{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:30:32Z","timestamp":1761647432878,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540372776"},{"type":"electronic","value":"9783540372820"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11816102_38","type":"book-chapter","created":{"date-parts":[[2006,8,31]],"date-time":"2006-08-31T16:43:03Z","timestamp":1157042583000},"page":"342-351","source":"Crossref","is-referenced-by-count":7,"title":["A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation"],"prefix":"10.1007","author":[{"given":"Fengling","family":"Han","sequence":"first","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xinghuo","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2003","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)"},{"issue":"5","key":"38_CR2","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/83.841531","volume":"9","author":"A.K. Jain","year":"2000","unstructured":"Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based Fingerprint Matching. IEEE Trans. on Image Processing\u00a09(5), 846\u2013859 (2000)","journal-title":"IEEE Trans. on Image Processing"},{"issue":"5","key":"38_CR3","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/TPAMI.2003.1195995","volume":"25","author":"B. Bhanu","year":"2003","unstructured":"Bhanu, B., Tan, X.: Fingerprint Indexing Based on Novel Features of Minutiae Triplet. IEEE Trans. on Pattern Anal. Mach. Intell.\u00a025(5), 616\u2013622 (2003)","journal-title":"IEEE Trans. on Pattern Anal. Mach. Intell."},{"issue":"3","key":"38_CR4","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/TSMCC.2005.848167","volume":"35","author":"X. Tan","year":"2005","unstructured":"Tan, X., Bhanu, B., Lin, Y.: Fingerprint Classification Based on Learned Features. IEEE Trans. on Systems, Man, and Cyber.\u2013part C: Appl. Reviews\u00a035(3), 287\u2013300 (2005)","journal-title":"IEEE Trans. on Systems, Man, and Cyber.\u2013part C: Appl. Reviews"},{"issue":"4","key":"38_CR5","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/34.761265","volume":"21","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Prabhakar, S., Hong, L.: A Multi-channel Approach to Fingerprint Classification. IEEE Trans. on Pattern Anal. Mach. Intell.\u00a021(4), 348\u2013359 (1999)","journal-title":"IEEE Trans. on Pattern Anal. Mach. Intell."},{"key":"38_CR6","unstructured":"Tan, X., Bhanu, B., Lin, Y.: Fingerprint Identification: Classification vs. Indexing. In: Proc. of the IEEE Conf. on Advanced Video and Signal Based Surveillance, pp. 151\u2013156 (2003)"},{"issue":"8","key":"38_CR7","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/34.531800","volume":"18","author":"N.K. Ratha","year":"1996","unstructured":"Ratha, N.K., Karu, K., Chen, S., Jain, A.K.: A Real-time Matching System for Large Fingerprint Databases. IEEE Trans. on Pattern Anal. Mach. Intell.\u00a018(8), 799\u2013813 (1996)","journal-title":"IEEE Trans. on Pattern Anal. Mach. Intell."},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Liu, T., Zhu, G., Zhang, C., Hao, P.: Fingerprint Indexing Based on Singular Point Correlation. In: Proc. of Intern. Conf. on Image Processing, vol.\u00a03, pp. 293\u2013296 (2005)","DOI":"10.1109\/ICIP.2005.1530386"},{"key":"38_CR9","unstructured":"Boer, J., Bazen, A.M., Gerez, S.H.: Indexing Fingerprint Databases Based on Multiple Features. In: Workshop on Circuits, Systems and Signal Processing, Veldhoven, The Netherlands (2001)"},{"key":"38_CR10","unstructured":"Nandakumar, K., Jain, A.K.: Local Correlation-based Fingerprint Matching. In: Proc. of 4th Indian Conf. on Computer Vision, Graphics and Image Processing, Kolkata (2004)"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Wang, S., Zhang, W., Wang, Y.: Fingerprint Classification by Directional Fields. In: Proc. of 4th IEEE Conf. on Multimodal Interfaces, Pittsburgh, PA, USA (2002)","DOI":"10.1109\/ICMI.2002.1167027"},{"key":"38_CR12","first-page":"49","volume":"4","author":"J.C. Yen","year":"2000","unstructured":"Yen, J.C., Guo, J.I.: A New Key-based Design for Image Encryption and Decryption. Proc. of the IEEE Circuits and Systems\u00a04, 49\u201352 (2000)","journal-title":"Proc. of the IEEE Circuits and Systems"},{"key":"38_CR13","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/81.904880","volume":"I","author":"G. Jakimoski","year":"2001","unstructured":"Jakimoski, G., Kocarev, L.: Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Map. IEEE Trans. on Circuits and Systems\u00a0I, 163\u2013169 (2001)","journal-title":"IEEE Trans. on Circuits and Systems"},{"issue":"6","key":"38_CR14","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J. Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric Ciphers Based on Two-dimensional Chaotic Maps. Int. J. Bifurcation and Chaos\u00a08(6), 1259\u20131284 (1998)","journal-title":"Int. J. Bifurcation and Chaos"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Chen, G., Mao, Y., Chui, C.: A Symmetric Encryption Scheme Based on 3D Chaotic Cat Map, Chaos, Solitons & Fractals. \u00a021, 749\u2013761 (2004)","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"38_CR16","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining Cryptography with Biometrics Effectively, U. Cambridge Tech report UCAM-CL-TR-640"},{"key":"38_CR17","unstructured":"Biometric Encryption, http:\/\/www.bioscrypt.com\/assets\/biometric_encryption.pdf"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Bioinformatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11816102_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T18:44:06Z","timestamp":1736534646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11816102_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540372776","9783540372820"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11816102_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}