{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:51:51Z","timestamp":1761663111502,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T00:00:00Z","timestamp":1346889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,6]]},"DOI":"10.1145\/2361407.2361428","type":"proceedings-article","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T13:01:27Z","timestamp":1347454887000},"page":"115-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A methodological framework for investigating age factors on the performance of biometric systems"],"prefix":"10.1145","author":[{"given":"Meryem","family":"Erbilek","sequence":"first","affiliation":[{"name":"School of Engineering and Digital Arts, University of Kent, Canterbury, Kent CT2 7NT, United Kingdom"}]},{"given":"Michael","family":"Fairhurst","sequence":"additional","affiliation":[{"name":"School of Engineering and Digital Arts, University of Kent, Canterbury, Kent CT2 7NT, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2012,9,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.94"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70733"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.924280"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401911"},{"volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing. (April 15-20, 2007). ICASSP 2007.","author":"Metze F.","key":"e_1_3_2_1_5_1"},{"volume-title":"proceedings of the sixth IEEE International Conference on Automatic Face and Gesture Recognition. (May 17-19","year":"2004","author":"Hosoi S.","key":"e_1_3_2_1_6_1"},{"volume-title":"IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. (June 13-18, 2010). CVPRW 2010.","author":"Guodong G.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2010.0165"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.12.008"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi:20070069"},{"volume-title":"2nd IEEE International Conference on Biometrics: Theory, Applications and Systems.","year":"2008","author":"Abreu M.","key":"e_1_3_2_1_11_1"},{"volume-title":"Impact of Age Groups on Fingerprint Recognition Performance. IEEE Workshop on Automatic Identification Advanced Technologies.","year":"2007","author":"Modi S. K.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FGR.2006.78"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Singh R. Vatsa M. Noore A. and Singh S. 2007. Age Transformation for Improving Face Recognition Performance. In Pattern Recognition and Machine Intelligence Ghosh A. De R. and Pal S. Ed. Springer Berlin\/Heidelberg 576--583.   Singh R. Vatsa M. Noore A. and Singh S. 2007. Age Transformation for Improving Face Recognition Performance. In Pattern Recognition and Machine Intelligence Ghosh A. De R. and Pal S. Ed. Springer Berlin\/Heidelberg 576--583.","DOI":"10.1007\/978-3-540-77046-6_71"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ho W. Watters P. and Verity D. 2007. Are Younger People More Difficult to Identify or Just a Peer-to-Peer Effect. In Computer Analysis of Images and Patterns Kropatsch W. Kampel M. and Hanbury A. Ed. Springer Berlin\/Heidelberg 351--359.   Ho W. Watters P. and Verity D. 2007. Are Younger People More Difficult to Identify or Just a Peer-to-Peer Effect. In Computer Analysis of Images and Patterns Kropatsch W. Kampel M. and Hanbury A. Ed. Springer Berlin\/Heidelberg 351--359.","DOI":"10.1007\/978-3-540-74272-2_44"},{"volume-title":"3rd IEEE International Conference on Biometrics: Theory, Applications and Systems.","year":"2009","author":"Yui Man L.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"Ortega-Garcia J. Alonso-Fernandez F. Fierrez-Aguilar J. Garcia-Mateo C. Salicetti S. Allano L. Ly-Van B. and Dorizzi B. 2006. Software tool and acquisition equipment recommendations for the three scenarios considered. Technical Report No. D6.2.1. Contract No. IST-2002-507634.  Ortega-Garcia J. Alonso-Fernandez F. Fierrez-Aguilar J. Garcia-Mateo C. Salicetti S. Allano L. Ly-Van B. and Dorizzi B. 2006. Software tool and acquisition equipment recommendations for the three scenarios considered. Technical Report No. D6.2.1. Contract No. IST-2002-507634."},{"volume-title":"proceedings of the International Conference on Machine Learning and Cybernetics. (August 18-21","year":"2005","author":"Ye S.","key":"e_1_3_2_1_18_1"},{"volume-title":"39th Annual International Carnahan Conference on Security Technology. (2005). CCST '05.","author":"Sickler N. C.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Erbilek M. and Fairhurst M. 2012. A framework for managing ageing effects in signature biometrics. Biometrics IET (2012). (Accepted for publication).  Erbilek M. and Fairhurst M. 2012. A framework for managing ageing effects in signature biometrics. Biometrics IET (2012). (Accepted for publication).","DOI":"10.1049\/iet-bmt.2012.0011"},{"volume-title":"Evaluating Iris Segmentation for Scenario Optimisation. In 4th International Conference on Imaging for Crime Detection and Prevention. (November 3-4","year":"2011","author":"Erbilek M.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Masek L. and Kovesi P. 2003. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns.  Masek L. and Kovesi P. 2003. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Abreu M. and Fairhurst M. 2009. Improving Identity Prediction in Signature-based Unimodal Systems Using Soft Biometrics. In Biometric ID Management and Multimodal Communication Fierrez J. Ortega-Garcia J. Esposito A. Drygajlo A. Faundez-Zanuy M. Ed. Springer Berlin \/ Heidelberg 348--356.   Abreu M. and Fairhurst M. 2009. Improving Identity Prediction in Signature-based Unimodal Systems Using Soft Biometrics. In Biometric ID Management and Multimodal Communication Fierrez J. Ortega-Garcia J. Esposito A. Drygajlo A. Faundez-Zanuy M. Ed. Springer Berlin \/ Heidelberg 348--356.","DOI":"10.1007\/978-3-642-04391-8_45"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.506415"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.05.005"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Spearman C. 1904. The Proof and Measurement of Association between Two Things. The American journal of psychology 15 (1904) 72--101.  Spearman C. 1904. The Proof and Measurement of Association between Two Things. The American journal of psychology 15 (1904) 72--101.","DOI":"10.2307\/1412159"}],"event":{"name":"MM&Sec '12: Multimedia and Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Coventry United Kingdom","acronym":"MM&Sec '12"},"container-title":["Proceedings of the on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2361407.2361428","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2361407.2361428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:15Z","timestamp":1750277655000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2361407.2361428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,6]]},"references-count":26,"alternative-id":["10.1145\/2361407.2361428","10.1145\/2361407"],"URL":"https:\/\/doi.org\/10.1145\/2361407.2361428","relation":{},"subject":[],"published":{"date-parts":[[2012,9,6]]},"assertion":[{"value":"2012-09-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}