{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:52:23Z","timestamp":1730271143075,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/isba.2017.7947706","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:35:15Z","timestamp":1497551715000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Finger knuckle image based personal authentication using DeepMatching"],"prefix":"10.1109","author":[{"given":"Gaurav","family":"Jaswal","sequence":"first","affiliation":[]},{"given":"Aditya","family":"Nigam","sequence":"additional","affiliation":[]},{"given":"Ravinder","family":"Nath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TIFS.2015.2503265"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TPAMI.2015.2509968"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.patcog.2010.06.007"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.patcog.2010.01.020"},{"key":"ref10","first-page":"2","article-title":"Biometrics of next generation: An overview","volume":"12","author":"jain","year":"2010","journal-title":"Second Generation Biometrics"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TCSVT.2003.818349"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2938727"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.asoc.2016.02.008"},{"key":"ref14","first-page":"55","author":"kumar","year":"2012","journal-title":"Can we use minor finger knuckle images to identify humans"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIFS.2014.2328869"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIP.2009.2023153"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.patrec.2015.08.013"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TIM.2009.2028773"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1049\/el.2009.1435"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICIP.2009.5413734"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TPAMI.2010.52"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/CVPR.2005.273"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-319-05885-6_8"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MAES.2006.1662005"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ETCHB.2010.5559286"},{"key":"ref5","first-page":"1","article-title":"Contactless finger knuckle identification using smartphones","author":"cheng","year":"2012","journal-title":"International Conference of the Biometrics Special Interest Group"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.patrec.2009.05.010"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.neucom.2013.12.036"},{"key":"ref2","article-title":"Biometric design standards for uid applications","author":"uidai","year":"2009","journal-title":"Report of the UID Committee on Biometrics Unique Identification Authority of India"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.knosys.2016.04.008"},{"year":"2009","journal-title":"Finger-knuckle-print polyu","key":"ref1"},{"key":"ref20","article-title":"Efficient backprop in neural networks: Tricks of the trade","author":"lecun","year":"0","journal-title":"Lecture Notes in Computer Science 1524"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICIP.2013.6738866"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1049\/el.2011.0156"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.neucom.2015.04.126"},{"key":"ref23","first-page":"1120","volume":"151","author":"nigam","year":"2015","journal-title":"Designing an accurate hand biometric based authentication system fusing finger knuckleprint and palmprint"},{"key":"ref26","first-page":"1","article-title":"Deepmatching: Hierarchical deformable dense matching","author":"revaud","year":"2015","journal-title":"International Journal of Computer Vision"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/CVPR.2007.383390"}],"event":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","start":{"date-parts":[[2017,2,22]]},"location":"New Delhi, India","end":{"date-parts":[[2017,2,24]]}},"container-title":["2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938565\/7947678\/07947706.pdf?arnumber=7947706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T00:12:54Z","timestamp":1499818374000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7947706\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/isba.2017.7947706","relation":{},"subject":[],"published":{"date-parts":[[2017,2]]}}}