{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:03:10Z","timestamp":1771038190613,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,4]]},"DOI":"10.1109\/ijcb52358.2021.9484406","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T16:34:10Z","timestamp":1626798850000},"page":"1-8","source":"Crossref","is-referenced-by-count":14,"title":["FDeblur-GAN: Fingerprint Deblurring using Generative Adversarial Network"],"prefix":"10.1109","author":[{"given":"Amol S.","family":"Joshi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ali","family":"Dabouei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeremy","family":"Dawson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nasser M.","family":"Nasrabadi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.629"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1006\/rtim.2001.0283"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206700"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2017.1383535"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIT.2010.5508569"},{"key":"ref16","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00897"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/34.709565"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2011.5773529"},{"key":"ref28","author":"watson","year":"2011","journal-title":"Nist Biometric Image Software"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0965356"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494089"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363951"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107203"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980568"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698580"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00012"},{"key":"ref2","first-page":"471","article-title":"Modified Enhancement Method for Poor Quality Fingerprint Recognition","volume":"6","author":"alhanjouri","year":"2017","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref9","article-title":"Generative Adversarial Networks","author":"goodfellow","year":"2014"},{"key":"ref1","first-page":"975","article-title":"Application of Blind Deblurring Algorithm for Face Biometric","volume":"105","author":"alaoui","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00039-3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.84"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-24574-4_28","article-title":"U-Net: Convolutional Networks for Biomedical Image Segmentation","author":"ronneberger","year":"2015"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(92)90096-2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2015.7126364"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00853"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272727"}],"event":{"name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","location":"Shenzhen, China","start":{"date-parts":[[2021,8,4]]},"end":{"date-parts":[[2021,8,7]]}},"container-title":["2021 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9484326\/9484328\/09484406.pdf?arnumber=9484406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:48:13Z","timestamp":1652183293000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9484406\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ijcb52358.2021.9484406","relation":{},"subject":[],"published":{"date-parts":[[2021,8,4]]}}}