{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:10:12Z","timestamp":1761581412527},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/mce.2016.2521937","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T18:07:48Z","timestamp":1460398068000},"page":"70-78","source":"Crossref","is-referenced-by-count":13,"title":["Biometric Technology and Smartphones: A consideration of the practicalities of a broad adoption of biometrics and the likely impacts"],"prefix":"10.1109","volume":"5","author":[{"given":"Peter","family":"Corcoran","sequence":"first","affiliation":[]},{"given":"Claudia","family":"Costache","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996276"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.6018903"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.02.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2071389.2071391"},{"key":"ref31","first-page":"1","article-title":"Improved palm print authentication using contactless imaging","author":"morales","year":"0","journal-title":"Proc IEEE Conf Biometrics Theory Applications and Systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.01.018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2011.6031855"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICEGIC.2009.5293609"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108288"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2012.6227433"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00030-4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884092"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.08.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_61"},{"key":"ref16","first-page":"197","article-title":"Pupil and iris localization for iris recognition in mobile phones","author":"cho","year":"0","journal-title":"Proc 7th ACIS Int Conf Software Engineering Artificial Intelligence Networking Parallel\/Distributed Computing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/281943"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2010.75"},{"key":"ref19","article-title":"IREX II&#x2014;Iris quality calibration and evaluation (IQCE): Performance of iris image quality assessment algorithms","author":"tabassi","year":"2011","journal-title":"Report of evaluation of NIST"},{"key":"ref28","article-title":"Personal verification using palm print and hand geometry biometric","author":"kumar","year":"0","journal-title":"Proc 4th Int Conf AVBPA"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2007.341416"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2014.7034328"},{"key":"ref3","first-page":"1","article-title":"Authenticating users on handheld devices","author":"jansen","year":"0","journal-title":"Proc of Canadian Information Technology Security Symposium"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(14)70088-8"},{"key":"ref29","author":"zhang","year":"2004","journal-title":"Palm Print Authentication"},{"key":"ref5","first-page":"1","article-title":"Determining unique fingerprint features for biometric encoding of data","author":"cucu","year":"0","journal-title":"Proc IEEE Int Conf Consumer Electronics"},{"key":"ref8","article-title":"Iris recognition: From basics to research frontiers","author":"bowyer","year":"0","journal-title":"Iris Recognition Tutorial Int Conf Biometrics Theory Applications and Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4760935"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref9","author":"daugman","year":"1994","journal-title":"Biometric Personal Identification System Based on Iris Analysis"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-4079(15)30113-5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.364"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CIHSPS.2006.313298"},{"key":"ref45","article-title":"Biometrics and privacy","author":"clarke","year":"2015"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIB.2009.4925680"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89639-5_70"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339050"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1117\/12.778118"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.05.008"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.172"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25330-0_44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24055-3_26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6084192"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/7450702\/07450772.pdf?arnumber=7450772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:11:03Z","timestamp":1642003863000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7450772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":46,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mce.2016.2521937","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"value":"2162-2248","type":"print"},{"value":"2162-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}