{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:41Z","timestamp":1750306301677,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T00:00:00Z","timestamp":1458604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,22]]},"DOI":"10.1145\/2896387.2896434","type":"proceedings-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T13:54:08Z","timestamp":1461333248000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Minutiae Based Latent Fingerprint Recognition System"],"prefix":"10.1145","author":[{"given":"Saad Bin","family":"Ahmed","sequence":"first","affiliation":[{"name":"King Saud bin Abdulaziz University for Health Sciences, Saudi Arabia"}]},{"given":"Muhammad Imran","family":"Razzak","sequence":"additional","affiliation":[{"name":"King Saud bin Abdulaziz University for Health Sciences, Saudi Arabia"}]},{"given":"Bandar","family":"Alhaqbani","sequence":"additional","affiliation":[{"name":"Technology Control Company, Riyadh, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2016,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Javier Galbally Arun Ross Marta Gomez-Barrero Julian Fierrez Javier Ortega-Garcia \"From the Iriscode to the Iris: A New Vulnerability of Iris Recognition Systems\" in 2012  Javier Galbally Arun Ross Marta Gomez-Barrero Julian Fierrez Javier Ortega-Garcia \"From the Iriscode to the Iris: A New Vulnerability of Iris Recognition Systems\" in 2012"},{"issue":"4","key":"e_1_3_2_1_2_1","article-title":"HAND GESTURE RECOGNITION: A LITERATURE REVIEW","volume":"3","author":"Khan Rafiqul Zaman","year":"2012","journal-title":"International Journal of Artificial Intelligence & Applications (IJAIA)"},{"volume-title":"SciTePress","year":"2013","author":"Mu Meiru","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.10.009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.9.7.1827-1832"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70517-8_43"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.01.020"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.20"},{"volume-title":"Fingerprint Recognition Performance Evaluation for Mobile ID Applications, 978-1-4244-7402-8110","year":"2010","author":"Modi Shimon","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-012-0286-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.052"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.08.002"},{"volume-title":"Fuzzy Sets and Systems","year":"2014","author":"Multivariable","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.02.016"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_43"},{"issue":"2","key":"e_1_3_2_1_16_1","article-title":"A Secondary Fingerprint Enhancement and Minutiae Extraction","volume":"3","author":"Rajkumar Raju","year":"2012","journal-title":"Signal & Image Processing: An International Journal (SIPIJ)"},{"issue":"2","key":"e_1_3_2_1_17_1","first-page":"43","volume":"2","author":"Al-Ani Muzhir Shaban","year":"2013","journal-title":"International Journal of Engineering Sciences"},{"volume-title":"IOSR Journal of Electronics and Communication Engineering (IOSRJECE)","year":"2012","author":"Kondreddi Gopi","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"http:\/\/bias.csr.unibo.it\/fvc2002. Fingerprint verification competition 2002  http:\/\/bias.csr.unibo.it\/fvc2002. Fingerprint verification competition 2002"},{"volume-title":"I.J intelligence systems and applications","year":"2012","author":"Kaur Prabbjot","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/320684"},{"volume-title":"Akshay Girdhar and Parvinder S. Sandhu, \"Fingerprint verification system using Minutiae Extraction Technique","year":"2008","author":"Kaur Manvjeet","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Ram P. Krish Julian Fierrez Daniel Ramos Javier Ortega Garcia Josef Bigun \"Pre Registration for Improved Latent Finger print Identification\" Ram P. Krish Julian Fierrez Daniel Ramos Javier Ortega Garcia Josef Bigun \"Pre Registration for Improved Latent Finger print Identification\""},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.03.016"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.73"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.17"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908228"},{"key":"e_1_3_2_1_29_1","unstructured":"Anil K. Jain Jiangjiang Feng Abhishek Nagar Karthik Nandakumar \"On Matching Latent Fingerprints.\"  Anil K. Jain Jiangjiang Feng Abhishek Nagar Karthik Nandakumar \"On Matching Latent Fingerprints.\""},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7377"},{"volume-title":"Automated Fingerprint Identification Systems (AFIS)","year":"2001","author":"Komarinski P.","key":"e_1_3_2_1_31_1"},{"volume-title":"Handbook of Fingerprint Recognition","year":"2003","author":"Maltoni D.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"A. A. Moenssens. Is fingerprint identification a science? Forensic-Evidence.com 1999. http:\/\/forensic-evidence.com\/site\/ID\/ID00004_2.html  A. A. Moenssens. Is fingerprint identification a science? Forensic-Evidence.com 1999. http:\/\/forensic-evidence.com\/site\/ID\/ID00004_2.html"},{"volume-title":"Science","year":"2005","author":"Saks M. J.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7377"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7123"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7377"},{"key":"e_1_3_2_1_38_1","unstructured":"Evaluation of latent fingerprint technologies 2007. http:\/\/fingerprint.nist.gov\/latent\/elft07\/.  Evaluation of latent fingerprint technologies 2007. http:\/\/fingerprint.nist.gov\/latent\/elft07\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_71"},{"volume-title":"Advances in Fingerprint Technology","year":"2001","author":"Gaensslen H.C.","key":"e_1_3_2_1_40_1"},{"volume-title":"Automated Fingerprint Identification Systems (AFIS)","year":"2004","author":"P.","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Soweon Yoon Jiangjiang Feng Anil K. Jain \"On Latent Fingerprint Enhancement\" 2010  Soweon Yoon Jiangjiang Feng Anil K. Jain \"On Latent Fingerprint Enhancement\" 2010","DOI":"10.1117\/12.851411"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.709565"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00186-9"},{"key":"e_1_3_2_1_45_1","unstructured":"Neurotechnology VeriFinger http:\/\/www.neurotechnology.com\/vf_sdk.html.  Neurotechnology VeriFinger http:\/\/www.neurotechnology.com\/vf_sdk.html."},{"key":"e_1_3_2_1_46_1","unstructured":"Anush Sankaran Mayank Vatsa Richa Singh \"Automated Clarity and Quality Assessment for Latent Fingerprints\"  Anush Sankaran Mayank Vatsa Richa Singh \"Automated Clarity and Quality Assessment for Latent Fingerprints\""},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908228"},{"volume-title":"Anisotropic diffusion in image processing","year":"1998","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0032800"},{"key":"e_1_3_2_1_50_1","first-page":"83","volume-title":"Ground truth and evaluation for latent fingerprint matching,\" in IEEE Computer Vision and Pattern Recognition Workshops (CVPRW)","author":"Mikaelyan A.","year":"2012"},{"volume-title":"The nbis-ec software is subject to us export control laws.\" NIST","year":"2007","author":"Watson C.","key":"e_1_3_2_1_51_1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_42"},{"key":"e_1_3_2_1_53_1","unstructured":"Ram P. Krish Julian Fierrez Daniel Ramos Javier Ortega-Garcia Josef Bigun \"Partial Fingerprint Registration for Forensics using Minutiae-Generated Orientation Fields\" 978-1-4799-4370-8\/14 2014 IEEE  Ram P. Krish Julian Fierrez Daniel Ramos Javier Ortega-Garcia Josef Bigun \"Partial Fingerprint Registration for Forensics using Minutiae-Generated Orientation Fields\" 978-1-4799-4370-8\/14 2014 IEEE"},{"volume-title":"US Department of Justice, Office of Justice Programs","year":"2011","author":"Holder E.H.","key":"e_1_3_2_1_54_1"},{"volume-title":"Incorporated","year":"2009","author":"Maltoni D.","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.77"},{"volume-title":"Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision","year":"2005","author":"Bigun J.","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5120\/1285-1706"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239220"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(93)90006-I"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00154-9"},{"volume-title":"IEEE Sixth International Conference on Biometrics Compendium (2013)","author":"Sankaran Anush","key":"e_1_3_2_1_62_1"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117483"},{"key":"e_1_3_2_1_64_1","unstructured":"Michael D. Garris \"Latent Fingerprint Training with NIST Special Database 27 and Universal Latent Workstation\" Michael D. Garris \"Latent Fingerprint Training with NIST Special Database 27 and Universal Latent Workstation\""},{"key":"e_1_3_2_1_65_1","first-page":"6854","article-title":"A Fully Automated Latent Fingerprint Matcher with Embedded Self-learning Segmentation Module","volume":"1406","author":"Xu Jinwei","year":"2014","journal-title":"CoRR"},{"volume-title":"Automatic Fingerprint Matching Using Extended Feature Set","year":"2011","author":"Jain Anil K.","key":"e_1_3_2_1_66_1"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.17"},{"volume-title":"Fingerprint Image Enhancement Method Using Directional Median Filter","year":"2004","author":"Wu Chaohong","key":"e_1_3_2_1_68_1"},{"issue":"1","key":"e_1_3_2_1_69_1","first-page":"340","article-title":"Recognition using extraction of connected boundaries components edge detection","volume":"3","author":"Dakhil Nazera Khalil","year":"2013","journal-title":"Uniascit"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.04.013"}],"event":{"name":"ICC '16: International Conference on Internet of things and Cloud Computing","acronym":"ICC '16","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the International Conference on Internet of things and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896387.2896434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896387.2896434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:18Z","timestamp":1750221558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896387.2896434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,22]]},"references-count":69,"alternative-id":["10.1145\/2896387.2896434","10.1145\/2896387"],"URL":"https:\/\/doi.org\/10.1145\/2896387.2896434","relation":{},"subject":[],"published":{"date-parts":[[2016,3,22]]},"assertion":[{"value":"2016-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}