{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:37:52Z","timestamp":1761647872219},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/tifs.2011.2159597","type":"journal-article","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T15:00:56Z","timestamp":1308668456000},"page":"1248-1258","source":"Crossref","is-referenced-by-count":43,"title":["Quality-Driven Super-Resolution for Less Constrained Iris Recognition at a Distance and on the Move"],"prefix":"10.1109","volume":"6","author":[{"given":"Kien","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Clinton","family":"Fookes","sequence":"additional","affiliation":[]},{"given":"Sridha","family":"Sridharan","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Denman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.857353"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/11527923_4","article-title":"A study on iris image restoration","author":"kang","year":"2005","journal-title":"Proc 5th Int Conf Audioand Video-Based Biometric Person Authentication (AVBPA)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.800883"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/1049-9652(91)90045-L"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/83.650118"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/70.681240"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.04.010"},{"key":"ref34","article-title":"Using incremental principal component analysis to learn a gender classifier automatically","author":"santana","year":"2007","journal-title":"Proc 1st Spanish Workshop on Biometrics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.811513"},{"key":"ref40","first-page":"ii-954","article-title":"Wavelet-based illumination normalization for face recognition","volume":"2","author":"du","year":"2005","journal-title":"Proc IEEE Int Conf Image Processing 2005 (ICIP 2005)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICUT.2009.5405701"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5244\/C.17.16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2007.4555295"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/CVPRW.2009.5204310","article-title":"Global and local quality measures for nir iris video","author":"zuo","year":"2009","journal-title":"Proc 2009 IEEE Conf Computer Vision and Pattern Recognition (CVPR 2009)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2024653"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.11.012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70796"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339081"},{"key":"ref19","first-page":"705","article-title":"Overview of the multiple biometrics grand challenge","author":"phillips","year":"2009","journal-title":"Proc Third Int Conf Advances in Biometrics (ICB 2009)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1117\/1.3265543"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2003.1203207"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/83.650116"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2041658"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2010.5636922"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/83.892456"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_1"},{"key":"ref8","article-title":"Super-resolved face images using robust optical flow","author":"fookes","year":"2004","journal-title":"Proc Third Workshop on the Internet Telecommunications and Signal Processing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2006.113"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.922421"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WMVC.2009.5399237"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1852611.1852635"},{"key":"ref21","first-page":"73","article-title":"Investigation into optical flow super-resolution for surveillance applications","author":"lin","year":"2005","journal-title":"Proc APRS Workshop on Digital Image Computing"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-005-0419-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_112"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.68"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IVCNZ.2010.6148792"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884091"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_117"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2946.001.0001","author":"wiener","year":"1949","journal-title":"Extrapolation Interpolation and Smoothing of Stationary Time Series with Engineering Applications"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033759"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6069499\/05876317.pdf?arnumber=5876317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:53:26Z","timestamp":1642006406000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5876317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2011.2159597","relation":{},"ISSN":["1556-6013"],"issn-type":[{"value":"1556-6013","type":"print"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}