{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:21:31Z","timestamp":1725470491583},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/isba.2015.7126351","type":"proceedings-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T20:04:45Z","timestamp":1434657885000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Modeling the individuality of iris pattern and the effectiveness of inconsistent bit masking strategy"],"prefix":"10.1109","author":[{"given":"Bin","family":"Li","sequence":"first","affiliation":[]},{"given":"Zifei","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Wangmeng","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Yue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.patcog.2004.02.001"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICIP.2005.1529988"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TPAMI.2002.1023799"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1520\/JFS15447J"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TIFS.2014.2339496"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/LSP.2012.2211589"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIFS.2012.2196515"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/34.244676"},{"key":"ref6","first-page":"961","article-title":"Analysis of partial iris recognition using a 1-d approach","author":"du","year":"2005","journal-title":"Proc Int'l Conf Acoustics Speech and Signal Processing"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TPAMI.2010.227"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TPAMI.2011.89"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TPAMI.2008.185"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICPR.2004.1334411"},{"year":"2008","article-title":"Iris challenge evaluation 2005 workshop presentations","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIP.2009.2033427"}],"event":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","start":{"date-parts":[[2015,3,23]]},"location":"Hong Kong","end":{"date-parts":[[2015,3,25]]}},"container-title":["IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7118006\/7126341\/07126351.pdf?arnumber=7126351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T05:45:27Z","timestamp":1490420727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7126351\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isba.2015.7126351","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}