{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T06:31:04Z","timestamp":1767162664232,"version":"build-2238731810"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE MultiMedia"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/mmul.2018.2873494","type":"journal-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T14:32:53Z","timestamp":1539700373000},"page":"22-35","source":"Crossref","is-referenced-by-count":24,"title":["Biometrics: In Search of Identity and Security (Q &amp; A)"],"prefix":"10.1109","volume":"25","author":[{"given":"Zahid","family":"Akhtar","sequence":"first","affiliation":[{"name":"University of Quebec"}]},{"given":"Abdenour","family":"Hadid","sequence":"additional","affiliation":[{"name":"University of Oulu"}]},{"given":"Mark S.","family":"Nixon","sequence":"additional","affiliation":[{"name":"University of Southampton"}]},{"given":"Massimo","family":"Tistarelli","sequence":"additional","affiliation":[{"name":"University of Sassari"}]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[{"name":"EURECOM"}]},{"given":"Sebastien","family":"Marcel","sequence":"additional","affiliation":[{"name":"Idiap Research Institute"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2480381"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1145\/2816795.2818072","article-title":"RF-Capture: Capturing a coarse human figure through a wall","volume":"34","author":"adib","year":"2015","journal-title":"ACM Trans Graph"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1004224"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-015-0049-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.08.006"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1109\/TPAMI.2013.134","article-title":"Neighborhood repulsed metric learning for kinship verification","volume":"36","author":"lu","year":"2014","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.184"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-921-7_24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.12.013"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-6524-8","author":"marcel","year":"2014","journal-title":"Handbook of Biometric Anti-spoofing"},{"key":"ref6","first-page":"46","article-title":"A survey of biometrics for wearable devices","volume":"18","author":"cornelius","year":"2014","journal-title":"Intel Technol J"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386915"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.025"},{"key":"ref7","article-title":"Security of multimodal biometric systems against spoof attacks","author":"akhtar","year":"2012"},{"key":"ref2","author":"ross","year":"2006","journal-title":"Handbook of Multibiometrics"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7488-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"}],"container-title":["IEEE MultiMedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/93\/8584519\/08493332.pdf?arnumber=8493332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T21:57:14Z","timestamp":1693951034000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8493332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":18,"aliases":["10.1109\/mmul.2017.265090754"],"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mmul.2018.2873494","relation":{},"ISSN":["1070-986X","1941-0166"],"issn-type":[{"value":"1070-986X","type":"print"},{"value":"1941-0166","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}