{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:41:28Z","timestamp":1729640488897,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/ccst.2015.7389691","type":"proceedings-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T16:35:32Z","timestamp":1453739732000},"page":"253-258","source":"Crossref","is-referenced-by-count":12,"title":["Earprint recognition based on an ensemble of global and local features"],"prefix":"10.1109","author":[{"given":"Aythami","family":"Morales","sequence":"first","affiliation":[]},{"given":"Moises","family":"Diaz","sequence":"additional","affiliation":[]},{"given":"Gloria","family":"Llinas-Sanchez","sequence":"additional","affiliation":[]},{"given":"Miguel A.","family":"Ferrer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"145","volume":"166","author":"alberink","year":"2007","journal-title":"Performance of the FearlD earprint identification system Forensic Sci Int"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1385\/FSMP:2:1:39"},{"key":"ref12","first-page":"91","volume":"140","author":"meijerman","year":"2004","journal-title":"Exploratory study on classification and individualization of earprints Forensic Sci Int"},{"journal-title":"Operating Procedure for the Taking of Earprints Internal FearID Report","year":"2003","author":"johnson","key":"ref13"},{"journal-title":"Universidad Autonoma de Madrid","article-title":"Forensic Evaluation of the Evidence Using Automatic Speaker Recognition Systems","year":"2007","author":"ramos","key":"ref14"},{"journal-title":"NISTIR 7377","article-title":"Summary of NIST Latent Fingerprint Testing Workshop","year":"2006","author":"dvornychenko","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/83.650848"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","article-title":"A threshold selection method from gray-level histograms","volume":"9","author":"otsu","year":"1979","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref19","first-page":"171","article-title":"Analysis of local descriptors features and its robustness applied to ear recognition","author":"aythami","year":"2013","journal-title":"IEEE International Carnahan Conference on Security Technology"},{"journal-title":"Ear Identification (Forensic Identification Series ed )","year":"1989","author":"lannarelli","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.242"},{"journal-title":"Court of Appeals of Washington Division 2 97 Wash App 832988","year":"1999","author":"david","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2012.05.021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2003.10.024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1520\/JFS15146J"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.59"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9_21"},{"key":"ref9","first-page":"335","article-title":"Could earprint identification be computerised?","volume":"119","author":"rutty","year":"2005","journal-title":"An illustrated proof of concept paper Int J Legal Med"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412621"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1556-4029.2008.00663.x"}],"event":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2015,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2015,9,24]]}},"container-title":["2015 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7369421\/7389647\/07389691.pdf?arnumber=7389691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:30:19Z","timestamp":1498264219000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7389691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ccst.2015.7389691","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}