{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:05:07Z","timestamp":1771657507210,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/isspit.2017.8388683","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:27:07Z","timestamp":1529954827000},"page":"439-444","source":"Crossref","is-referenced-by-count":5,"title":["Multimodal biometrie systems: A systematic review"],"prefix":"10.1109","author":[{"given":"Roger","family":"Ouch","sequence":"first","affiliation":[]},{"given":"Begonya","family":"Garcia-Zapirain","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Yampolskiy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"970","article-title":"UBIRIS: A noisy iris image database","author":"hugo","year":"2005","journal-title":"Image Analysis and Processing ? ICIAP 2005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699353"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1049\/ip-vis:20031078","article-title":"MCYT baseline corpus: a bimodal biometric database","volume":"6","author":"garcia","year":"2003","journal-title":"IEEE proceedings Vision Image and Signal Processing"},{"key":"ref30","article-title":"The VidTIMIT Database","author":"conrad","year":"2002","journal-title":"IDIAP Communication 02-06"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712754"},{"key":"ref36","first-page":"120","article-title":"The opencv library","volume":"11","author":"gary","year":"2000","journal-title":"DOCTOR DOBBS JOURNAL"},{"key":"ref35","article-title":"Mistral: open source biometric platform","author":"eric","year":"2010","journal-title":"Paper read at Proceedings of the 2010 ACM Symposium on Applied Computing"},{"key":"ref34","article-title":"An open framework for distributed biometric authentication in a web environment","author":"enrique","year":"2007","journal-title":"Paper read at Annales Des Telecommunications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339039"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FGR.2006.94"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIC.2007.4450956"},{"key":"ref13","article-title":"Multimodal biometrics: issues in design and testing","author":"robert","year":"2003","journal-title":"Paper read at Proceedings of the 5th international conference on Multimodal interfaces"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1121\/1.4784967"},{"key":"ref15","first-page":"687","article-title":"Continuous verification using multimodal biometrics. Pattern Analysis and Machine Intelligence","volume":"4","author":"terence","year":"2007","journal-title":"IEEE Transactions on"},{"key":"ref16","first-page":"243","article-title":"A fuzzy approach to multimodal biometric continuous authentication","volume":"3","author":"antonia","year":"2008","journal-title":"Fuzzy Optimization and Decision Making"},{"key":"ref17","article-title":"Detecting Computer Intrusions Using Behavioral Biometrics","author":"ahmed","year":"2005","journal-title":"Paper read at PST"},{"key":"ref18","article-title":"Continuous Biometric Authentication: Can It Be More Practical? Paper read at High Performance Computing and Communications (HPCC)","author":"solami eesa","year":"2010","journal-title":"2010 12th IEEE International Conference on"},{"key":"ref19","article-title":"Continuous mobile authentication using touchscreen gestures","author":"tao","year":"2012","journal-title":"Paper read at Conference on Technologies for Homeland Security (HST)"},{"key":"ref28","article-title":"Temporal integration for continuous multimodal biometrics","author":"alphan","year":"2003","journal-title":"Paper read at Proceedings of the Workshop on Multimodal User Authentication"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2004.05.001"},{"key":"ref27","first-page":"301","article-title":"Face databases","author":"ralph","year":"2005","journal-title":"Handbook of Face Recognition"},{"key":"ref3","first-page":"614634","article-title":"Enhancing security and privacy in biometrics-based authentication systems","volume":"40","author":"ratha nalini","year":"2001","journal-title":"IBM Systems Journal"},{"key":"ref6","article-title":"Feature level fusion of hand and face biometrics","author":"ross","year":"2005","journal-title":"Paper read at Defense and Security conference"},{"key":"ref29","first-page":"235","article-title":"BiosecurID: a multimodal biometric database","volume":"2","author":"julian","year":"2010","journal-title":"Pattern Analysis and Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.012"},{"key":"ref8","article-title":"Biometric recognition using feature selection and combination","author":"ajay","year":"2005","journal-title":"Paper read at Audio-and Video-Based Biometric Person Authentication"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s120505551"},{"key":"ref2","first-page":"351","article-title":"Keystroke dynamics as a biometric for authentication","volume":"4","author":"fabian","year":"2000","journal-title":"Future Generation Computer Systems"},{"key":"ref9","article-title":"Feature selection based on genetic algorithms for online signature verification","author":"javier","year":"2007","journal-title":"Paper read at Automatic Identification Advanced Technologies 2007 IEEE Workshop on"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-010-0182-0"},{"key":"ref20","first-page":"136","article-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","volume":"1","author":"mario","year":"2013","journal-title":"Information Forensics and Security IEEE Transactions on"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISBAST.2008.4547640"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITS.2006.4433346"},{"key":"ref24","article-title":"Continuous biometric user authentication in online examinations","author":"eric","year":"2010","journal-title":"Paper read at Information Technology New Generations (ITNG) 2010 Seventh International Conference on"},{"key":"ref23","article-title":"Low cost and usable multimodal biometric system based on keystroke dynamics and 2d face recognition","author":"romain","year":"2010","journal-title":"Paper read at Pattern Recognition (ICPR) 2010 20th International Conference on"},{"key":"ref26","article-title":"Continuous user authentication using temporal information","author":"koichiro","year":"2010","journal-title":"Paper read at SPIE Defense Security and Sensing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"}],"event":{"name":"2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","location":"Bilbao","start":{"date-parts":[[2017,12,18]]},"end":{"date-parts":[[2017,12,20]]}},"container-title":["2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8379924\/8388305\/08388683.pdf?arnumber=8388683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:09:58Z","timestamp":1643202598000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8388683\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/isspit.2017.8388683","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}