{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:17Z","timestamp":1750220597407,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T00:00:00Z","timestamp":1600041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,14]]},"DOI":"10.1145\/3410886.3410893","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T19:46:30Z","timestamp":1599939990000},"page":"51-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Matching Fingerprints with a Toroidal Iterative Closest Point Algorithm"],"prefix":"10.1145","author":[{"given":"Courtney R.","family":"Pitcher","sequence":"first","affiliation":[{"name":"University of Cape Town, South Africa"}]},{"given":"Patrick C.","family":"Marais","sequence":"additional","affiliation":[{"name":"University of Cape Town, South Africa"}]},{"given":"Luke N.","family":"Darlow","sequence":"additional","affiliation":[{"name":"University of Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.121791"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334194"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","doi-asserted-by":"crossref","unstructured":"Raffaele Cappelli. 2015. SFinGe. Springer US Boston MA 1360-1367. https:\/\/doi.org\/10.1007\/978-1-4899-7488-4_8 10.1007\/978-1-4899-7488-4_8","DOI":"10.1007\/978-1-4899-7488-4_8"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"Raffaele Cappelli. 2015. SFinGe. Springer US Boston MA 1360-1367. https:\/\/doi.org\/10.1007\/978-1-4899-7488-4_8","DOI":"10.1007\/978-1-4899-7488-4_8"},{"key":"e_1_3_2_1_4_1","first-page":"9258","article-title":"Efficient internal and surface fingerprint extraction and blending using optical coherence tomography","volume":"54","author":"Darlow Luke\u00a0Nicholas","year":"2015","unstructured":"Luke\u00a0Nicholas Darlow and James Connan . 2015 . Efficient internal and surface fingerprint extraction and blending using optical coherence tomography . Journal of Electronic Imaging 54 , 31 (2015), 9258 \u2013 9268 . Luke\u00a0Nicholas Darlow and James Connan. 2015. Efficient internal and surface fingerprint extraction and blending using optical coherence tomography. Journal of Electronic Imaging 54, 31 (2015), 9258\u20139268.","journal-title":"Journal of Electronic Imaging"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2016.7550045"},{"key":"e_1_3_2_1_6_1","volume-title":"N.Y.) 254, 5035","author":"Huang David","year":"1991","unstructured":"David Huang , Eric\u00a0 A Swanson , Charles\u00a0 P Lin , Joel\u00a0 S Schuman , William\u00a0 G Stinson , Warren Chang , Michael\u00a0 R Hee , Thomas Flotte , Kenton Gregory , and Carmen\u00a0 A Puliafito . 1991. Optical coherence tomography. Science (New York , N.Y.) 254, 5035 ( 1991 ), 1178\u2014-1181. David Huang, Eric\u00a0A Swanson, Charles\u00a0P Lin, Joel\u00a0S Schuman, William\u00a0G Stinson, Warren Chang, Michael\u00a0R Hee, Thomas Flotte, Kenton Gregory, and Carmen\u00a0A Puliafito. 1991. Optical coherence tomography. Science (New York, N.Y.) 254, 5035 (1991), 1178\u2014-1181."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10851-009-0161-2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1364\/BOE.9.001232"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2339818"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660348"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2011.5980567"},{"key":"e_1_3_2_1_12_1","volume-title":"User\u2019s guide to NIST fingerprint image software 2 (NFIS2)","author":"Watson I","year":"2004","unstructured":"Craig\u00a0 I Watson , Michael\u00a0 D Garris , Elham Tabassi , Charles\u00a0 L Wilson , R\u00a0Michael McCabe , and Stanley Janet . 2004. User\u2019s guide to NIST fingerprint image software 2 (NFIS2) . National Institute of Standards and Technology ( 2004 ). Craig\u00a0I Watson, Michael\u00a0D Garris, Elham Tabassi, Charles\u00a0L Wilson, R\u00a0Michael McCabe, and Stanley Janet. 2004. User\u2019s guide to NIST fingerprint image software 2 (NFIS2). National Institute of Standards and Technology (2004)."}],"event":{"name":"SAICSIT '20: Conference of the South African Institute of Computer Scientists and Information Technologists 2020","acronym":"SAICSIT '20","location":"Cape Town South Africa"},"container-title":["Conference of the South African Institute of Computer Scientists and Information Technologists 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410886.3410893","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410886.3410893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:55Z","timestamp":1750195915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410886.3410893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,14]]},"references-count":13,"alternative-id":["10.1145\/3410886.3410893","10.1145\/3410886"],"URL":"https:\/\/doi.org\/10.1145\/3410886.3410893","relation":{},"subject":[],"published":{"date-parts":[[2020,9,14]]},"assertion":[{"value":"2020-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}