callback( { "result":{ "query":":facetid:toc:\"db/journals/iet-bmt/iet-bmt5.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"83.65" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"34", "@dc":"34", "@oc":"34", "@id":"43454364", "text":":facetid:toc:db/journals/iet-bmt/iet-bmt5.bht" } }, "hits":{ "@total":"34", "@computed":"34", "@sent":"34", "@first":"0", "hit":[{ "@score":"1", "@id":"3117724", "info":{"authors":{"author":[{"@pid":"153/2899","text":"Sherif N. Abbas 0001"},{"@pid":"82/3660","text":"Mohammed Abo-Zahhad"},{"@pid":"04/8905","text":"Sabah M. Ahmed"},{"@pid":"60/10836","text":"Mohammed Farrag"}]},"title":"Heart-ID: human identity recognition using heart sounds based on modifying mel-frequency cepstral features.","venue":"IET Biom.","volume":"5","number":"4","pages":"284-296","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/AbbasAAF16","doi":"10.1049/IET-BMT.2015.0033","ee":"https://doi.org/10.1049/iet-bmt.2015.0033","url":"https://dblp.org/rec/journals/iet-bmt/AbbasAAF16"}, "url":"URL#3117724" }, { "@score":"1", "@id":"3117725", "info":{"authors":{"author":[{"@pid":"141/8011","text":"Arwa Alsultan"},{"@pid":"04/2872","text":"Kevin Warwick"},{"@pid":"22/441","text":"Hong Wei"}]},"title":"Free-text keystroke dynamics authentication for Arabic language.","venue":"IET Biom.","volume":"5","number":"3","pages":"164-169","year":"2016","type":"Journal Articles","access":"open","key":"journals/iet-bmt/AlsultanWW16","doi":"10.1049/IET-BMT.2015.0101","ee":"https://doi.org/10.1049/iet-bmt.2015.0101","url":"https://dblp.org/rec/journals/iet-bmt/AlsultanWW16"}, "url":"URL#3117725" }, { "@score":"1", "@id":"3117726", "info":{"authors":{"author":[{"@pid":"140/1324","text":"Chris van Dam"},{"@pid":"98/5726","text":"Raymond N. J. Veldhuis"},{"@pid":"91/3259","text":"Luuk J. Spreeuwers"}]},"title":"Face reconstruction from image sequences for forensic face comparison.","venue":"IET Biom.","volume":"5","number":"2","pages":"140-146","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/DamVS16","doi":"10.1049/IET-BMT.2015.0036","ee":"https://doi.org/10.1049/iet-bmt.2015.0036","url":"https://dblp.org/rec/journals/iet-bmt/DamVS16"}, "url":"URL#3117726" }, { "@score":"1", "@id":"3117727", "info":{"authors":{"author":[{"@pid":"d/TranKhanhDang","text":"Tran Khanh Dang"},{"@pid":"152/8373","text":"Minh Tan Nguyen"},{"@pid":"152/8439","text":"Quang Hai Truong"}]},"title":"Chaff point generation mechanism for improving fuzzy vault security.","venue":"IET Biom.","volume":"5","number":"2","pages":"147-153","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/DangNT16","doi":"10.1049/IET-BMT.2015.0023","ee":"https://doi.org/10.1049/iet-bmt.2015.0023","url":"https://dblp.org/rec/journals/iet-bmt/DangNT16"}, "url":"URL#3117727" }, { "@score":"1", "@id":"3117728", "info":{"authors":{"author":[{"@pid":"d/TranKhanhDang","text":"Tran Khanh Dang"},{"@pid":"79/7990","text":"Quynh Chi Truong"},{"@pid":"124/2892","text":"Thu Thi Bao Le"},{"@pid":"152/8439","text":"Quang Hai Truong"}]},"title":"Cancellable fuzzy vault with periodic transformation for biometric template protection.","venue":"IET Biom.","volume":"5","number":"3","pages":"229-235","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/DangTLT16","doi":"10.1049/IET-BMT.2015.0029","ee":"https://doi.org/10.1049/iet-bmt.2015.0029","url":"https://dblp.org/rec/journals/iet-bmt/DangTLT16"}, "url":"URL#3117728" }, { "@score":"1", "@id":"3117729", "info":{"authors":{"author":[{"@pid":"73/1871-1","text":"Abhijit Das 0001"},{"@pid":"f/MiguelAFerrer","text":"Miguel A. Ferrer"},{"@pid":"p/UmapadaPal","text":"Umapada Pal 0001"},{"@pid":"58/5219","text":"Srikanta Pal"},{"@pid":"76/7430","text":"Moisés Díaz Cabrera"},{"@pid":"45/1824","text":"Michael Blumenstein"}]},"title":"Multi-script versus single-script scenarios in automatic off-line signature verification.","venue":"IET Biom.","volume":"5","number":"4","pages":"305-313","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/DasFPPCB16","doi":"10.1049/IET-BMT.2016.0010","ee":"https://doi.org/10.1049/iet-bmt.2016.0010","url":"https://dblp.org/rec/journals/iet-bmt/DasFPPCB16"}, "url":"URL#3117729" }, { "@score":"1", "@id":"3117730", "info":{"authors":{"author":[{"@pid":"82/5600","text":"John Daugman"},{"@pid":"04/4242","text":"Cathryn Downing"}]},"title":"Searching for doppelgängers: assessing the universality of the IrisCode impostors distribution.","venue":"IET Biom.","volume":"5","number":"2","pages":"65-75","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/DaugmanD16","doi":"10.1049/IET-BMT.2015.0071","ee":"https://doi.org/10.1049/iet-bmt.2015.0071","url":"https://dblp.org/rec/journals/iet-bmt/DaugmanD16"}, "url":"URL#3117730" }, { "@score":"1", "@id":"3117731", "info":{"authors":{"author":[{"@pid":"214/7082","text":"Shubhada P. Deshmukh"},{"@pid":"177/7315","text":"Manasi Patwardhan 0001"},{"@pid":"143/7571","text":"Anjali R. Mahajan"}]},"title":"Survey on real-time facial expression recognition techniques.","venue":"IET Biom.","volume":"5","number":"3","pages":"155-163","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/DeshmukhPM16","doi":"10.1049/IET-BMT.2014.0104","ee":"https://doi.org/10.1049/iet-bmt.2014.0104","url":"https://dblp.org/rec/journals/iet-bmt/DeshmukhPM16"}, "url":"URL#3117731" }, { "@score":"1", "@id":"3117732", "info":{"authors":{"author":[{"@pid":"32/1836","text":"Belen Fernandez-Saavedra"},{"@pid":"56/5880","text":"Raul Sánchez-Reillo"},{"@pid":"177/6102","text":"Rodrigo Ros-Gomez"},{"@pid":"00/5438","text":"Judith Liu-Jimenez"}]},"title":"Small fingerprint scanners used in mobile devices: the impact on biometric performance.","venue":"IET Biom.","volume":"5","number":"1","pages":"28-36","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/Fernandez-Saavedra16","doi":"10.1049/IET-BMT.2015.0018","ee":"https://doi.org/10.1049/iet-bmt.2015.0018","url":"https://dblp.org/rec/journals/iet-bmt/Fernandez-Saavedra16"}, "url":"URL#3117732" }, { "@score":"1", "@id":"3117733", "info":{"authors":{"author":[{"@pid":"184/7091","text":"Rebecca Frimenko"},{"@pid":"162/8529","text":"Dustin A. Bruening"},{"@pid":"95/7986","text":"Charles D. Goodyear"},{"@pid":"145/3424","text":"David R. Bowden"}]},"title":"Predictive ability of anthropomorphic metrics in determining age and sex of children.","venue":"IET Biom.","volume":"5","number":"3","pages":"181-189","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/FrimenkoBGB16","doi":"10.1049/IET-BMT.2014.0103","ee":"https://doi.org/10.1049/iet-bmt.2014.0103","url":"https://dblp.org/rec/journals/iet-bmt/FrimenkoBGB16"}, "url":"URL#3117733" }, { "@score":"1", "@id":"3117734", "info":{"authors":{"author":[{"@pid":"65/4613","text":"Javier Galbally"},{"@pid":"38/9672","text":"Riccardo Satta"}]},"title":"Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models.","venue":"IET Biom.","volume":"5","number":"2","pages":"83-91","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/GalballyS16","doi":"10.1049/IET-BMT.2014.0075","ee":"https://doi.org/10.1049/iet-bmt.2014.0075","url":"https://dblp.org/rec/journals/iet-bmt/GalballyS16"}, "url":"URL#3117734" }, { "@score":"1", "@id":"3117735", "info":{"authors":{"author":{"@pid":"61/257","text":"Mihai Gavrilescu"}},"title":"Study on using individual differences in facial expressions for a face recognition system immune to spoofing attacks.","venue":"IET Biom.","volume":"5","number":"3","pages":"236-242","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/Gavrilescu16","doi":"10.1049/IET-BMT.2015.0078","ee":"https://doi.org/10.1049/iet-bmt.2015.0078","url":"https://dblp.org/rec/journals/iet-bmt/Gavrilescu16"}, "url":"URL#3117735" }, { "@score":"1", "@id":"3117736", "info":{"authors":{"author":[{"@pid":"177/6141","text":"Vikas Gottemukkula"},{"@pid":"171/7555","text":"Sashi K. Saripalle"},{"@pid":"69/8582","text":"Sriram Pavan K. Tankasala"},{"@pid":"37/4346","text":"Reza Derakhshani"}]},"title":"Method for using visible ocular vasculature for mobile biometrics.","venue":"IET Biom.","volume":"5","number":"1","pages":"3-12","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/GottemukkulaSTD16","doi":"10.1049/IET-BMT.2014.0059","ee":"https://doi.org/10.1049/iet-bmt.2014.0059","url":"https://dblp.org/rec/journals/iet-bmt/GottemukkulaSTD16"}, "url":"URL#3117736" }, { "@score":"1", "@id":"3117737", "info":{"authors":{"author":[{"@pid":"92/4520","text":"Guodong Guo"},{"@pid":"w/HarryWechsler","text":"Harry Wechsler"},{"@pid":"s/ShiguangShan","text":"Shiguang Shan"},{"@pid":"20/5435","text":"Norman Poh"}]},"title":"Guest EditorialSpecial Issue on Mobile Biometrics.","venue":"IET Biom.","volume":"5","number":"1","pages":"1-2","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/GuoWSP16","doi":"10.1049/IET-BMT.2016.0011","ee":"https://doi.org/10.1049/iet-bmt.2016.0011","url":"https://dblp.org/rec/journals/iet-bmt/GuoWSP16"}, "url":"URL#3117737" }, { "@score":"1", "@id":"3117738", "info":{"authors":{"author":[{"@pid":"184/7015","text":"Toufik Hafs"},{"@pid":"143/2642","text":"Layachi Bennacer"},{"@pid":"184/6992","text":"Mohamed Boughazi"},{"@pid":"87/1590","text":"Amine Naït-Ali"}]},"title":"Empirical mode decomposition for online handwritten signature verification.","venue":"IET Biom.","volume":"5","number":"3","pages":"190-199","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/HafsBBN16","doi":"10.1049/IET-BMT.2014.0041","ee":"https://doi.org/10.1049/iet-bmt.2014.0041","url":"https://dblp.org/rec/journals/iet-bmt/HafsBBN16"}, "url":"URL#3117738" }, { "@score":"1", "@id":"3117739", "info":{"authors":{"author":[{"@pid":"03/2985","text":"Heinz Hofbauer"},{"@pid":"73/5267","text":"Fernando Alonso-Fernandez"},{"@pid":"86/1508","text":"Josef Bigün"},{"@pid":"u/AndreasUhl","text":"Andreas Uhl"}]},"title":"Experimental analysis regarding the influence of iris segmentation on the recognition rate.","venue":"IET Biom.","volume":"5","number":"3","pages":"200-211","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/HofbauerABU16","doi":"10.1049/IET-BMT.2015.0069","ee":"https://doi.org/10.1049/iet-bmt.2015.0069","url":"https://dblp.org/rec/journals/iet-bmt/HofbauerABU16"}, "url":"URL#3117739" }, { "@score":"1", "@id":"3117740", "info":{"authors":{"author":[{"@pid":"180/4709","text":"Yang Hui-xian"},{"@pid":"180/4707","text":"Cai Yong-yong"}]},"title":"Adaptively weighted orthogonal gradient binary pattern for single sample face recognition under varying illumination.","venue":"IET Biom.","volume":"5","number":"2","pages":"76-82","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/Hui-xianY16","doi":"10.1049/IET-BMT.2014.0082","ee":"https://doi.org/10.1049/iet-bmt.2014.0082","url":"https://dblp.org/rec/journals/iet-bmt/Hui-xianY16"}, "url":"URL#3117740" }, { "@score":"1", "@id":"3117741", "info":{"authors":{"author":[{"@pid":"53/2571","text":"Chuang Lin"},{"@pid":"123/7149","text":"Binghui Wang"},{"@pid":"87/3021-1","text":"Xin Fan 0001"},{"@pid":"51/5224","text":"Yanchun Ma"},{"@pid":"164/5901","text":"Huiyun Liu"}]},"title":"Orthogonal enhanced linear discriminant analysis for face recognition.","venue":"IET Biom.","volume":"5","number":"2","pages":"100-110","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/LinWFML16","doi":"10.1049/IET-BMT.2014.0086","ee":"https://doi.org/10.1049/iet-bmt.2014.0086","url":"https://dblp.org/rec/journals/iet-bmt/LinWFML16"}, "url":"URL#3117741" }, { "@score":"1", "@id":"3117742", "info":{"authors":{"author":[{"@pid":"15/8984","text":"Zahid Mahmood"},{"@pid":"143/2952","text":"Tauseef Ali"},{"@pid":"k/SameeUllahKhan","text":"Samee U. Khan"}]},"title":"Effects of pose and image resolution on automatic face recognition.","venue":"IET Biom.","volume":"5","number":"2","pages":"111-119","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/MahmoodAK16","doi":"10.1049/IET-BMT.2015.0008","ee":"https://doi.org/10.1049/iet-bmt.2015.0008","url":"https://dblp.org/rec/journals/iet-bmt/MahmoodAK16"}, "url":"URL#3117742" }, { "@score":"1", "@id":"3117743", "info":{"authors":{"author":[{"@pid":"180/7343","text":"Daniel Martinho-Corbishley"},{"@pid":"n/MarkSNixon","text":"Mark S. Nixon"},{"@pid":"65/3587","text":"John N. Carter"}]},"title":"Analysing comparative soft biometrics from crowdsourced annotations.","venue":"IET Biom.","volume":"5","number":"4","pages":"276-283","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/Martinho-Corbishley16","doi":"10.1049/IET-BMT.2015.0118","ee":"https://doi.org/10.1049/iet-bmt.2015.0118","url":"https://dblp.org/rec/journals/iet-bmt/Martinho-Corbishley16"}, "url":"URL#3117743" }, { "@score":"1", "@id":"3117744", "info":{"authors":{"author":[{"@pid":"43/8454","text":"Martin Aastrup Olsen"},{"@pid":"180/4679","text":"Vladimír Smida"},{"@pid":"49/6273","text":"Christoph Busch 0001"}]},"title":"Finger image quality assessment features - definitions and evaluation.","venue":"IET Biom.","volume":"5","number":"2","pages":"47-64","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/OlsenSB16","doi":"10.1049/IET-BMT.2014.0055","ee":"https://doi.org/10.1049/iet-bmt.2014.0055","url":"https://dblp.org/rec/journals/iet-bmt/OlsenSB16"}, "url":"URL#3117744" }, { "@score":"1", "@id":"3117745", "info":{"authors":{"author":[{"@pid":"09/6492","text":"Estefan Ortiz"},{"@pid":"b/KevinWBowyer","text":"Kevin W. Bowyer"},{"@pid":"45/2338","text":"Patrick J. Flynn"}]},"title":"Dilation-aware enrolment for iris recognition.","venue":"IET Biom.","volume":"5","number":"2","pages":"92-99","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/OrtizBF16","doi":"10.1049/IET-BMT.2015.0005","ee":"https://doi.org/10.1049/iet-bmt.2015.0005","url":"https://dblp.org/rec/journals/iet-bmt/OrtizBF16"}, "url":"URL#3117745" }, { "@score":"1", "@id":"3117746", "info":{"authors":{"author":[{"@pid":"73/10369","text":"Gabriel Panis"},{"@pid":"09/3834","text":"Andreas Lanitis"},{"@pid":"42/5391","text":"Nicolas Tsapatsoulis"},{"@pid":"22/4959","text":"Timothy F. Cootes"}]},"title":"Overview of research on facial ageing using the FG-NET ageing database.","venue":"IET Biom.","volume":"5","number":"2","pages":"37-46","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/PanisLTC16","doi":"10.1049/IET-BMT.2014.0053","ee":"https://doi.org/10.1049/iet-bmt.2014.0053","url":"https://dblp.org/rec/journals/iet-bmt/PanisLTC16"}, "url":"URL#3117746" }, { "@score":"1", "@id":"3117747", "info":{"authors":{"author":[{"@pid":"20/5435","text":"Norman Poh"},{"@pid":"140/1317","text":"Ramon Blanco-Gonzalo"},{"@pid":"04/4177","text":"Rita Wong"},{"@pid":"56/5880","text":"Raul Sánchez-Reillo"}]},"title":"Blind subjects faces database.","venue":"IET Biom.","volume":"5","number":"1","pages":"20-27","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/PohBWS16","doi":"10.1049/IET-BMT.2015.0016","ee":"https://doi.org/10.1049/iet-bmt.2015.0016","url":"https://dblp.org/rec/journals/iet-bmt/PohBWS16"}, "url":"URL#3117747" }, { "@score":"1", "@id":"3117748", "info":{"authors":{"author":[{"@pid":"145/7653","text":"Arnaud Polette"},{"@pid":"43/5824","text":"Jean-Luc Mari"},{"@pid":"145/7606","text":"Isabelle Brunette"},{"@pid":"07/5898","text":"Jean Meunier"}]},"title":"Comparison of quasi-spherical surfaces - application to corneal biometry.","venue":"IET Biom.","volume":"5","number":"3","pages":"212-219","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/PoletteMBM16","doi":"10.1049/IET-BMT.2015.0048","ee":"https://doi.org/10.1049/iet-bmt.2015.0048","url":"https://dblp.org/rec/journals/iet-bmt/PoletteMBM16"}, "url":"URL#3117748" }, { "@score":"1", "@id":"3117749", "info":{"authors":{"author":[{"@pid":"78/3731","text":"Christian Rathgeb"},{"@pid":"13/10984","text":"Anika Pflug"},{"@pid":"45/4755-2","text":"Johannes Wagner 0002"},{"@pid":"49/6273","text":"Christoph Busch 0001"}]},"title":"Effects of image compression on ear biometrics.","venue":"IET Biom.","volume":"5","number":"3","pages":"252-261","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/RathgebPWB16","doi":"10.1049/IET-BMT.2015.0098","ee":"https://doi.org/10.1049/iet-bmt.2015.0098","url":"https://dblp.org/rec/journals/iet-bmt/RathgebPWB16"}, "url":"URL#3117749" }, { "@score":"1", "@id":"3117750", "info":{"authors":{"author":[{"@pid":"180/6597","text":"Debanjan Sadhya"},{"@pid":"11/4030","text":"Sanjay Kumar Singh"},{"@pid":"190/4824","text":"Bodhi Chakraborty"}]},"title":"Review of key-binding-based biometric data protection schemes.","venue":"IET Biom.","volume":"5","number":"4","pages":"263-275","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/SadhyaSC16","doi":"10.1049/IET-BMT.2015.0035","ee":"https://doi.org/10.1049/iet-bmt.2015.0035","url":"https://dblp.org/rec/journals/iet-bmt/SadhyaSC16"}, "url":"URL#3117750" }, { "@score":"1", "@id":"3117751", "info":{"authors":{"author":[{"@pid":"164/9139","text":"Mulagala Sandhya"},{"@pid":"44/57","text":"Munaga V. N. K. Prasad"},{"@pid":"07/5281-1","text":"Chillarige Raghavendra Rao"}]},"title":"Generating cancellable fingerprint templates based on Delaunay triangle feature set construction.","venue":"IET Biom.","volume":"5","number":"2","pages":"131-139","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/SandhyaPR16","doi":"10.1049/IET-BMT.2015.0034","ee":"https://doi.org/10.1049/iet-bmt.2015.0034","url":"https://dblp.org/rec/journals/iet-bmt/SandhyaPR16"}, "url":"URL#3117751" }, { "@score":"1", "@id":"3117752", "info":{"authors":{"author":[{"@pid":"169/0759","text":"Marc Oliu Simon"},{"@pid":"169/9110","text":"Ciprian A. Corneanu"},{"@pid":"02/4861","text":"Kamal Nasrollahi"},{"@pid":"60/9070","text":"Olegs Nikisins"},{"@pid":"77/5527","text":"Sergio Escalera"},{"@pid":"03/3647","text":"Yunlian Sun"},{"@pid":"40/1861","text":"Haiqing Li"},{"@pid":"13/5916","text":"Zhenan Sun"},{"@pid":"12/6781","text":"Thomas B. Moeslund"},{"@pid":"58/7267","text":"Modris Greitans"}]},"title":"Improved RGB-D-T based face recognition.","venue":"IET Biom.","volume":"5","number":"4","pages":"297-303","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/SimonCNNESLSMG16","doi":"10.1049/IET-BMT.2015.0057","ee":"https://doi.org/10.1049/iet-bmt.2015.0057","url":"https://dblp.org/rec/journals/iet-bmt/SimonCNNESLSMG16"}, "url":"URL#3117752" }, { "@score":"1", "@id":"3117753", "info":{"authors":{"author":{"@pid":"42/7850","text":"Benjamin Tams"}},"title":"Unlinkable minutiae-based fuzzy vault for multiple fingerprints.","venue":"IET Biom.","volume":"5","number":"3","pages":"170-180","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/Tams16","doi":"10.1049/IET-BMT.2014.0093","ee":"https://doi.org/10.1049/iet-bmt.2014.0093","url":"https://dblp.org/rec/journals/iet-bmt/Tams16"}, "url":"URL#3117753" }, { "@score":"1", "@id":"3117754", "info":{"authors":{"author":[{"@pid":"184/7060","text":"Mayada Tarek"},{"@pid":"03/8618","text":"Osama Ouda"},{"@pid":"56/9671","text":"Taher Hamza"}]},"title":"Robust cancellable biometrics scheme based on neural networks.","venue":"IET Biom.","volume":"5","number":"3","pages":"220-228","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/TarekOH16","doi":"10.1049/IET-BMT.2015.0045","ee":"https://doi.org/10.1049/iet-bmt.2015.0045","url":"https://dblp.org/rec/journals/iet-bmt/TarekOH16"}, "url":"URL#3117754" }, { "@score":"1", "@id":"3117755", "info":{"authors":{"author":[{"@pid":"157/8238","text":"Duy Hoang Thai"},{"@pid":"08/8398","text":"Carsten Gottschlich"}]},"title":"Global variational method for fingerprint segmentation by three-part decomposition.","venue":"IET Biom.","volume":"5","number":"2","pages":"120-130","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/ThaiG16","doi":"10.1049/IET-BMT.2015.0010","ee":"https://doi.org/10.1049/iet-bmt.2015.0010","url":"https://dblp.org/rec/journals/iet-bmt/ThaiG16"}, "url":"URL#3117755" }, { "@score":"1", "@id":"3117756", "info":{"authors":{"author":[{"@pid":"132/6246","text":"Zhigang Yao"},{"@pid":"73/4207","text":"Jean-Marie Le Bars"},{"@pid":"22/1188","text":"Christophe Charrier"},{"@pid":"r/ChristopheRosenberger","text":"Christophe Rosenberger"}]},"title":"Literature review of fingerprint quality assessment and its evaluation.","venue":"IET Biom.","volume":"5","number":"3","pages":"243-251","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/YaoBCR16","doi":"10.1049/IET-BMT.2015.0027","ee":"https://doi.org/10.1049/iet-bmt.2015.0027","url":"https://dblp.org/rec/journals/iet-bmt/YaoBCR16"}, "url":"URL#3117756" }, { "@score":"1", "@id":"3117757", "info":{"authors":{"author":[{"@pid":"137/9850","text":"Farhana Javed Zareen"},{"@pid":"21/5608","text":"Suraiya Jabin"}]},"title":"Authentic mobile-biometric signature verification system.","venue":"IET Biom.","volume":"5","number":"1","pages":"13-19","year":"2016","type":"Journal Articles","access":"closed","key":"journals/iet-bmt/ZareenJ16","doi":"10.1049/IET-BMT.2015.0017","ee":"https://doi.org/10.1049/iet-bmt.2015.0017","url":"https://dblp.org/rec/journals/iet-bmt/ZareenJ16"}, "url":"URL#3117757" } ] } } } )