{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:14:33Z","timestamp":1730326473421,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","funder":[{"name":"Spanish Centre for the Development of Industrial Technology (CDTI) under the project \u00c9GIDA","award":["EXP 00122721 \/ CER-20191012"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,27]]},"DOI":"10.1145\/3571697.3571708","type":"proceedings-article","created":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T23:09:46Z","timestamp":1675724986000},"page":"80-88","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Verification system based on long-range iris and Graph Siamese Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1733-5515","authenticated-orcid":false,"given":"Francesco","family":"Zola","sequence":"first","affiliation":[{"name":"Digital Security Department, Vicomtech Foundation, Spain and Department Forensic and Biometric Traces, Netherlands Forensic Institute (NFI), Netherlands"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7574-7123","authenticated-orcid":false,"given":"Jose Alvaro","family":"Fernandez-Carrasco","sequence":"additional","affiliation":[{"name":"Digital Security Department, Vicomtech Foundation, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5774-1593","authenticated-orcid":false,"given":"Jan Lukas","family":"Bruse","sequence":"additional","affiliation":[{"name":"Data Intelligence for Industry Department, Vicomtech Foundation, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2865-6549","authenticated-orcid":false,"given":"Mikel","family":"Galar","sequence":"additional","affiliation":[{"name":"Department of Statistics, Computer Science and Mathematics, Public University of Navarre (UPNA), Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5912-5295","authenticated-orcid":false,"given":"Zeno","family":"Geradts","sequence":"additional","affiliation":[{"name":"Department Forensic and Biometric Traces, Netherlands Forensic Institute (NFI), Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,2,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.08.018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-017-0656-1"},{"key":"e_1_3_2_1_3_1","first-page":"15","article-title":"Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review","volume":"10","author":"Alsaadi Israa\u00a0Majeed","year":"2021","unstructured":"Israa\u00a0Majeed Alsaadi . 2021 . Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review . Int. J. Sci. Technol. Res 10 (2021), 15 \u2013 21 . Israa\u00a0Majeed Alsaadi. 2021. Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review. Int. J. Sci. Technol. Res 10 (2021), 15\u201321.","journal-title":"Int. J. Sci. Technol. Res"},{"key":"e_1_3_2_1_4_1","volume-title":"2008 IEEE Conference on Technologies for Homeland Security. IEEE, 426\u2013431","author":"Bashir Faisal","year":"2008","unstructured":"Faisal Bashir , Pablo Casaverde , David Usher , and Marc Friedman . 2008 . Eagle-eyes: A system for iris recognition at a distance . In 2008 IEEE Conference on Technologies for Homeland Security. IEEE, 426\u2013431 . Faisal Bashir, Pablo Casaverde, David Usher, and Marc Friedman. 2008. Eagle-eyes: A system for iris recognition at a distance. In 2008 IEEE Conference on Technologies for Homeland Security. IEEE, 426\u2013431."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001493000339"},{"key":"e_1_3_2_1_6_1","volume-title":"Facing the future: The impact of Apple FaceID. Biometric technology today","author":"Bud Andrew","year":"2018","unstructured":"Andrew Bud . 2018. Facing the future: The impact of Apple FaceID. Biometric technology today 2018 , 1 (2018), 5\u20137. Andrew Bud. 2018. Facing the future: The impact of Apple FaceID. Biometric technology today 2018, 1 (2018), 5\u20137."},{"key":"e_1_3_2_1_7_1","volume-title":"2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM). IEEE, 1\u20137.","author":"Chen Yangyu","year":"2018","unstructured":"Yangyu Chen and Weigang Zhang . 2018 . Iris liveness detection: A survey . In 2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM). IEEE, 1\u20137. Yangyu Chen and Weigang Zhang. 2018. Iris liveness detection: A survey. In 2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM). IEEE, 1\u20137."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Davide Chicco. 2021. Siamese neural networks: An overview. Artificial Neural Networks(2021) 73\u201394. Davide Chicco. 2021. Siamese neural networks: An overview. Artificial Neural Networks(2021) 73\u201394.","DOI":"10.1007\/978-1-0716-0826-5_3"},{"key":"e_1_3_2_1_9_1","first-page":"275","article-title":"A survey: Feature extraction methods for iris recognition","volume":"2","author":"Choudhary Dolly","year":"2012","unstructured":"Dolly Choudhary , Shamik Tiwari , and Ajay\u00a0Kumar Singh . 2012 . A survey: Feature extraction methods for iris recognition . International Journal of Electronics Communication and Computer Technology 2 , 6 (2012), 275 \u2013 279 . Dolly Choudhary, Shamik Tiwari, and Ajay\u00a0Kumar Singh. 2012. A survey: Feature extraction methods for iris recognition. International Journal of Electronics Communication and Computer Technology 2, 6 (2012), 275\u2013279.","journal-title":"International Journal of Electronics Communication and Computer Technology"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.003"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the IEEE international conference on computer vision. 1983\u20131991","author":"Chung Dahjung","year":"2017","unstructured":"Dahjung Chung , Khalid Tahboub , and Edward\u00a0 J Delp . 2017 . A two stream siamese convolutional neural network for person re-identification . In Proceedings of the IEEE international conference on computer vision. 1983\u20131991 . Dahjung Chung, Khalid Tahboub, and Edward\u00a0J Delp. 2017. A two stream siamese convolutional neural network for person re-identification. In Proceedings of the IEEE international conference on computer vision. 1983\u20131991."},{"key":"e_1_3_2_1_12_1","volume-title":"2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers. IEEE, 1770\u20131773","author":"De\u00a0Villar A","year":"2010","unstructured":"Justin\u00a0 A De\u00a0Villar , Robert\u00a0 W Ives , and James\u00a0 R Matey . 2010 . Design and implementation of a long range iris recognition system . In 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers. IEEE, 1770\u20131773 . Justin\u00a0A De\u00a0Villar, Robert\u00a0W Ives, and James\u00a0R Matey. 2010. Design and implementation of a long range iris recognition system. In 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers. IEEE, 1770\u20131773."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-03731-4"},{"key":"e_1_3_2_1_14_1","volume-title":"10th International Multi-Conferences on Systems, Signals & Devices 2013 (SSD13)","author":"El\u00a0Kissi Ghalleb Asma","year":"2013","unstructured":"Asma El\u00a0Kissi Ghalleb , Souhir Sghaier , and Najoua Essoukri\u00a0Ben Amara . 2013 . Face recognition improvement using soft biometrics. In 10th International Multi-Conferences on Systems, Signals & Devices 2013 (SSD13) . IEEE, 1\u20136. Asma El\u00a0Kissi Ghalleb, Souhir Sghaier, and Najoua Essoukri\u00a0Ben Amara. 2013. Face recognition improvement using soft biometrics. In 10th International Multi-Conferences on Systems, Signals & Devices 2013 (SSD13). IEEE, 1\u20136."},{"key":"e_1_3_2_1_15_1","volume-title":"2019 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1\u20136.","author":"Giot Romain","year":"2019","unstructured":"Romain Giot and Anderson Rocha . 2019 . Siamese networks for static keystroke dynamics authentication . In 2019 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1\u20136. Romain Giot and Anderson Rocha. 2019. Siamese networks for static keystroke dynamics authentication. In 2019 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1\u20136."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.196"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.01.005"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2019.8756571"},{"key":"e_1_3_2_1_19_1","volume-title":"2014 22nd international conference on pattern recognition. IEEE, 527\u2013532","author":"Hofbauer Heinz","year":"2014","unstructured":"Heinz Hofbauer , Fernando Alonso-Fernandez , Peter Wild , Josef Bigun , and Andreas Uhl . 2014 . A ground truth for iris segmentation . In 2014 22nd international conference on pattern recognition. IEEE, 527\u2013532 . Heinz Hofbauer, Fernando Alonso-Fernandez, Peter Wild, Josef Bigun, and Andreas Uhl. 2014. A ground truth for iris segmentation. In 2014 22nd international conference on pattern recognition. IEEE, 527\u2013532."},{"key":"e_1_3_2_1_20_1","first-page":"59","article-title":"The removal of specular reflection in noisy iris image","volume":"8","author":"Jamaludin Shahrizan","year":"2016","unstructured":"Shahrizan Jamaludin , Nasharuddin Zainal , and W\u00a0Mimi Diyana\u00a0W Zaki . 2016 . The removal of specular reflection in noisy iris image . Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8 , 4(2016), 59 \u2013 64 . Shahrizan Jamaludin, Nasharuddin Zainal, and W\u00a0Mimi Diyana\u00a0W Zaki. 2016. The removal of specular reflection in noisy iris image. Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8, 4(2016), 59\u201364.","journal-title":"Journal of Telecommunication, Electronic and Computer Engineering (JTEC)"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02172-y"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1049\/iet-bmt.2019.0025","article-title":"PixISegNet: pixel-level iris segmentation network using convolutional encoder\u2013decoder with stacked hourglass bottleneck","volume":"9","author":"Jha Ranjeet\u00a0Ranjan","year":"2020","unstructured":"Ranjeet\u00a0Ranjan Jha , Gaurav Jaswal , Divij Gupta , Shreshth Saini , and Aditya Nigam . 2020 . PixISegNet: pixel-level iris segmentation network using convolutional encoder\u2013decoder with stacked hourglass bottleneck . IET Biometrics 9 , 1 (2020), 11 \u2013 24 . Ranjeet\u00a0Ranjan Jha, Gaurav Jaswal, Divij Gupta, Shreshth Saini, and Aditya Nigam. 2020. PixISegNet: pixel-level iris segmentation network using convolutional encoder\u2013decoder with stacked hourglass bottleneck. IET Biometrics 9, 1 (2020), 11\u201324.","journal-title":"IET Biometrics"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-3057-2"},{"key":"e_1_3_2_1_24_1","article-title":"Survey of contrast enhancement techniques based on histogram equalization","volume":"2","author":"Kaur Manpreet","year":"2011","unstructured":"Manpreet Kaur , Jasdeep Kaur , and Jappreet Kaur . 2011 . Survey of contrast enhancement techniques based on histogram equalization . International Journal of Advanced Computer Science and Applications 2 , 7(2011). Manpreet Kaur, Jasdeep Kaur, and Jappreet Kaur. 2011. Survey of contrast enhancement techniques based on histogram equalization. International Journal of Advanced Computer Science and Applications 2, 7(2011).","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5455\/aim.2019.27.96-102"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Amjad\u00a0Rehman Khan Fatemeh Doosti Mohsen Karimi Majid Harouni Usman Tariq Suliman\u00a0Mohamed Fati and Saeed Ali\u00a0Bahaj. 2021. Authentication through gender classification from iris images using support vector machine. Microscopy research and technique(2021). Amjad\u00a0Rehman Khan Fatemeh Doosti Mohsen Karimi Majid Harouni Usman Tariq Suliman\u00a0Mohamed Fati and Saeed Ali\u00a0Bahaj. 2021. Authentication through gender classification from iris images using support vector machine. Microscopy research and technique(2021).","DOI":"10.1002\/jemt.23816"},{"key":"e_1_3_2_1_27_1","volume-title":"2019 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 904\u2013912","author":"Kuehlkamp Andrey","year":"2019","unstructured":"Andrey Kuehlkamp and Kevin Bowyer . 2019 . Predicting gender from iris texture may be harder than it seems . In 2019 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 904\u2013912 . Andrey Kuehlkamp and Kevin Bowyer. 2019. Predicting gender from iris texture may be harder than it seems. In 2019 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 904\u2013912."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.10.001"},{"key":"e_1_3_2_1_29_1","unstructured":"Min Lin Qiang Chen and Shuicheng Yan. 2013. Network in network. arXiv preprint arXiv:1312.4400(2013). Min Lin Qiang Chen and Shuicheng Yan. 2013. Network in network. arXiv preprint arXiv:1312.4400(2013)."},{"key":"e_1_3_2_1_30_1","volume-title":"2016 International Conference on Biometrics (ICB). IEEE, 1\u20138.","author":"Liu Nianfeng","year":"2016","unstructured":"Nianfeng Liu , Haiqing Li , Man Zhang , Jing Liu , Zhenan Sun , and Tieniu Tan . 2016 . Accurate iris segmentation in non-cooperative environments using fully convolutional networks . In 2016 International Conference on Biometrics (ICB). IEEE, 1\u20138. Nianfeng Liu, Haiqing Li, Man Zhang, Jing Liu, Zhenan Sun, and Tieniu Tan. 2016. Accurate iris segmentation in non-cooperative environments using fully convolutional networks. In 2016 International Conference on Biometrics (ICB). IEEE, 1\u20138."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698597"},{"volume-title":"Biometric Authentication \u2014 Security and Usability","author":"Maty\u00e1\u0161 V\u00e1clav","key":"e_1_3_2_1_32_1","unstructured":"V\u00e1clav Maty\u00e1\u0161 and Zden\u011bk \u0158\u00edha . 2002. Biometric Authentication \u2014 Security and Usability . Springer US , Boston, MA , 227\u2013239. V\u00e1clav Maty\u00e1\u0161 and Zden\u011bk \u0158\u00edha. 2002. Biometric Authentication \u2014 Security and Usability. Springer US, Boston, MA, 227\u2013239."},{"key":"e_1_3_2_1_33_1","volume-title":"2016 23rd international conference on pattern recognition (ICPR). IEEE, 378\u2013383","author":"Melekhov Iaroslav","year":"2016","unstructured":"Iaroslav Melekhov , Juho Kannala , and Esa Rahtu . 2016 . Siamese network features for image matching . In 2016 23rd international conference on pattern recognition (ICPR). IEEE, 378\u2013383 . Iaroslav Melekhov, Juho Kannala, and Esa Rahtu. 2016. Siamese network features for image matching. In 2016 23rd international conference on pattern recognition (ICPR). IEEE, 378\u2013383."},{"key":"e_1_3_2_1_34_1","volume-title":"Deepiris: Iris recognition using a deep learning approach. arXiv preprint arXiv:1907.09380(2019).","author":"Minaee Shervin","year":"2019","unstructured":"Shervin Minaee and Amirali Abdolrashidi . 2019 . Deepiris: Iris recognition using a deep learning approach. arXiv preprint arXiv:1907.09380(2019). Shervin Minaee and Amirali Abdolrashidi. 2019. Deepiris: Iris recognition using a deep learning approach. arXiv preprint arXiv:1907.09380(2019)."},{"key":"e_1_3_2_1_35_1","volume-title":"2018 2nd International Conference on Inventive Systems and Control (ICISC). 898\u2013902","author":"Muley Abhinav","year":"2018","unstructured":"Abhinav Muley and Vivek Kute . 2018 . Prospective solution to bank card system using fingerprint . In 2018 2nd International Conference on Inventive Systems and Control (ICISC). 898\u2013902 . https:\/\/doi.org\/10.1109\/ICISC.2018.8398930 10.1109\/ICISC.2018.8398930 Abhinav Muley and Vivek Kute. 2018. Prospective solution to bank card system using fingerprint. In 2018 2nd International Conference on Inventive Systems and Control (ICISC). 898\u2013902. https:\/\/doi.org\/10.1109\/ICISC.2018.8398930"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.021"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.021"},{"key":"e_1_3_2_1_38_1","volume-title":"A literature survey on authentication using Behavioural biometric techniques. Intelligent Computing and Information and Communication","author":"Oak Rajvardhan","year":"2018","unstructured":"Rajvardhan Oak . 2018. A literature survey on authentication using Behavioural biometric techniques. Intelligent Computing and Information and Communication ( 2018 ), 173\u2013181. Rajvardhan Oak. 2018. A literature survey on authentication using Behavioural biometric techniques. Intelligent Computing and Information and Communication (2018), 173\u2013181."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.66"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/TIFS.2017.2771230","article-title":"Deep-prwis: Periocular recognition without the iris and sclera using deep learning frameworks","volume":"13","author":"Proen\u00e7a Hugo","year":"2017","unstructured":"Hugo Proen\u00e7a and Joao\u00a0 C Neves . 2017 . Deep-prwis: Periocular recognition without the iris and sclera using deep learning frameworks . IEEE Transactions on Information Forensics and Security 13 , 4(2017), 888 \u2013 896 . Hugo Proen\u00e7a and Joao\u00a0C Neves. 2017. Deep-prwis: Periocular recognition without the iris and sclera using deep learning frameworks. IEEE Transactions on Information Forensics and Security 13, 4(2017), 888\u2013896.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_41_1","volume-title":"Soft biometrics for surveillance: an overview. Handbook of statistics 31","author":"Reid A","year":"2013","unstructured":"Daniel\u00a0 A Reid , Sina Samangooei , Cunjian Chen , Mark\u00a0 S Nixon , and Arun Ross . 2013. Soft biometrics for surveillance: an overview. Handbook of statistics 31 ( 2013 ), 327\u2013352. Daniel\u00a0A Reid, Sina Samangooei, Cunjian Chen, Mark\u00a0S Nixon, and Arun Ross. 2013. Soft biometrics for surveillance: an overview. Handbook of statistics 31 (2013), 327\u2013352."},{"key":"e_1_3_2_1_42_1","volume-title":"A survey on biometric authentication: Toward secure and privacy-preserving identification","author":"Rui Zhang","year":"2018","unstructured":"Zhang Rui and Zheng Yan . 2018. A survey on biometric authentication: Toward secure and privacy-preserving identification . IEEE access 7( 2018 ), 5994\u20136009. Zhang Rui and Zheng Yan. 2018. A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE access 7(2018), 5994\u20136009."},{"key":"e_1_3_2_1_43_1","volume-title":"2018 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, 1\u20135.","author":"Sequeira F","year":"2018","unstructured":"Ana\u00a0 F Sequeira , Lulu Chen , James Ferryman , Chiara Galdi , Valeria Chiesa , Jean-Luc Dugelay , Patryk Maik , Piotr Gmitrowicz , Lukasz Szklarski , Bernhard Prommegger , 2018 . PROTECT Multimodal DB: Fusion evaluation on a novel multimodal biometrics dataset envisaging Border Control . In 2018 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, 1\u20135. Ana\u00a0F Sequeira, Lulu Chen, James Ferryman, Chiara Galdi, Valeria Chiesa, Jean-Luc Dugelay, Patryk Maik, Piotr Gmitrowicz, Lukasz Szklarski, Bernhard Prommegger, 2018. PROTECT Multimodal DB: Fusion evaluation on a novel multimodal biometrics dataset envisaging Border Control. In 2018 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, 1\u20135."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Kaavya Sriskandaraja Vidhyasaharan Sethu and Eliathamby Ambikairajah. 2018. Deep siamese architecture based replay detection for secure voice biometric.. In Interspeech. 671\u2013675. Kaavya Sriskandaraja Vidhyasaharan Sethu and Eliathamby Ambikairajah. 2018. Deep siamese architecture based replay detection for secure voice biometric.. In Interspeech. 671\u2013675.","DOI":"10.21437\/Interspeech.2018-1819"},{"key":"e_1_3_2_1_45_1","volume-title":"Cvpr 2011 Workshops. IEEE, 9\u201314","author":"Tan Chun-Wei","year":"2011","unstructured":"Chun-Wei Tan and Ajay Kumar . 2011 . Automated segmentation of iris images using visible wavelength face images . In Cvpr 2011 Workshops. IEEE, 9\u201314 . Chun-Wei Tan and Ajay Kumar. 2011. Automated segmentation of iris images using visible wavelength face images. In Cvpr 2011 Workshops. IEEE, 9\u201314."},{"volume-title":"Selfie Biometrics","author":"Tapia Juan","key":"e_1_3_2_1_46_1","unstructured":"Juan Tapia , Claudia Arellano , and Ignacio Viedma . 2019. Sex-classification from cellphones periocular iris images . In Selfie Biometrics . Springer , 227\u2013242. Juan Tapia, Claudia Arellano, and Ignacio Viedma. 2019. Sex-classification from cellphones periocular iris images. In Selfie Biometrics. Springer, 227\u2013242."},{"volume-title":"Long range iris acquisition system for stationary and mobile subjects. In 2011 international joint conference on biometrics (IJCB)","author":"Venugopalan Shreyas","key":"e_1_3_2_1_47_1","unstructured":"Shreyas Venugopalan , Unni Prasad , Khalid Harun , Kyle Neblett , Douglas Toomey , Joseph Heyman , and Marios Savvides . 2011. Long range iris acquisition system for stationary and mobile subjects. In 2011 international joint conference on biometrics (IJCB) . IEEE , 1\u20138. Shreyas Venugopalan, Unni Prasad, Khalid Harun, Kyle Neblett, Douglas Toomey, Joseph Heyman, and Marios Savvides. 2011. Long range iris acquisition system for stationary and mobile subjects. In 2011 international joint conference on biometrics (IJCB). IEEE, 1\u20138."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the IEEE International Conference on Computer Vision. 3922\u20133930","author":"Wan Renjie","year":"2017","unstructured":"Renjie Wan , Boxin Shi , Ling-Yu Duan , Ah-Hwee Tan , and Alex\u00a0 C Kot . 2017 . Benchmarking single-image reflection removal algorithms . In Proceedings of the IEEE International Conference on Computer Vision. 3922\u20133930 . Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, and Alex\u00a0C Kot. 2017. Benchmarking single-image reflection removal algorithms. In Proceedings of the IEEE International Conference on Computer Vision. 3922\u20133930."},{"key":"e_1_3_2_1_49_1","volume-title":"International Conference on Human Centered Computing. Springer, 812\u2013820","author":"Wang Weihong","year":"2014","unstructured":"Weihong Wang , Jie Yang , Jianwei Xiao , Sheng Li , and Dixin Zhou . 2014 . Face recognition based on deep learning . In International Conference on Human Centered Computing. Springer, 812\u2013820 . Weihong Wang, Jie Yang, Jianwei Xiao, Sheng Li, and Dixin Zhou. 2014. Face recognition based on deep learning. In International Conference on Human Centered Computing. Springer, 812\u2013820."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00018"},{"key":"e_1_3_2_1_51_1","volume-title":"Chinese conference on biometric recognition. Springer, 48\u201355","author":"Zhong Dexing","year":"2018","unstructured":"Dexing Zhong , Yuan Yang , and Xuefeng Du . 2018 . Palmprint recognition using siamese network . In Chinese conference on biometric recognition. Springer, 48\u201355 . Dexing Zhong, Yuan Yang, and Xuefeng Du. 2018. Palmprint recognition using siamese network. In Chinese conference on biometric recognition. Springer, 48\u201355."}],"event":{"name":"ESSE 2022: 2022 The 3rd European Symposium on Software Engineering","acronym":"ESSE 2022","location":"Rome Italy"},"container-title":["2022 The 3rd European Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571697.3571708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T23:10:48Z","timestamp":1675725048000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571697.3571708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,27]]},"references-count":51,"alternative-id":["10.1145\/3571697.3571708","10.1145\/3571697"],"URL":"https:\/\/doi.org\/10.1145\/3571697.3571708","relation":{},"subject":[],"published":{"date-parts":[[2022,10,27]]},"assertion":[{"value":"2023-02-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}