{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:52:14Z","timestamp":1730271134219,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/isba.2015.7126362","type":"proceedings-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T16:04:45Z","timestamp":1434643485000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Expanding the human-biometric sensor interaction model to identity claim scenarios"],"prefix":"10.1109","author":[{"given":"Stephen J.","family":"Elliott","sequence":"first","affiliation":[]},{"given":"Kevin","family":"O'connor","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Bartlow","sequence":"additional","affiliation":[]},{"given":"Joshua J.","family":"Robertson","sequence":"additional","affiliation":[]},{"given":"Richard M.","family":"Guest","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43616-5_16"},{"key":"ref11","article-title":"Attacks on Biometric Systems: A Case Study in Fingerprints","author":"uludag","year":"2004","journal-title":"SPIE-EI 2004 Seucirty Seganography and Watermarking of Multimedia Contents VI"},{"article-title":"Biometric Authentication for Mobile Banking Seucirty","year":"2014","author":"tiwari","key":"ref12"},{"key":"ref13","first-page":"257","article-title":"An Overview of Biometric Identifiers with Emphasis on the Concepts And Applications of Finger Vein Recognition","volume":"2","author":"samuel","year":"2013","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"ref14","first-page":"22","article-title":"Exploiting Multimodal Biometrics in E-Privacy Scheme for Electronic Health Records","volume":"4","author":"omotosho","year":"2014","journal-title":"Journal of Biology Agriculture and Healthcare"},{"key":"ref15","article-title":"The Challenges of the Enviroment and the Human\/Biometric Device Interaction on Biometric System Performance","author":"elliott","year":"2004","journal-title":"HBDI and Enviroment Proceedings"},{"key":"ref16","article-title":"Understanding the Impact of the Human-Biometric Interaction & System Design on Biometric Image Quality","author":"kukula","year":"2007","journal-title":"NIST Biometric Quality Wortkshop II Fingerprint & Quality Calibration"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73321-8_102"},{"article-title":"Design and Evaluation of the Human-Biometric Sensor Interaction Model","year":"2008","author":"kukula","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2009.024079"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2037878"},{"journal-title":"Advances in Biometric Person Authentication","year":"2004","author":"li","key":"ref3"},{"journal-title":"Biometric Recognition Challenges and Opportunities","year":"2010","author":"pato","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821381"},{"year":"2012","key":"ref8","article-title":"Best Practice Operational Guidelines for Automated Border Control (ABC) Systems"},{"key":"ref7","article-title":"Automated Border Control - State of Play and Latest Developments","author":"nuppeney","year":"2012","journal-title":"NIST IBPC 2014"},{"article-title":"Best Practices in Testing and Reporting Performance of Biometric Devices","year":"2002","author":"mansfield","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-064-8_1"},{"year":"2010","key":"ref9","article-title":"BIOPASS II Automated Biometric Border Crossing Systems based on Electronic passports and facial recognition"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095937"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095938"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2010.5678710"}],"event":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","start":{"date-parts":[[2015,3,23]]},"location":"Hong Kong","end":{"date-parts":[[2015,3,25]]}},"container-title":["IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7118006\/7126341\/07126362.pdf?arnumber=7126362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T17:08:09Z","timestamp":1600276089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7126362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isba.2015.7126362","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}