{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T07:14:33Z","timestamp":1722842073734},"reference-count":29,"publisher":"World Scientific Pub Co Pte Lt","issue":"05","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Wavelets Multiresolut Inf. Process."],"published-print":{"date-parts":[[2013,9]]},"abstract":" Over the past decade, there have been dramatic increases in the usage of mobile phones in the world. Currently available smart mobile phones are capable of storing enormous amounts of personal information\/data. The smart mobile phone is also capable of connecting to other devices, with the help of different applications. Consequently, with these connections comes the requirement of security to protect personal information. Nowadays, in many applications, a biometric fingerprint recognition system has been embedded as a primary security measure. To enable a biometric fingerprint recognition system in smart mobile phones, without any additional costs, a built-in high performance camera can be utilized. The camera can capture the fingerprint image and generate biometric traits that qualify the biometric fingerprint authentication approach. However, the images acquired by a mobile phone are entirely different from the images obtained by dedicated fingerprint sensors. In this paper, we present the current trend in biometric fingerprint authentication techniques using mobile phones and explore some of the future possibilities in this field. <\/jats:p>","DOI":"10.1142\/s0219691313500331","type":"journal-article","created":{"date-parts":[[2013,7,15]],"date-time":"2013-07-15T01:43:57Z","timestamp":1373852637000},"page":"1350033","source":"Crossref","is-referenced-by-count":5,"title":["AUTHENTICATION OF FINGERPRINT BIOMETRICS ACQUIRED USING A CELLPHONE CAMERA: A REVIEW"],"prefix":"10.1142","volume":"11","author":[{"given":"MOHAMMED S.","family":"KHALIL","sequence":"first","affiliation":[{"name":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"}]},{"given":"FAJRI","family":"KURNIAWAN","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"}]},{"given":"KASHIF","family":"SALEEM","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"219","published-online":{"date-parts":[[2013,9,30]]},"reference":[{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2009.12.003"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1109\/34.709565"},{"key":"rf12","doi-asserted-by":"publisher","DOI":"10.1109\/5.628674"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(87)90043-0"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(84)90079-7"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2009.12.002"},{"key":"rf18","first-page":"352","volume":"5","author":"Khalil M. S.","year":"2010","journal-title":"Int. J. Physical Sciences"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.908869"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_47"},{"key":"rf23","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990213"},{"key":"rf25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.31"},{"key":"rf26","volume-title":"Handbook of Fingerprint Recognition","author":"Maltoni D.","year":"2003"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211936"},{"key":"rf28","doi-asserted-by":"publisher","DOI":"10.1049\/el:20052577"},{"key":"rf30","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00039-3"},{"key":"rf31","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(11)70170-9"},{"key":"rf33","doi-asserted-by":"publisher","DOI":"10.1002\/sca.4950280601"},{"key":"rf34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.10.021"},{"key":"rf35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-385-3_4"},{"key":"rf39","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.19.001286"},{"key":"rf40","doi-asserted-by":"publisher","DOI":"10.1109\/34.761261"},{"key":"rf41","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00039-3"},{"key":"rf42","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00054-2"},{"key":"rf43","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00161-3"},{"key":"rf46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1217604"},{"key":"rf48","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"rf49","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00036-5"},{"key":"rf52","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(03)00137-9"}],"container-title":["International Journal of Wavelets, Multiresolution and Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219691313500331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T12:33:43Z","timestamp":1565094823000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219691313500331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":29,"journal-issue":{"issue":"05","published-online":{"date-parts":[[2013,9,30]]},"published-print":{"date-parts":[[2013,9]]}},"alternative-id":["10.1142\/S0219691313500331"],"URL":"https:\/\/doi.org\/10.1142\/s0219691313500331","relation":{},"ISSN":["0219-6913","1793-690X"],"issn-type":[{"value":"0219-6913","type":"print"},{"value":"1793-690X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9]]}}}