{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:22:07Z","timestamp":1725772927987},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/isbast.2013.9","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T12:24:40Z","timestamp":1379593480000},"page":"40-47","source":"Crossref","is-referenced-by-count":3,"title":["How to Build an Automated Fingerprint Identification System"],"prefix":"10.1109","author":[{"given":"Zeeshan-ul-Hassan","family":"Usmani","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Irum","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"Shahid","family":"Mahmud","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Fingerprint Image Enhancement and Minutiae Extraction","year":"2003","author":"thai","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211936"},{"journal-title":"Emgu CV","year":"2008","author":"johnson","key":"11"},{"year":"0","key":"12"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"journal-title":"Federal Bureau of Investigation Criminal Justice Information Services Division","year":"2010","key":"10"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","article-title":"The opencv library","author":"bradski","year":"2000","journal-title":"Dr Dobb's Journal of Software Tools"},{"year":"0","key":"8"}],"event":{"name":"2013 International Symposium on Biometrics and Security Technologies (ISBAST)","start":{"date-parts":[[2013,7,2]]},"location":"Chengdu, Sichuan, China","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 International Symposium on Biometrics and Security Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6597099\/6597649\/06597664.pdf?arnumber=6597664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:26:44Z","timestamp":1490203604000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6597664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isbast.2013.9","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}