{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:52Z","timestamp":1750308712518,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T00:00:00Z","timestamp":1346889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,6]]},"DOI":"10.1145\/2361407.2361430","type":"proceedings-article","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T13:01:27Z","timestamp":1347454887000},"page":"133-138","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An evaluation of biometric fingerprint matchers in a forensic context using latent impressions"],"prefix":"10.1145","author":[{"given":"Rainer","family":"K\u00e4rgel","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"}]},{"given":"Mario","family":"Hildebrandt","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany"}]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,9,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Biometric SDK 2012. {Online} Available: http:\/\/sourceforge.net\/projects\/biometricsdk.  Biometric SDK 2012. {Online} Available: http:\/\/sourceforge.net\/projects\/biometricsdk."},{"key":"e_1_3_2_1_2_1","unstructured":"Biometric System Laboratory. FVC-onGoing 2012. {Online} Available: https:\/\/biolab.csr.unibo.it \/FVCOnGoing\/UI\/Form\/ Home.aspx.  Biometric System Laboratory. FVC-onGoing 2012. {Online} Available: https:\/\/biolab.csr.unibo.it \/FVCOnGoing\/UI\/Form\/ Home.aspx."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(07)70140-6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2010.10.013"},{"key":"e_1_3_2_1_5_1","volume-title":"National Insitute of Justice","author":"Holder E. H.","year":"2011","unstructured":"E. H. Holder Jr ., L. O. Robinson , and J. H. Laub , editors. The Fingerprint Sourcebook. U.S . National Insitute of Justice , 2011 . E. H. Holder Jr., L. O. Robinson, and J. H. Laub, editors. The Fingerprint Sourcebook. U.S. National Insitute of Justice, 2011."},{"key":"e_1_3_2_1_6_1","volume-title":"ELFT Phase II - An Evaluation of Automated Latent Fingerprint Identification Technologies (NISTIR 7577). Technical report","author":"Indovina M.","year":"2009","unstructured":"M. Indovina , V. Dvornychenco , E. Tabassi , G. Quinn , P. Grother , S. Meagher , and M. Garris . ELFT Phase II - An Evaluation of Automated Latent Fingerprint Identification Technologies (NISTIR 7577). Technical report , National Institute of Standards and Technology (NIST) , 2009 . M. Indovina, V. Dvornychenco, E. Tabassi, G. Quinn, P. Grother, S. Meagher, and M. Garris. ELFT Phase II - An Evaluation of Automated Latent Fingerprint Identification Technologies (NISTIR 7577). Technical report, National Institute of Standards and Technology (NIST), 2009."},{"key":"e_1_3_2_1_7_1","volume-title":"Evaluation 1 (NISTIR 7775). Technical report","author":"Indovina M.","year":"2011","unstructured":"M. Indovina , R. Hicklin , and G. Kiebuzinski . ELFT-EFS: Evaluation of Latent Fingerprint Technologies: Extended Feature Sets , Evaluation 1 (NISTIR 7775). Technical report , National Institute of Standards and Technology (NIST) , 2011 . M. Indovina, R. Hicklin, and G. Kiebuzinski. ELFT-EFS: Evaluation of Latent Fingerprint Technologies: Extended Feature Sets, Evaluation 1 (NISTIR 7775). Technical report, National Institute of Standards and Technology (NIST), 2011."},{"key":"e_1_3_2_1_8_1","volume-title":"IDKit PC SDK","author":"RICS","year":"2012","unstructured":"INNOVAT RICS s.r.o. IDKit PC SDK , 2012 . {Online} Available: http:\/\/www.innovatrics.com\/products\/ fingerprint-identification-sdk. INNOVATRICS s.r.o. IDKit PC SDK, 2012. {Online} Available: http:\/\/www.innovatrics.com\/products\/ fingerprint-identification-sdk."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(99)00108-7"},{"key":"e_1_3_2_1_10_1","volume-title":"Matching algorithm for Fingerprint Verification System","author":"Kulkarni M.","year":"2012","unstructured":"M. Kulkarni . Matching algorithm for Fingerprint Verification System , 2012 . {Online} Available: http:\/\/fvs.sourceforge.net\/Madhav_string.c. M. Kulkarni. Matching algorithm for Fingerprint Verification System, 2012. {Online} Available: http:\/\/fvs.sourceforge.net\/Madhav_string.c."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2011.12.017"},{"key":"e_1_3_2_1_12_1","volume-title":"Advances in Fingerprint Technology. CRC Series in Forensic and Police Science","author":"Lee H. C.","year":"2001","unstructured":"H. C. Lee and R. Gaensslen , editors . Advances in Fingerprint Technology. CRC Series in Forensic and Police Science . CRC Press , second edition, 2001 . H. C. Lee and R. Gaensslen, editors. Advances in Fingerprint Technology. CRC Series in Forensic and Police Science. CRC Press, second edition, 2001."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.990140"},{"key":"e_1_3_2_1_14_1","first-page":"811","volume-title":"FVC2002: Second Fingerprint Verification Competition. In 16th International Conference on Pattern Recognition","volume":"3","author":"Maio D.","year":"2002","unstructured":"D. Maio , D. Maltoni , R. Cappelli , J. Wayman , and A. Jain . FVC2002: Second Fingerprint Verification Competition. In 16th International Conference on Pattern Recognition , vol. 3 , pp. 811 -- 814 , 2002 . D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. Jain. FVC2002: Second Fingerprint Verification Competition. In 16th International Conference on Pattern Recognition, vol. 3, pp. 811--814, 2002."},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"FVC2004: Third Fingerprint Verification Competition. In International Conference on Biometric Authentication","author":"Maio D.","year":"2004","unstructured":"D. Maio , D. Maltoni , R. Cappelli , J. Wayman , and A. Jain . FVC2004: Third Fingerprint Verification Competition. In International Conference on Biometric Authentication , pp. 1 -- 7 , 2004 . D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. Jain. FVC2004: Third Fingerprint Verification Competition. In International Conference on Biometric Authentication , pp. 1--7, 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"Maltoni D.","year":"2009","unstructured":"D. Maltoni , D. Maio , A. K. Jain , and S. Prabhakar . Handbook of Fingerprint Recognition . Springer Publishing Company, Inc orporated, 2nd edition, 2009 . D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar. Handbook of Fingerprint Recognition. Springer Publishing Company, Incorporated, 2nd edition, 2009."},{"key":"e_1_3_2_1_17_1","volume-title":"NIST Biometric Image Software","author":"National Institute of Standards and Technology.","year":"2012","unstructured":"National Institute of Standards and Technology. NIST Biometric Image Software , 2012 . {Online} Available: http:\/\/www.nist.gov\/itl\/iad\/ig\/nbis.cfm. National Institute of Standards and Technology. NIST Biometric Image Software, 2012. {Online} Available: http:\/\/www.nist.gov\/itl\/iad\/ig\/nbis.cfm."},{"key":"e_1_3_2_1_18_1","volume-title":"Fingerprint Verification System","author":"Patel S.","year":"2012","unstructured":"S. Patel . Fingerprint Verification System , 2012 . {Online} Available: http:\/\/fvs.sourceforge.net. S. Patel. Fingerprint Verification System, 2012. {Online} Available: http:\/\/fvs.sourceforge.net."},{"key":"e_1_3_2_1_19_1","unstructured":"Robert Vazan. SourceAFIS 2012. {Online} Available: http:\/\/sourceforge.net\/projects\/sourceafis.  Robert Vazan. SourceAFIS 2012. {Online} Available: http:\/\/sourceforge.net\/projects\/sourceafis."},{"key":"e_1_3_2_1_20_1","volume-title":"September","author":"SWGFAST.","year":"2011","unstructured":"SWGFAST. Standards for examining friction ridge impressions and resulting conclusions (latent\/tenprint) , September 2011 . {Online} Available: http:\/\/www.swgfast.org\/documents\/examinations-conclusions\/111026_Examinatio%ns-Conclusions_1.0.pdf. SWGFAST. Standards for examining friction ridge impressions and resulting conclusions (latent\/tenprint), September 2011. {Online} Available: http:\/\/www.swgfast.org\/documents\/examinations-conclusions\/111026_Examinatio%ns-Conclusions_1.0.pdf."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7151","volume-title":"Fingerprint Image Quality (NISTIR 7151). Technical report","author":"Tabassi E.","year":"2004","unstructured":"E. Tabassi , C. L. Wilson , and C. L. Watson . Fingerprint Image Quality (NISTIR 7151). Technical report , National Institute of Standards and Technology (NIST) , 2004 . E. Tabassi, C. L. Wilson, and C. L. Watson. Fingerprint Image Quality (NISTIR 7151). Technical report, National Institute of Standards and Technology (NIST), 2004."},{"key":"e_1_3_2_1_22_1","volume-title":"June","author":"U.S. Department of Justice","year":"2011","unstructured":"U.S. Department of Justice , Office of the Inspector General Oversight and Review Division. A review of the FBI's progress in responding to the recommendations in the office of the inspector general report on the fingerprint misidentification in the Brandon Mayfield case , June 2011 . {Online} Available: http:\/\/www.justice.gov\/oig\/special\/s1105.pdf. U.S. Department of Justice, Office of the Inspector General Oversight and Review Division. A review of the FBI's progress in responding to the recommendations in the office of the inspector general report on the fingerprint misidentification in the Brandon Mayfield case, June 2011. {Online} Available: http:\/\/www.justice.gov\/oig\/special\/s1105.pdf."},{"key":"e_1_3_2_1_23_1","volume-title":"April","author":"Wood S.","year":"2006","unstructured":"S. Wood , V. Dvornychenko , and M. Garris . Latent test sets: Current inventory , April 2006 . {Online} Available: http:\/\/biometrics.nist.gov\/cs_links\/latent\/workshop06 \/proc\/P26a_S_Wood_ssw_latent_data_v2.pdf. S. Wood, V. Dvornychenko, and M. Garris. Latent test sets: Current inventory, April 2006. {Online} Available: http:\/\/biometrics.nist.gov\/cs_links\/latent\/workshop06 \/proc\/P26a_S_Wood_ssw_latent_data_v2.pdf."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117482"},{"key":"e_1_3_2_1_25_1","volume-title":"Canon EOS 550D - EOS Digital SLR Camera","author":"UK.","year":"2012","unstructured":"Canon UK. Canon EOS 550D - EOS Digital SLR Camera , 2012 . {Online} Available: http:\/\/www.canon.co.uk\/For_Home\/Product_Finder \/Cameras\/Digital_SLR\/EOS_550D\/. Canon UK. Canon EOS 550D - EOS Digital SLR Camera, 2012. {Online} Available: http:\/\/www.canon.co.uk\/For_Home\/Product_Finder \/Cameras\/Digital_SLR\/EOS_550D\/."},{"volume-title":"Cross Match LITE-Xe","year":"2012","key":"e_1_3_2_1_26_1","unstructured":"Cross Match Technologies. Cross Match LITE-Xe , 2012 . {Online} Available: http:\/\/www.crossmatch.com\/products\/pdf\/ LS1%20LITE%20Xe.pdf. Cross Match Technologies. Cross Match LITE-Xe, 2012. {Online} Available: http:\/\/www.crossmatch.com\/products\/pdf\/ LS1%20LITE%20Xe.pdf."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037252.2037254"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.872362"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.59"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2012.05.001"}],"event":{"name":"MM&Sec '12: Multimedia and Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Coventry United Kingdom","acronym":"MM&Sec '12"},"container-title":["Proceedings of the on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2361407.2361430","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2361407.2361430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:15Z","timestamp":1750277655000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2361407.2361430"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,6]]},"references-count":30,"alternative-id":["10.1145\/2361407.2361430","10.1145\/2361407"],"URL":"https:\/\/doi.org\/10.1145\/2361407.2361430","relation":{},"subject":[],"published":{"date-parts":[[2012,9,6]]},"assertion":[{"value":"2012-09-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}