{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:07:13Z","timestamp":1761646033344},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2015,2,1]],"date-time":"2015-02-01T00:00:00Z","timestamp":1422748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/tifs.2014.2379437","type":"journal-article","created":{"date-parts":[[2014,12,9]],"date-time":"2014-12-09T19:38:25Z","timestamp":1418153905000},"page":"423-435","source":"Crossref","is-referenced-by-count":14,"title":["3D Ear Segmentation and Classification Through Indexing"],"prefix":"10.1109","volume":"10","author":[{"given":"Sayan","family":"Maity","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Abdel-Mottaleb","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2006.253879"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.906202"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1117\/12.719237","article-title":"An efficient indexing scheme for binary feature based biometric database","volume":"6539","author":"gupta","year":"2007","journal-title":"Proc SPIE"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-540-89862-7_19","article-title":"Indexing multimodal biometric databases using Kd-tree with feature level fusion","author":"jayaraman","year":"2008","journal-title":"Information Systems Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.176"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICWAPR.2008.4635879"},{"key":"ref37","first-page":"66","article-title":"Gradient vector flow: A new external force for snakes","author":"xu","year":"1997","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/BF00133570"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738865"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612995"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/3-540-46521-9_19","article-title":"An efficient algorithm for the approximate median selection problem","volume":"1767","author":"battiato","year":"2000","journal-title":"Algorithms and Complexity"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1117\/12.604173"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/93.311656"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/11527923_88","article-title":"Indexing biometric databases using pyramid technique","author":"mhatre","year":"2005","journal-title":"Audio- and Video-Based Biometric Person Authentication"},{"key":"ref2","author":"iannarelli","year":"1989","journal-title":"Ear Identification"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2431211.2431221"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0095506"},{"key":"ref22","first-page":"188","article-title":"Comparing decision fusion paradigms using k-NN based classifiers, decision trees and logistic regression in a multi-modal identity verification application","author":"verlinde","year":"1999","journal-title":"Int Conf Audio and Video based Biometric Person Authentication"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0085-5"},{"key":"ref24","author":"henry","year":"1990","journal-title":"Classification and Uses of Finger Prints"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1007\/11527923_50","article-title":"A classification approach to multi-biometric score fusion","author":"ma","year":"2005","journal-title":"Int Conf Audio and Video based Biometric Person Authentication"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF01236577"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/34.531800"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1117\/12.333862"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/DASFAA.2003.1192391"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/276305.276318"},{"key":"ref58","article-title":"The X-tree: An index structure for high-dimensional data","volume":"451","author":"berchtold","year":"2001","journal-title":"Readings in Multimedia Computing and Networking"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/93597.98741"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/276305.276353"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/356770.356776"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/335168.335219"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/11527923_52","article-title":"Multi-biometrics 2D and 3D ear recognition","volume":"3546","author":"yan","year":"2005","journal-title":"Audio- and Video-Based Biometric Person Authentication"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1067"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/11789239_7","article-title":"Further developments in geometrical algorithms for ear biometrics","author":"choras","year":"2006","journal-title":"Articulated Motion and Deformable Objects"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401938"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761876"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981815"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2189005"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/978-3-540-88458-3_98","article-title":"A fast and fully automatic ear recognition approach based on 3D local surface features","volume":"5259","author":"islam","year":"2008","journal-title":"Advanced Concepts for Intelligent Vision Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-011-0436-0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199765"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.03.007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6182-0_6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995741"},{"key":"ref6","first-page":"123","article-title":"Contour matching for 3D ear recognition","volume":"1","author":"chen","year":"2005","journal-title":"Proc IEEE Workshop Appl Comput Vis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/34.625113"},{"key":"ref8","first-page":"41","article-title":"Empirical evaluation of advanced ear biometrics","author":"yan","year":"2005","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit -Workshops"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1005"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(86)90220-3"},{"key":"ref9","first-page":"121","article-title":"Ear biometrics using 2D and 3D images","author":"yan","year":"2005","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit -Workshops"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s001380050101"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-002-0118-6"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/0470013192.bsa501"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/360881.360919"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(93)90098-H"},{"key":"ref41","author":"sonka","year":"1999","journal-title":"Image Processing Analysis and Machine Vision"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.06.017"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057692"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7000004\/06980457.pdf?arnumber=6980457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:27:52Z","timestamp":1642004872000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6980457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":60,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2379437","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2]]}}}