{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T15:09:39Z","timestamp":1664809779259},"reference-count":15,"publisher":"Walter de Gruyter GmbH","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1515\/jisys.2011.018","type":"journal-article","created":{"date-parts":[[2011,11,21]],"date-time":"2011-11-21T08:58:27Z","timestamp":1321865907000},"source":"Crossref","is-referenced-by-count":3,"title":["Multimodal Biometric Fusion: Performance under Spoof Attacks"],"prefix":"10.1515","volume":"20","author":[{"given":"Zahid","family":"Akhtar","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Rizwan","sequence":"additional","affiliation":[]},{"given":"Sandeep","family":"Kale","sequence":"additional","affiliation":[]}],"member":"374","reference":[{"key":"p_10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2010.01.028"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2005.03.001"},{"key":"p_15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"p_27","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.26.000760"},{"key":"p_28","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"p_29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2031892"},{"key":"p_30","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2028773"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.12.010"},{"key":"p_34","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1117\/12.462719","volume":"4677","author":"Matsumoto T.","year":"2002","journal-title":"Optical Security and Counterfeit Deterrence Techniques IV, Proc. of SPIE"},{"key":"p_36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70796"},{"key":"p_41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.010"},{"key":"p_43","first-page":"7151","author":"Tabassi E.","year":"2004","journal-title":"Technical Report NIST IR"},{"key":"p_44","doi-asserted-by":"publisher","DOI":"10.1117\/12.538894"},{"key":"p_46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.04.026"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/JISYS.2011.018\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T02:20:10Z","timestamp":1619058010000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/JISYS.2011.018\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":15,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1515\/jisys.2011.018","relation":{},"ISSN":["0334-1860","2191-026X"],"issn-type":[{"value":"0334-1860","type":"print"},{"value":"2191-026X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}