{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T17:44:53Z","timestamp":1777052693569,"version":"3.51.4"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2010,6,1]],"date-time":"2010-06-01T00:00:00Z","timestamp":1275350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/tpami.2009.76","type":"journal-article","created":{"date-parts":[[2009,4,18]],"date-time":"2009-04-18T02:26:14Z","timestamp":1240021574000},"page":"1097-1111","source":"Crossref","is-referenced-by-count":181,"title":["The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)"],"prefix":"10.1109","volume":"32","author":[{"given":"Javier","family":"Ortega-Garcia","sequence":"first","affiliation":[]},{"given":"Julian","family":"Fierrez","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Alonso-Fernandez","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Galbally","sequence":"additional","affiliation":[]},{"given":"Manuel R","family":"Freire","sequence":"additional","affiliation":[]},{"given":"Joaquin","family":"Gonzalez-Rodriguez","sequence":"additional","affiliation":[]},{"given":"Carmen","family":"Garcia-Mateo","sequence":"additional","affiliation":[]},{"given":"Jose-Luis","family":"Alba-Castro","sequence":"additional","affiliation":[]},{"given":"Elisardo","family":"Gonzalez-Agulla","sequence":"additional","affiliation":[]},{"given":"Enrique","family":"Otero-Muras","sequence":"additional","affiliation":[]},{"given":"Sonia","family":"Garcia-Salicetti","sequence":"additional","affiliation":[]},{"given":"Lorene","family":"Allano","sequence":"additional","affiliation":[]},{"given":"Bao","family":"Ly-Van","sequence":"additional","affiliation":[]},{"given":"Bernadette","family":"Dorizzi","sequence":"additional","affiliation":[]},{"given":"Josef","family":"Kittler","sequence":"additional","affiliation":[]},{"given":"Thirimachos","family":"Bourlai","sequence":"additional","affiliation":[]},{"given":"Norman","family":"Poh","sequence":"additional","affiliation":[]},{"given":"Farzin","family":"Deravi","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Ng","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Fairhurst","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Hennebert","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Humm","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Tistarelli","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Brodo","sequence":"additional","affiliation":[]},{"given":"Jonas","family":"Richiardi","sequence":"additional","affiliation":[]},{"given":"Andrezj","family":"Drygajlo","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Ganster","sequence":"additional","affiliation":[]},{"given":"Federico M","family":"Sukno","sequence":"additional","affiliation":[]},{"given":"Sri-Kaushik","family":"Pavani","sequence":"additional","affiliation":[]},{"given":"Alejandro","family":"Frangi","sequence":"additional","affiliation":[]},{"given":"Lale","family":"Akarun","sequence":"additional","affiliation":[]},{"given":"Arman","family":"Savran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9"},{"key":"ref3","volume-title":"Best Practices in Testing and Reporting Performance of Biometric Devices, v 2.01","author":"Mansfield","year":"2002"},{"key":"ref4","volume-title":"NIST SRE \u201cNIST Speaker Recognition Evaluation,\u201d"},{"key":"ref5","volume-title":"FRVT \u201cFace Recognition Vendor Test,\u201d","year":"2006"},{"key":"ref6","volume-title":"FVC2006 \u201cFingerprint Verification Competition,\u201d","year":"2006"},{"key":"ref7","volume-title":"ICE \u201cIris Challenge Evaluation,\u201d","year":"2006"},{"key":"ref8","volume-title":"SVC \u201cSignature Verification Competition,\u201d","year":"2009"},{"key":"ref9","volume-title":"BioSecure \u201cBiometrics for Secure Authentication, FP6 NoE, IST-2002-507634,\u201d","year":"2004"},{"key":"ref10","volume-title":"BMEC \u201cThe Biosecure Multimodal Evaluation Campaign,\u201d","year":"2007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2006.1703234"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1661464"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-009-0151-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.10.014"},{"key":"ref15","article-title":"MyIdea\u2014 Multimodal Biometrics Database, Description of Acquisition Protocols","volume-title":"Proc. COST-275 Workshop Biometrics on the Internet","author":"Dumas"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44887-X_98"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.06.037"},{"key":"ref18","article-title":"The Multi-Biometric, Multi-Device and Multilingual (M3) Corpus","volume-title":"Proc. Workshop Multimodal User Authentication","author":"Meng"},{"key":"ref19","volume-title":"NIST FRGCDB","year":"2006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20031078"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44887-X_74"},{"key":"ref22","article-title":"The SmartKom Multimodal Corpus at BAS","volume-title":"Proc. Int\u2019l Conf. Language Resources and Evaluation","author":"Schiel"},{"key":"ref23","article-title":"XM2VTSDB: The Extended M2VTS Database","volume-title":"Proc. Second Int\u2019l Conf. Audio and Video-Based Biometric Person Authentication","author":"Messer"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/ic:19961151"},{"key":"ref26","article-title":"Biometrics and Security, FP6 IP, IST-2002-001766","year":"2004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9"},{"key":"ref28","volume-title":"Guide to Biometric Reference Systems and Performance Evaluation","author":"Petrovska-Delacretaz","year":"2008"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/34.908974"},{"key":"ref30","volume-title":"User\u2019s Guide to Fingerprint Image Software 2\u2014NFIS2. NIST","author":"Watson","year":"2004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_17"},{"key":"ref32","article-title":"Recognition of Human Iris Patterns for Biometric Identification","author":"Masek","year":"2003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.11.012"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.895323"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/BF03253249"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.07.012"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190696"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2006.345483"},{"key":"ref42","article-title":"MINEX\u2014 Performance and Interoperability of the INCITS 378 Fingerprint Template","volume-title":"NISTIR 7296","author":"Grother","year":"2005"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/11569947_23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.11.012"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2006.313441"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1019"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908228"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2005.1594817"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/34.1000244"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/34\/5452163\/04815263.pdf?arnumber=4815263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T05:13:25Z","timestamp":1742188405000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4815263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":49,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2009.76","relation":{},"ISSN":["0162-8828"],"issn-type":[{"value":"0162-8828","type":"print"}],"subject":[],"published":{"date-parts":[[2010,6]]}}}