{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:57:33Z","timestamp":1760029053234},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Mag."],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1109\/msp.2004.1276113","type":"journal-article","created":{"date-parts":[[2004,3,23]],"date-time":"2004-03-23T19:01:11Z","timestamp":1080068471000},"page":"50-62","source":"Crossref","is-referenced-by-count":97,"title":["Authentication gets personal with biometrics"],"prefix":"10.1109","volume":"21","author":[{"given":"J.","family":"Ortega-Garcia","sequence":"first","affiliation":[]},{"given":"J.","family":"Bigun","sequence":"additional","affiliation":[]},{"given":"D.","family":"Reynolds","sequence":"additional","affiliation":[]},{"given":"J.","family":"Gonzalez-Rodriguez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Special issue on automated biometrics","volume":"85","year":"1997","journal-title":"Proc IEEE"},{"key":"ref38","author":"scheuermann","year":"2000","journal-title":"Usability of biometrics in relation to electronic signatures"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1994.323814"},{"key":"ref32","first-page":"658","article-title":"Complete signal modeling and score normalization for func tion-based dynamic signature verification","volume":"lncs 2688","author":"ortega-garcia","year":"2003","journal-title":"Proc 4th Int Conf Audio-and Video-Based Person Authentication AVBPA 2003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1053-6_12"},{"key":"ref30","article-title":"Summary of NIST Standards for Biometrie Accuracy, Tamper Resistance, and Interoperability","year":"2003","journal-title":"Report to the US Congress"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-45344-X_52","article-title":"Information fusion in biometrics","volume":"lncs 2091","author":"ross","year":"2001","journal-title":"Proc 3rd Audio and Video-Based Person Authentication AVBPA'01"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2003.1202760"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/34.824821"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1047929"},{"key":"ref27","first-page":"237","article-title":"Using voice to generate cryptographic keys","author":"monrose","year":"2001","journal-title":"Proc ODYSSEY-2001"},{"key":"ref29","year":"0","journal-title":"National Institute of Standards and Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017618"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001494000346"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/34.566808"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/79.879338"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1992.223162"},{"key":"ref23","author":"maltoni","year":"2003","journal-title":"Handbook of Fingerprint Recognition"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.21437\/Eurospeech.1997-504","article-title":"The DET curve in assessment of decision task performance","author":"martin","year":"1997","journal-title":"Proc ESCA 5th Eur Conf Speech Comm and Tech EuroSpeech '97"},{"key":"ref25","author":"mansfield","year":"0","journal-title":"Biometric Product Testing Final Report"},{"key":"ref50","first-page":"92","article-title":"Face recognition and gender determination","author":"wiskott","year":"1995","journal-title":"Proc Int Workshop Automatic Face and Gesture Recognition"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/93.939993"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/89.917689"},{"key":"ref52","year":"2002","journal-title":"Biometrics Solutions for Authentication in an E-World"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/0-306-47044-6_5","author":"daugman","year":"1999","journal-title":"Biometrics?Personal Identification in Networked Society"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45344-X_31","article-title":"An improved image enhancement scheme for fingerprint minutiae extraction in biometrie identification","volume":"lncs 2091","author":"simon-zorita","year":"2001","journal-title":"Proc 3rd Audio and Video-Based Person Authentication AVBPA'01"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/83.753738"},{"key":"ref12","author":"federrath","year":"0","journal-title":"Scientific evaluation of DRM systems"},{"key":"ref13","first-page":"3","article-title":"Multi-modal identity verification using support vector machines (SVM)","volume":"2","author":"gutschoven","year":"2000","journal-title":"Proc 3rd Int Conf Information Fusion"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/35.883493"},{"key":"ref15","year":"1999","journal-title":"Biometrics?Personal Identification in Networked Society"},{"key":"ref16","author":"jain","year":"2001","journal-title":"Advances in Fingerprint Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(87)90043-0"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/BFb0016012","article-title":"Combining evidence in multimodal personal identity recognition systems","volume":"lncs 1206","author":"kittler","year":"1997","journal-title":"Proc 1st Int Conf Audio and Video-Based Person Authentication AVBPA'97"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/12.210173"},{"key":"ref4","first-page":"433","article-title":"Optimal orientation detection of linear symmetry","author":"bigun","year":"1987","journal-title":"First Int Conf Computer Vision ICCV-87"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/BFb0016008","article-title":"Expert conciliation for multi modal person authentication systems by Bayesian statistics","volume":"lncs 1206","author":"bigun","year":"1997","journal-title":"Proc Intl Conf Audio and Video Based Person Authentication AVBPA'97"},{"key":"ref6","year":"1994","journal-title":"Method for Producing a Digital Signature With Aids of a Biometric Feature"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/5.771077"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/34.254061"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2003.1184339"},{"key":"ref49","article-title":"Labeled graphs and dynamic link matching for face recognition and scene analysis","volume":"53","author":"wiskott","year":"1995","journal-title":"Reihe Physik"},{"key":"ref9","article-title":"Special issue on speaker recognition","volume":"10","year":"2000","journal-title":"Digital Signal Process"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1044628"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/S1566-2535(00)00002-6"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/5.628669"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1049\/ecej:20020507","article-title":"securing the delivery of digital content over the internet","volume":"14","author":"waller","year":"2002","journal-title":"Electronics & Communication Engineering Journal"},{"key":"ref42","first-page":"249","article-title":"On the role of dimensionality in face recognition","volume":"lncs 2388","author":"smeraldi","year":"2002","journal-title":"Proc 2002 Workshop on SVM's"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(01)00178-7"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref43","author":"soutar","year":"0","journal-title":"Biometrie Encryption"}],"container-title":["IEEE Signal Processing Magazine"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/79\/28554\/01276113.pdf?arnumber=1276113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T05:15:03Z","timestamp":1682658903000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,3]]}},"URL":"https:\/\/doi.org\/10.1109\/msp.2004.1276113","relation":{},"ISSN":["1053-5888"],"issn-type":[{"value":"1053-5888","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}