{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:54:20Z","timestamp":1774022060971,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/tip.2011.2170696","type":"journal-article","created":{"date-parts":[[2011,10,11]],"date-time":"2011-10-11T21:27:35Z","timestamp":1318368455000},"page":"2220-2227","source":"Crossref","is-referenced-by-count":113,"title":["Curved-Region-Based Ridge Frequency Estimation and Curved Gabor Filters for Fingerprint Image Enhancement"],"prefix":"10.1109","volume":"21","author":[{"given":"C.","family":"Gottschlich","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/34.990140"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(94)90013-2"},{"key":"ref33","first-page":"238","article-title":"A study of fingerprint image filtering","volume":"3","author":"jiang","year":"2001","journal-title":"Proc Int Conf on Image Process"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00068-4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00218-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/83.841531"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2002.1115299"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2015682"},{"key":"ref35","first-page":"371","article-title":"A Gabor filter-based approach to fingerprint recognition","author":"lee","year":"1999","journal-title":"Proc IEEE Workshop SIPS"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1109\/34.541406","article-title":"Image representation using 2-D Gabor wavelets","volume":"18","author":"lee","year":"1996","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2009.5302660"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICAL.2008.4636164"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227981"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICIECS.2009.5363431"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF02626996"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2009.86"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/34.709565"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ULTSYM.2009.5441467"},{"key":"ref66","first-page":"797","article-title":"Biometric personal identification based on handwriting","author":"zhu","year":"2000","journal-title":"Proc 15th ICPR"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/34.761265"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001406004740"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908228"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/ISPA.2005.195416","article-title":"an enhanced gabor filter-based segmentation algorithm for fingerprint recognition systems","author":"alonso-fernandez","year":"2005","journal-title":"ISPA 2005 the 4th International Symposium on Image and Signal Processing and Analysis 2005 ISPA-05"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.6534","author":"garris","year":"2000","journal-title":"NIST special database 27 Fingerprint minutiae from latent and matching tenprint images"},{"key":"ref22","author":"gottschlich","year":"2010","journal-title":"Fingerprint growth prediction image preprocessing and multi-level judgment aggregation"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2143406"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033219"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2009.5349454"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2005.1527799"},{"key":"ref50","first-page":"266","article-title":"Quality measures for fingerprint images","author":"shen","year":"2001","journal-title":"Proc 3rd AVBPA"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0270(94)00111-S"},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.1117\/12.851411","article-title":"On latent fingerprint enhancement","author":"yoon","year":"2010","journal-title":"Proc SPIEBiometric Technology for Human Identification VII"},{"key":"ref58","first-page":"4649","article-title":"Robust speech feature extraction based on Gabor filtering and tensor factorization","author":"wu","year":"2009","journal-title":"Proc ICASSP"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2005.862571"},{"key":"ref56","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7392","author":"watson","year":"2007","journal-title":"User's Guide to NIST Biometric Image Software (NBIS)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2150216"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1096"},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7151","author":"tabassi","year":"2004","journal-title":"Fingerprint image quality"},{"key":"ref52","author":"spira","year":"2005","journal-title":"Handbook of Geometric Computing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0042-6989(80)90065-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.2.001160"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/29.1644"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/83.753738"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/83.392336"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.4.002379"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.916155"},{"key":"ref18","first-page":"445","article-title":"Theory of communication- Part 3: Frequency compression and expansion","volume":"93","author":"gabor","year":"1946","journal-title":"J Inst Elect Eng Part III Radio Commun"},{"key":"ref19","first-page":"801","article-title":"Information theory in electron microscopy","volume":"14","author":"gabor","year":"1965","journal-title":"Laboratory Investigation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017618"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2009.61"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.903586"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.915524"},{"key":"ref8","first-page":"160","article-title":"Fingerprint quality indexes for predicting authentication performance","author":"chen","year":"2005","journal-title":"Proc AVBPA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2009.5297669"},{"key":"ref49","author":"russ","year":"2000","journal-title":"The Image Processing Handbook"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.036"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00039-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1287\/deca.1080.0119"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/FGR.2006.49"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2009.145"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref41","first-page":"1","article-title":"FVC2004: Third fingerprint verification competition","author":"maio","year":"2004","journal-title":"Proc ICBA"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378660"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2002.1115217"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/83\/6170603\/06035778.pdf?arnumber=6035778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:33Z","timestamp":1633909953000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6035778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":67,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tip.2011.2170696","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4]]}}}