{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:52:41Z","timestamp":1761580361396},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540311119"},{"type":"electronic","value":"9783540316213"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11608288_68","type":"book-chapter","created":{"date-parts":[[2005,12,8]],"date-time":"2005-12-08T07:57:34Z","timestamp":1134028654000},"page":"509-515","source":"Crossref","is-referenced-by-count":14,"title":["Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures"],"prefix":"10.1007","author":[{"given":"W. K.","family":"Yip","sequence":"first","affiliation":[]},{"given":"A.","family":"Goh","sequence":"additional","affiliation":[]},{"given":"David Chek Ling","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"Andrew Beng Jin","family":"Teoh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45184-6_1","volume-title":"Communications and Multimedia Security. Advanced Techniques for Network and Data Protection","author":"A. Goh","year":"2003","unstructured":"Goh, A., Ngo, D.C.L.: Computation of Cryptographic Keys from Face Biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol.\u00a02828, pp. 1\u201313. Springer, Heidelberg (2003)"},{"key":"68_CR2","unstructured":"Chang, Y.C., Zhang, W., Chen, T.: Biometric-based Cryptographic Key Generation. In: IEEE Conference on Multimedia and Expo, Taiwan (2004)"},{"key":"68_CR3","unstructured":"Vielhauer, C., Steinmetz, R., Mayerhorf, A.: Biometric Hash based on Statistical Fea-tures of Online Signatures. In: Proc. of the 16th Intl. Conference on Pattern Recognition (2002)"},{"key":"68_CR4","doi-asserted-by":"crossref","unstructured":"Feng, H., Chan, C.W.: Private Key Generation from On-line Handwritten Signatures. Information Management and Computer Security, MCB UP Limited, 159\u2013164 (2000)","DOI":"10.1108\/09685220210436949"},{"key":"68_CR5","unstructured":"Davida, G., Frankel, Y., Matt, B.J., Peralta, R.: On the Relation of Error Correction and Cryptography to an Off Line Biometric Based on Identification Scheme. In: WCC 1999, Workshop on Coding and Cryptography (1999)"},{"key":"68_CR6","unstructured":"Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption Using Image Processing. SPIE 3314, 178\u2013188 (1998)"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation from Voice. In: Proc. of the 2001 IEEE Symp. on Security and Privacy (2001)","DOI":"10.1109\/SECPRI.2001.924299"},{"key":"68_CR8","unstructured":"Monrose, F., Reiter, M.K., Li, Q., Lopresti, D.P., Shih, C.: Toward Speech-Generated Cryptographic Keys on Resource Constrained Devices. In: Proc. of the 11th USENIX Security Symposium (2002)"},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Tsudik, G. (ed.) Proc. 6th ACM Conf. Computer and Communications Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"key":"68_CR10","doi-asserted-by":"crossref","unstructured":"Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Lapidoth, A., Teletar, E. (eds.) Proc. IEEE Int. Symp. Information Theory, p. 408 (2002)","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure Smartcard-based Fingerprint Authentication. In: Proc. ACM SIGMM 2993 Multimedia, Biometrics Methods and Applications Workshop, 45\u201352 (2003)","DOI":"10.1145\/982507.982516"},{"key":"68_CR12","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/1030083.1030096","volume-title":"11th ACM Conference on Computer and Communications Security (CCS 2004)","author":"X. Boyen","year":"2004","unstructured":"Boyen, X.: Reusable Cryptographic Fuzzy Extractors. In: 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 82\u201391. ACM Press, New York (2004)"},{"key":"68_CR13","doi-asserted-by":"crossref","unstructured":"Sakoe, H., Chiba, S.: Dynamic Programming Algorithm Optimization for Spoken Word Recognition. IEEE Trans. on Acoustics, Speech & Signal Processing\u00a0ASSP-26(1) (1978)","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"68_CR14","unstructured":"Hastie, T., Kishon, E.: A model for Signature Verification, AT&T Bell Laboratories Technical Report (1992)"},{"key":"68_CR15","unstructured":"Kholmatov, A.A.: Biometry Identity Verification Using On-line and Off-line Signature Verification, Master of Science Thesis, Sabanci University (2003)"},{"key":"68_CR16","doi-asserted-by":"crossref","unstructured":"Plamondon, R., Srihari, S.: On-line and Off-line Handwriting Recognition: A Compre-hensive Survey. IEEE Trans. on Pattern Analysis and Machine Intelligence\u00a022(1) (2000)","DOI":"10.1109\/34.824821"},{"key":"68_CR17","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/S0167-8655(03)00155-7","volume":"24","author":"H. Feng","year":"2003","unstructured":"Feng, H., Chan, C.W.: Online Signature Verification using a New Extreme Points Warping Technique. Pattern Recognition Letters\u00a024, 2943\u20132951 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"68_CR18","unstructured":"Martinez, J.C.R., Lopez, J.J.V., Rosas, F.J.L.: A Low-cost System for Signature Recognition. In: Int. Congress on Research in Electrical and Electronics Engineering (2002)"},{"issue":"1","key":"68_CR19","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0031-3203(89)90036-8","volume":"22","author":"F.L. Chan","year":"1989","unstructured":"Chan, F.L., Kamins, D.: Signature Recognition through Spectral Analysis. Pattern Recognition\u00a022(1), 39\u201344 (1989)","journal-title":"Pattern Recognition"},{"key":"68_CR20","unstructured":"SVC 2004: First International Signature Verification Competition (2004), http:\/\/www.cs.ust.hk\/svc2004\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11608288_68.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:06:42Z","timestamp":1619507202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11608288_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540311119","9783540316213"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11608288_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}