{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:57:23Z","timestamp":1729634243077,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/spac.2017.8304368","type":"proceedings-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T18:52:04Z","timestamp":1520016724000},"page":"718-723","source":"Crossref","is-referenced-by-count":0,"title":["A diffusion optical model for skin scattering suppression in finger vein image restoration"],"prefix":"10.1109","author":[{"given":"Wenhao","family":"You","sequence":"first","affiliation":[]},{"given":"Weikang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yaqin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ziyu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1016\/j.mri.2016.04.020","article-title":"Application of histogram analysis for evaluation of vascular permeability in glioma by the K2 parameter obtained with the dynamic susceptibility contrast method: Comparisons with Ktrans obtained with dynamic contrast enhance method and cerebral blood volume","volume":"34","author":"taoka","year":"2016","journal-title":"Magn Reson Imaging"},{"key":"ref32","first-page":"vi-424","article-title":"An effective Quality Improvement Approach for Low Quality Finger vein Image","author":"wei","year":"2010","journal-title":"Electronics and Information Engineering (ICEIE) 2010 International Conference On"},{"key":"ref31","first-page":"963","article-title":"A perceptual audio quality measure based on psychoacoustic sound representation","volume":"40","author":"beerends","year":"1992","journal-title":"J Audio Eng Soc"},{"key":"ref30","article-title":"New perceptual quality measure for the bitrate reduced audio","author":"thiede","year":"1996","journal-title":"Preprint 4280 Copenhagen Denmark"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/10.42108"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/el.2009.1231"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2011.03.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s120303627"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.10.009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s150717089"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2380174"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2240004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.5.000813"},{"key":"ref19","first-page":"126","author":"cui","year":"1990","journal-title":"Photon Diffusion Theory and Noninvasive Tissue Optical Property Measurement"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ETCHB.2010.5559283"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1142\/S0218001404003861","article-title":"Fingerprint Enhancement Using Wavelet Transform Combined with Gabor Filter","volume":"18","author":"weipeng","year":"2004","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.925392"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1142\/S0218001405004253","article-title":"A Wavelet-based Approach for the Thinning Ridge of Fingerprint","volume":"19","author":"xinge","year":"2005","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"ref6","first-page":"354","article-title":"Robust Object Tracking via Key Patch Sparse Representation","author":"zhenyu","year":"2017","journal-title":"IEEE Transactions on Cybernetics"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25449-9_33"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3698","DOI":"10.1109\/TIP.2016.2570553","article-title":"Connected Component Model for Multi-Object Tracking","volume":"25","author":"zhenyu","year":"2016","journal-title":"IEEE Trans on Image Processing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s111211357"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSP.2012.2230218","article-title":"Privacy-Preserving Biometric Identification Using Secure Multiparty Computation","volume":"30","author":"bringer","year":"2013","journal-title":"IEEE Signal Proc M"},{"key":"ref2","article-title":"Fingerprint Enhancement Based on Wavelet and Anisotropic Filtering","volume":"26","author":"jiajia","year":"2012","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"ref9","article-title":"Scattered Radiation and Contrast","author":"sprawls","year":"1993","journal-title":"The Physical Principles of Medical Imaging 2nd ed Aspen Publishers"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/tee.22459"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/10.121651"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4711842"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1364\/AO.44.002154"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176345632"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2008212"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.891064"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.921757"}],"event":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2017,12,15]]},"location":"Shenzhen","end":{"date-parts":[[2017,12,17]]}},"container-title":["2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8300290\/8304236\/08304368.pdf?arnumber=8304368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T01:12:51Z","timestamp":1570842771000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8304368\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/spac.2017.8304368","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}