809(71)90034-6"},{"journal-title":"Fingerprint Verification Competition (2000)","year":"2000","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45344-X_26"},{"journal-title":"Fingerprint Verification Competition (2004)","year":"2004","key":"ref6"},{"journal-title":"Fingerprint Verification Competition (2002)","year":"2002","key":"ref5"},{"journal-title":"Fingerprint Verification Competition (2006)","year":"2006","key":"ref8"},{"key":"ref7","article-title":"FVC 2004: Third Fingerprint Verification Competetion","author":"david","year":"2004","journal-title":"Proceedings of the International Conference on Biometric Authentication"},{"journal-title":"Biometrics Personal Identification in Networked Society","year":"1999","author":"jain","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.250596"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1977.1674825"},{"key":"ref21","article-title":"Towards an automatic image co-registration technique using edge dominant corners primitives","volume":"22","author":"nachar","year":"2015","journal-title":"ICAE journal"}],"event":{"name":"2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA)","start":{"date-parts":[[2017,8,27]]},"location":"Larnaca","end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 8th International Conference on Information, Intelligence, Systems &amp; Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8308011\/8316350\/08316356.pdf?arnumber=8316356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T17:07:43Z","timestamp":1523293663000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8316356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iisa.2017.8316356","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}