{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:01:55Z","timestamp":1729674115569,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/ijcnn.2013.6707024","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T15:08:44Z","timestamp":1389366524000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Using genetic algorithms and ensemble systems in online cancellable signature recognition"],"prefix":"10.1109","author":[{"given":"Fernando","family":"Pintro","sequence":"first","affiliation":[]},{"given":"Anne M P","family":"Canuto","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Fairhurst","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264"},{"journal-title":"Genetic Algorithms in Search Optimization and Machine Learning","year":"1989","author":"goldberg","key":"22"},{"key":"17","first-page":"106","article-title":"Revealing the secret of facehashing","author":"cheung","year":"2006","journal-title":"Internacional Conference on Advances in Biometrics- ICB"},{"journal-title":"Multi-Objective Using Evolutionary Algorithms","year":"2001","author":"deb","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.002"},{"key":"24","article-title":"Software tool and acquisition equipment recommendations for the three scenarios considered","author":"garcia","year":"2006","journal-title":"Technical Report Report No D6 2 1"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"16","first-page":"227","article-title":"Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data","author":"pang","year":"2005","journal-title":"Proc Austral Conf on Artificial Intelligence"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.12.002"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2009.5201070"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.57"},{"journal-title":"Adaptation in Natural and Artificial Systems","year":"1975","author":"holland","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.09.001"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00247-3"},{"key":"10","first-page":"497","author":"campisi","year":"2009","journal-title":"On-line signature-based authentication Template security issues and countermeasures"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00240-0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.10.023"},{"key":"6","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3233\/HIS-2011-0135","article-title":"Classifier ensembles and optimization techniques to improve the performance of cancellable fingerprint","volume":"8","author":"canuto","year":"2011","journal-title":"International Journal of Hybrid Intelligent Systems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SBRN.2010.18"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563114"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2007.380619"}],"event":{"name":"2013 International Joint Conference on Neural Networks (IJCNN 2013 - Dallas)","start":{"date-parts":[[2013,8,4]]},"location":"Dallas, TX, USA","end":{"date-parts":[[2013,8,9]]}},"container-title":["The 2013 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6691896\/6706705\/06707024.pdf?arnumber=6707024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T05:19:09Z","timestamp":1565068749000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6707024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2013.6707024","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}