{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:55:15Z","timestamp":1773968115845,"version":"3.50.1"},"reference-count":103,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"TCS Research Fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2014]]},"DOI":"10.1109\/access.2014.2349879","type":"journal-article","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T18:31:08Z","timestamp":1408559468000},"page":"982-1004","source":"Crossref","is-referenced-by-count":61,"title":["Latent Fingerprint Matching: A Survey"],"prefix":"10.1109","volume":"2","author":[{"given":"Anush","family":"Sankaran","sequence":"first","affiliation":[]},{"given":"Mayank","family":"Vatsa","sequence":"additional","affiliation":[]},{"given":"Richa","family":"Singh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.scijus.2012.12.002"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1039\/c3an36896c"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199806"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1130"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/lpr\/mgp031"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2005.10.017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.155"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_71"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2204254"},{"key":"ref34","first-page":"1","article-title":"Filtering large fingerprint database for latent matching","author":"feng","year":"2008","journal-title":"Proc 19th Int Conf Pattern Recognit"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.1556-4029.2008.00762.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2010.10.013"},{"key":"ref29","first-page":"600","article-title":"Why experts make errors","volume":"56","author":"dror","year":"2006","journal-title":"J Forensic Identification"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.52"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374593"},{"key":"ref21","first-page":"309","article-title":"K-plet and CBFS: A graph based fingerprint representation and matching algorithm","author":"chikkerur","year":"2006","journal-title":"Proc Int Conf Biometrics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/S0269889700003343"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117550"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199807"},{"key":"ref26","article-title":"A protocol for multibiometric data acquisition, storage and dissemination","author":"crihalmeanu","year":"2007"},{"key":"ref100","first-page":"1","article-title":"On latent fingerprint image quality","author":"yoon","year":"2012","journal-title":"Proc Int Conf Pattern Recognit IWCF Workshop"},{"key":"ref25","first-page":"985","article-title":"More than zero: Accounting for error in latent fingerprint identification","volume":"95","author":"cole","year":"2004","journal-title":"J Criminal Law Criminol"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7577","article-title":"ELFT phase II: An evaluation of automated latent fingerprint identification technologies","author":"indovina","year":"2009"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.59"},{"key":"ref59","author":"komarinski","year":"2001","journal-title":"An Automated Fingerprint Identification System"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2037252.2037259"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-382165-2.00266-X"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(84)90079-7"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712049"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361430"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.250596"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563117"},{"key":"ref40","author":"galton","year":"1892","journal-title":"Finger Prints"},{"key":"ref4","year":"2013","journal-title":"Fact Sheet&#x2014;Integrated Automated Fingerprint Identification System"},{"key":"ref3","year":"2013","journal-title":"Evaluation of Latent Fingerprint Technologies"},{"key":"ref6","year":"2014","journal-title":"FBI IAFIS&#x2014;CJIS Division 2012 Latent Hit of the Year"},{"key":"ref5","year":"2010","journal-title":"FBI IAFIS&#x2014;CJIS Division 2010 Latent Hit of the Year"},{"key":"ref8","year":"2014","journal-title":"INNOVATRICS S R O IDKit PC SDK"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7775","article-title":"ELFT-EFS: Evaluation of latent fingerprint technologies: Extended Feature sets, [evaluation# 1]","author":"indovina","year":"2011"},{"key":"ref7","year":"2014","journal-title":"FBI IAFIS&#x2014;CJIS Division Latent Hit of the Year Award Videos"},{"key":"ref9","year":"2014","journal-title":"NBIS (NIST Biometric Image Software)"},{"key":"ref46","first-page":"385","article-title":"Latent fingerprint quality: A survey of examiners","volume":"61","author":"hicklin","year":"2011","journal-title":"J Forensic Identification"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2012.12.015"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7859","article-title":"ELFT-EFS evaluation of latent fingerprint technologies: Extended feature sets [Evaluation# 2]","author":"indovina","year":"2012"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0706-84"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2008.08.008"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-21685-5_17"},{"key":"ref44","article-title":"Latent quality survey","author":"hicklin","year":"2007"},{"key":"ref43","first-page":"54","author":"henry","year":"1900","journal-title":"Classification and Uses of Finger Prints"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1023799"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199802"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70796"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2210216"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2010.17"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.405"},{"key":"ref74","author":"patel","year":"2012","journal-title":"Fingerprint Verification System"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223678"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117525"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996300"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/978-3-642-53842-1_20","article-title":"Evaluation of AFIS-ranked latent fingerprint matched templates","author":"krish","year":"2014","journal-title":"Image and Video Technology"},{"key":"ref62","first-page":"219","article-title":"Performance study of the ACE-V process: A pilot study to measure the accuracy, precision, reproducibility, repeatability, and biasability of conclusions resulting from the ACE-V process","volume":"59","author":"langenburg","year":"2009","journal-title":"J Forensic Identification"},{"key":"ref61","first-page":"325","article-title":"Touchless fingerprint biometrics: A survey on 2D and 3D technologies","volume":"15","author":"labati","year":"2014","journal-title":"J Internet Technol"},{"key":"ref63","first-page":"105","article-title":"Methods of latent fingerprint development","author":"lee","year":"0","journal-title":"Advances in Fingerprint Technology"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613013"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-3255-3_2"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref67","first-page":"1","article-title":"Forensic biometrics: From two communities to one discipline","author":"meuwly","year":"2012","journal-title":"Proc Int Conf Biometrics Special Interest Group"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239220"},{"key":"ref2","year":"2014","journal-title":"Case Report&#x2014;Shirley Mckie Fingerprint Scandal"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1093\/lpr\/mgm022"},{"key":"ref1","year":"2012","journal-title":"Biometric SDK"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459879"},{"key":"ref94","author":"vazan","year":"2012","journal-title":"SourceAFIS"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.05.009"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699327"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.02.005"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2007981"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187281"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2012.6467067"},{"key":"ref98","first-page":"766707-1","article-title":"On latent fingerprint enhancement","volume":"7667","author":"yoon","year":"2010","journal-title":"Biometric Technology for Human Identification SPIE"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117482"},{"key":"ref96","first-page":"55","article-title":"A report of latent print examiner accuracy during comparison training exercises","volume":"56","author":"wertheim","year":"2006","journal-title":"J Forensic Identification"},{"key":"ref97","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7123","author":"wilson","year":"2004","journal-title":"Fingerprint Vendor Technology Evaluation 2003 Summary of Results and Analysis Report Nistir 7123"},{"key":"ref10","year":"2006","journal-title":"A Review of the FBIS Handling of the Brandon Mayfield Case"},{"key":"ref11","year":"0","journal-title":"Standard for the Documentation of Analysis Comparison Evaluation and Verification (ACE-V) (Latent) V2 0"},{"key":"ref12","year":"2014","journal-title":"The Innocence Project"},{"key":"ref13","year":"2014","journal-title":"VeriFinger by NeuroTechnology"},{"key":"ref14","year":"2007","journal-title":"Concept of Operations (conops) for Evaluation of Latent Fingerprint Technologies (elft) Technical Report"},{"key":"ref15","year":"2008","journal-title":"CDEFFS The ANIS\/NIST Committee to Define an Extended Fingerprint Feature Set"},{"key":"ref16","year":"2010","journal-title":"Fingerprint Minutiae from Latent and Matching Tenprint Images"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412630"},{"key":"ref17","first-page":"134","author":"ashbaugh","year":"1999","journal-title":"Quantitative-Qualitative Friction Ridge Analysis An Introduction to Basic and Advanced Ridgeology"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712716"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-34"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0125"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2302450"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ISMS.2011.19"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374604"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.01.012"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.404"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.1152"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1018707108"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0032800"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/6705689\/06880753.pdf?arnumber=6880753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:41Z","timestamp":1642004921000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6880753\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":103,"URL":"https:\/\/doi.org\/10.1109\/access.2014.2349879","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}