{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:10:24Z","timestamp":1730279424110,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/iwbf.2014.6914259","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T20:57:46Z","timestamp":1412801866000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["In the use of the spontaneous pupillary oscillations as a new biometric trait"],"prefix":"10.1109","author":[{"given":"Fabiola M.","family":"Villalbos-Castaldi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ernesto","family":"Suaste-Gomez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Introduction To Biometric Recognition","year":"2004","author":"jain","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref12","first-page":"340","article-title":"Video-Based Face Recognition Using Adaptive Hidden Markov Models, CVPR'03","author":"liu","year":"2003","journal-title":"Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition"},{"journal-title":"Nonlinear Oscillations Noise and Chaos in Neural Delayed Feedback department of Piysics","year":"1989","author":"longtin","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0042-6989(98)00081-9"},{"key":"ref15","article-title":"Dynamic Features for Iris Recognition","volume":"42","author":"martins da costa","year":"2012","journal-title":"IEEE Trans Syst Man Cybernetics B Cybernetics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884091"},{"year":"0","key":"ref17"},{"journal-title":"Biometric Authentication in Real-Time Large-Scale Applications Dynamic Features for Iris Recognition","year":"2005","author":"ojala","key":"ref18"},{"key":"ref19","first-page":"106:1","article-title":"Photorealistic Models for Pupil Light Reflex and Iridal Pattern Deformation","volume":"28","author":"pamplona","year":"2010","journal-title":"ACM Transactions on Graphics (TOG) - Proceedings of ACM SIGGRAPH 2010"},{"key":"ref4","article-title":"Pupil Recognition Using Wavelet And Fuzzy Linear Discriminant Analysis For Authentication","volume":"iii","author":"rao","year":"2012","journal-title":"International Journal of Advanced Engineering Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0042-6989(71)90016-2"},{"journal-title":"Iris Recognition Department of Computer Science and Electrical Engineering","year":"1999","author":"cheung","key":"ref6"},{"key":"ref5","article-title":"Spontaneous Fluctuations of Human Pupil Reflect Central Autonomic Rhythms","author":"calcagnini","year":"2000","journal-title":"Methods of Information in Medicine"},{"key":"ref8","article-title":"Video-Based Non-cooperative Iris Image Segmentation","volume":"41","author":"du","year":"2013","journal-title":"IEEE Trans Syst Man Cybernetics B Cybernetics"},{"journal-title":"How Iris Recognition Works","year":"2004","author":"daugman","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11499145_79"},{"journal-title":"Psychophysiological Indices of Recognition Memory","year":"2011","author":"heaver","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2008.4777505"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1959.287206"},{"journal-title":"Automated Pupillometry","year":"2007","author":"teikari","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5772\/48704"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2008.09.019"},{"key":"ref23","first-page":"291","article-title":"Biometric Liveness Detection","volume":"10","author":"toth","year":"2005","journal-title":"Information Security Bulletin"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2869.2001.00239.x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699381"}],"event":{"name":"2014 2nd International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2014,3,27]]},"location":"Valletta, Malta","end":{"date-parts":[[2014,3,28]]}},"container-title":["2nd International Workshop on Biometrics and Forensics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6903649\/6914235\/06914259.pdf?arnumber=6914259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:19:48Z","timestamp":1490307588000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6914259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iwbf.2014.6914259","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}