{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:47:21Z","timestamp":1765262841416,"version":"3.46.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"publisher","award":["2024A1515110009"],"award-info":[{"award-number":["2024A1515110009"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976095","62376100"],"award-info":[{"award-number":["61976095","62376100"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3630891","type":"journal-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T18:46:50Z","timestamp":1762800410000},"page":"12812-12826","source":"Crossref","is-referenced-by-count":0,"title":["Study of Full-View Finger Vein Biometrics on Redundancy Analysis and Dynamic Feature Extraction"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5510-7046","authenticated-orcid":false,"given":"Junduan","family":"Huang","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, South China Normal University, Foshan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3252-0791","authenticated-orcid":false,"given":"Sushil","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"Biometrics Security and Privacy Group, Idiap Research Institute, Martigny, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2497-9140","authenticated-orcid":false,"given":"S\u00e9bastien","family":"Marcel","sequence":"additional","affiliation":[{"name":"Biometrics Security and Privacy Group, Idiap Research Institute, Martigny, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9023-7252","authenticated-orcid":false,"given":"Wenxiong","family":"Kang","sequence":"additional","affiliation":[{"name":"School of Automation Science and Engineering, South China University of Technology, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3490581"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3238546"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2928507"},{"key":"ref5","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850320"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3258252"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2971144"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3172218"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3173276"},{"article-title":"3D point cloud reconstruction based on the finger vascular pattern","year":"2018","author":"Bunda","key":"ref11"},{"article-title":"Redesign of a finger vein scanner","year":"2022","author":"Elderen","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3188561"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698558"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3227385"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3301211"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2022.3181121"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging8050148"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3152247"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3505244"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref23","article-title":"LocalViT: Analyzing locality in vision transformers","author":"Li","year":"2021","journal-title":"arXiv:2104.05707"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2102.10882"},{"key":"ref25","first-page":"1","article-title":"Dynamicvit: Efficient vision transformers with dynamic token sparsification","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Rao"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01199"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20083-0_24"},{"key":"ref28","first-page":"1","article-title":"EVIT: Expediting vision transformers via token reorganizations","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Liang"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00711"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.114"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5244\/C.35.71"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11236466.pdf?arnumber=11236466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:43:00Z","timestamp":1765262580000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11236466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3630891","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}