{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T01:21:30Z","timestamp":1768353690350,"version":"3.49.0"},"reference-count":94,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000196","name":"Canadian Foundation for Innovations","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000196","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Government of the Province of Alberta"},{"DOI":"10.13039\/100004415","name":"NATO","doi-asserted-by":"crossref","award":["EAP.CLG 984"],"award-info":[{"award-number":["EAP.CLG 984"]}],"id":[{"id":"10.13039\/100004415","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002956","name":"Defense Research and Development Canada (DRDC)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002956","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Security Program in partnership with Science and Engineering Directorate of the Canada Border Service Agency","award":["CSSP-2013-CP-1020"],"award-info":[{"award-number":["CSSP-2013-CP-1020"]}]},{"name":"MSMT","award":["ED1.1.00\/02.0070"],"award-info":[{"award-number":["ED1.1.00\/02.0070"]}]},{"name":"Czech Republic","award":["2011-2015"],"award-info":[{"award-number":["2011-2015"]}]},{"DOI":"10.13039\/501100000921","name":"COST","doi-asserted-by":"crossref","award":["LD14013"],"award-info":[{"award-number":["LD14013"]}],"id":[{"id":"10.13039\/501100000921","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004520","name":"Tokyo Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004520","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Human-Mach. Syst."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/thms.2015.2412944","type":"journal-article","created":{"date-parts":[[2015,5,7]],"date-time":"2015-05-07T18:57:15Z","timestamp":1431025035000},"page":"231-242","source":"Crossref","is-referenced-by-count":37,"title":["Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications"],"prefix":"10.1109","volume":"46","author":[{"given":"Shawn C.","family":"Eastwood","sequence":"first","affiliation":[]},{"given":"V. P.","family":"Shmerko","sequence":"additional","affiliation":[]},{"given":"S. N.","family":"Yanushkevich","sequence":"additional","affiliation":[]},{"given":"M.","family":"Drahansky","sequence":"additional","affiliation":[]},{"given":"D. O.","family":"Gorodnichy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.mvr.2004.05.003"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2008.2011700"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/b138155"},{"key":"ref70","author":"gupta","year":"2013","journal-title":"Using Social Media for Global Security"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s003710050182"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/79.911197"},{"key":"ref74","author":"petta","year":"2011","journal-title":"Emotion-Oriented Systems the Humaine Handbook"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/9780470522356.ch24"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095936"},{"key":"ref38","author":"wooldridge","year":"2009","journal-title":"An Introduction to Multiagent Systems"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2006.347949"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-010-0030-2"},{"key":"ref33","volume":"2","year":"2010"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.03.022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/9781118281116"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9781119945482"},{"key":"ref37","author":"uhrmacher","year":"2009","journal-title":"Multi-Agent Systems Simulation and Applications"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85303-9_14"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1142\/9789812770677_0015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7488-4_24"},{"key":"ref60","year":"2014"},{"key":"ref62","year":"2009","journal-title":"IEEE The State of RFID Implementation and Its Policy Implications"},{"key":"ref61","author":"nouak","year":"2014","journal-title":"PreBorderLane Project Description"},{"key":"ref63","year":"2012","journal-title":"Frontex Operational and Technical Security of Electronic Passports"},{"key":"ref28","year":"2014"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544292"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17764-4_4"},{"key":"ref65","year":"2008","journal-title":"ISO Biometric Profiles for Interoperability and Data Interchange Part 2 Physical Access Control for Employees at Airports"},{"key":"ref66","year":"2010","journal-title":"NIST Report on the Evaluation of 2D Still-Image Face Recognition Algorithms"},{"key":"ref29","year":"2012","journal-title":"SITA Positioning Paper"},{"key":"ref67","author":"nuppeney","year":"2012","journal-title":"Automated Border Control Based on (ICAO Compliant) eMRTDs"},{"key":"ref68","author":"nuppeney","year":"2010","journal-title":"EasyPASS&#x2014;Evaluation of Face Recognition Performance in an Operational Automated Border Control System"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942"},{"key":"ref2","author":"jain","year":"1999","journal-title":"Biometrics Personal Identification in a Networked Society"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4036-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-009-0512-3"},{"key":"ref22","article-title":"Justice and Home Affairs databases and a Smart Borders system at EU external borders. An evaluation of current and forthcoming proposals","author":"bigo","year":"2012","journal-title":"Centre for European Policy Studies"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.12.027"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6914-7"},{"key":"ref23","first-page":"423","article-title":"Profiles in terror: A legal framework for the behavioral profiling paradigm, George Mason Law Review","volume":"17","author":"florence","year":"2010"},{"key":"ref26","author":"elias","year":"2009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.1090.0308"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/3468.952714"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MEMB.2006.1636352"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1002\/9780470994559.ch14"},{"key":"ref93","doi-asserted-by":"crossref","DOI":"10.4324\/9781410617088","author":"forsythe","year":"2006","journal-title":"Cognitive Systems Human Cognitive models in Systems Design"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CIES.2014.7011843"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2013.71"},{"key":"ref59","year":"2013"},{"key":"ref58","article-title":"A risk-based airport security policy","author":"poole","year":"2003"},{"key":"ref57","author":"hayes","year":"2012","journal-title":"Borderline the EU's New Border Surveillance Initiatives"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2014.7015452"},{"key":"ref55","year":"2008","journal-title":"Home Office (UK) E-Borders Programme Review of the Code of Practice on Data Sharing Version 1 1"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459867"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699064"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2022102"},{"key":"ref10","year":"2003","journal-title":"The Polygraph and Lie Detection"},{"key":"ref11","year":"2008"},{"key":"ref40","author":"mansfield","year":"2002","journal-title":"Best practice standards for testing and reporting on biometric device performance"},{"key":"ref12","year":"2009","journal-title":"NIST Mobile ID Device Best Practice Recommendation Version 1 0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/6.259484"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/int.10044"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2014.154"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3502-4"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223684"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/3477.979955"},{"key":"ref84","year":"2011","journal-title":"Subcommittee on Biometrics and Identity Management"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/int.1020"},{"key":"ref83","first-page":"169","article-title":"FaceBots: Steps towards enhanced long-term human-robot interface by utilizing and publishing on-line social information","volume":"1","author":"mavridis","year":"2011","journal-title":"Springer Paladyn J Behav Robot"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.169"},{"key":"ref80","first-page":"236","article-title":"Hahoe KAIST robot theater: Learning rules of interactive robot behavior as a multiple-valued logic synthesis problem","author":"perkowski","year":"0","journal-title":"IEEE Proc International Symp on Multiple-Valued logic"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.31"},{"key":"ref4","year":"2012","journal-title":"Frontex Best Practice Technical Guidelines for Automated Border Control (ABC) Systems"},{"key":"ref3","year":"2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.181"},{"key":"ref5","year":"0"},{"key":"ref85","author":"pato","year":"2010","journal-title":"Biometric Recognition Challenges and Opportunities"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.05.001"},{"key":"ref86","author":"nuppeney","year":"2014","journal-title":"Automated Border Control&#x2014;State of Play and Latest Developments"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36678-4_4"},{"key":"ref49","year":"2008"},{"key":"ref87","article-title":"E-gate case study: The German EasyPASS project","author":"marzahn","year":"0","journal-title":"Technical Advisory Group Mach Readable Travel Documents (TAG\/MRTD) ICAO 12th Meeting"},{"key":"ref88","year":"2006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280102"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MEMB.2002.1175139"},{"key":"ref45","year":"2010","journal-title":"Frontex BIOPASS II Automated biometric border crossing systems based on electronic passports and facial recognition RAPID and SmartGate"},{"key":"ref48","year":"2012","journal-title":"Homeland Security News Wire"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0065"},{"key":"ref42","first-page":"1","article-title":"Multibiometrics for identity authentication: Issues, benefits and challenges","author":"kittler","year":"0","journal-title":"Proc 2nd IEEE Int Conf Biometrics Theory Appl Syst"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/962081.962102"},{"key":"ref44","year":"2007","journal-title":"Frontex Study on automated biometric border crossing systems for registered passenger at four European airports"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712744"}],"container-title":["IEEE Transactions on Human-Machine Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221037\/7431959\/7103330.pdf?arnumber=7103330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T13:15:58Z","timestamp":1651929358000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7103330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":94,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/thms.2015.2412944","relation":{},"ISSN":["2168-2291","2168-2305"],"issn-type":[{"value":"2168-2291","type":"print"},{"value":"2168-2305","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}