{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:55:14Z","timestamp":1773968114155,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342218","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:20:11Z","timestamp":1524511211000},"page":"1321-1326","source":"Crossref","is-referenced-by-count":9,"title":["Contactless finger and face capturing on a secure handheld embedded device"],"prefix":"10.23919","author":[{"given":"Axel","family":"Weissenfeld","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Strobl","sequence":"additional","affiliation":[]},{"given":"Franz","family":"Daubner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"MobilePass MobilePass is a FP7 research project"},{"key":"ref11","year":"2012","journal-title":"Nist Biometric Image Software"},{"key":"ref12","article-title":"Deficiencies in nist fingerprint image quality algorithm","author":"olsen","year":"2011","journal-title":"Proceedings 12 Deutscher IT-Sicherheitskongress"},{"key":"ref13","first-page":"29","article-title":"Towards improving the nist fingerprint image quality (nfiq) algorithm","author":"merkle","year":"2010","journal-title":"BIOSIG"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699379"},{"key":"ref15","year":"2017","journal-title":"PwC Technical Study on Smart Borders"},{"key":"ref16","first-page":"970","article-title":"Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents","volume":"15","author":"najera","year":"2009","journal-title":"J UCS"},{"key":"ref17","author":"berenguel","year":"2017","journal-title":"e-Counterfeit a mobile-server platform for document counterfeit detection"},{"key":"ref18","first-page":"348","author":"lee","year":"2005","journal-title":"Preprocessing of a Fingerprint Image Captured with a Mobile Camera"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2015.7301751"},{"key":"ref28","article-title":"Secure boot of zynq-7000 all programmable SoC","author":"sanders","year":"2013","journal-title":"Application note XAPP 1175 (v1 0)"},{"key":"ref4","year":"2006","journal-title":"ICAO 9303 Machine Readable Travel Documents Part 1-Machine Readable Passports Volume 2 - Specifications for Electronically Enabled Passports with Biometric Identification Capability"},{"key":"ref27","year":"0","journal-title":"Technical Guideline Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token Publications"},{"key":"ref3","year":"2017"},{"key":"ref6","year":"0","journal-title":"Trusted Platform Module (TPM) Specifications"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1038901"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20901-2_13"},{"key":"ref8","author":"regenscheid","year":"2012","journal-title":"Roots of Trust in Mobile Devices"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2070364.2070383"},{"key":"ref2","year":"2015"},{"key":"ref9","author":"karri","year":"0","journal-title":"Securing the core root of trust (malware counterfeiting and IP theft in hardware)"},{"key":"ref1","year":"0","journal-title":"Ergonomic requirements for office work with visual display terminals (VDTs) &#x2014; Part 11 Guidance on usability"},{"key":"ref20","first-page":"136","author":"derawi","year":"2012","journal-title":"Fingerprint Recognition with Embedded Cameras on Mobile Phone"},{"key":"ref22","first-page":"147","article-title":"A novel method for touch-less fingerprint authentication","author":"ravi","year":"2013","journal-title":"Proc IEEE Technologies for Homeland Security Conf (HST)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2006.345189"},{"key":"ref24","year":"0","journal-title":"Seek Avenger"},{"key":"ref23","year":"0","journal-title":"Security Printing Consulting AG eDocument Reader"},{"key":"ref26","author":"kc","year":"2005","journal-title":"Security and Privacy Issues in Machine Readable Travel Documents (MRTDs)"},{"key":"ref25","year":"0","journal-title":"Innovation and Technology (BMVIT) Modentity KIRAS"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Dresden, Germany","start":{"date-parts":[[2018,3,19]]},"end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342218.pdf?arnumber=8342218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T14:25:02Z","timestamp":1525789502000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342218","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}