{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:07:20Z","timestamp":1742958440780,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387730028"},{"type":"electronic","value":"9780387730035"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-73003-5_64","type":"book-chapter","created":{"date-parts":[[2009,7,27]],"date-time":"2009-07-27T01:10:47Z","timestamp":1248657047000},"page":"1322-1327","source":"Crossref","is-referenced-by-count":2,"title":["Template Security"],"prefix":"10.1007","author":[{"given":"Andy","family":"Adler","sequence":"first","affiliation":[]},{"given":"Raffaele","family":"Cappelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Jain, A.K., Nagar, A., Nandakumar, K.: Biometric template security. EURASIP. J. Adv. Signal Proc. (2008). doi: http:\/\/hindawi.com\/RecentlyAcceptedArticlePDF.aspx?journal=ASP&number=579416","key":"64_CR1_64"},{"unstructured":"Jain, A.K., Ross, A., Uludag, U.: Biometric template security: Challenges and solutions. In: Proceedings of 13th European Signal Processing Conference (EUSIPCO2005), Antalya, Turkey, 2005","key":"64_CR2_64"},{"unstructured":"International Biometric Group.: Generating images from templates. (2002) www.biometricgroup.com\/reports\/public\/reports\/templates images.html","key":"64_CR3_64"},{"doi-asserted-by":"crossref","unstructured":"Tarantola, A.: Inverse problem theory and methods for model parameter estimation. Society for Industrial and Applied Mathematics (2005). ISBN 0-89871-572-5","key":"64_CR4_64","DOI":"10.1137\/1.9780898717921"},{"unstructured":"Hill, C.: Risk of Masquerade arising from the storage of biometrics. Dissertation, Austrailian National University (2001)","key":"64_CR5_64"},{"doi-asserted-by":"crossref","unstructured":"Ross, A., Shah, J., Jain, A.K.: Towards reconstructing fingerprints from minutiae points. In: Conference of SPIE Biometric Technology for Human Identification, II, 5779, 68\u201380 (2005)","key":"64_CR6_64","DOI":"10.1117\/12.604477"},{"key":"64_CR7_64","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/TPAMI.2007.1018","volume":"29","author":"A. Ross","year":"2007","unstructured":"Ross, A., Shah, J., Jain, A.K.: From template to image: reconstructing fingerprints from minutiae points. IEEE Trans. Pattern Anal. Machine Intel. 29, 544\u2013560 (2007)","journal-title":"IEEE Trans. Pattern Anal. Machine Intel"},{"doi-asserted-by":"crossref","unstructured":"Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Evaluating minutiae template vulnerability to masquerade attack. In: Proceedings of 5th IEEE Workshop Auto Ident. Adv Technol. Alghero, Italy, 7\u20138 June 2007","key":"64_CR8_64","DOI":"10.1109\/AUTOID.2007.380615"},{"key":"64_CR9_64","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/TPAMI.2007.1087","volume":"29","author":"R. Cappelli","year":"2007","unstructured":"Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Fingerprint image reconstruction from standard templates. IEEE Trans. Pattern Match. Mach. Intell. 29, 1489\u20131503 (2007)","journal-title":"IEEE Trans. Pattern Match. Mach. Intell"},{"key":"64_CR10_64","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1016\/0031-3203(95)00154-9","volume":"29","author":"P. Vizcaya","year":"1996","unstructured":"Vizcaya, P., Gerhardt, L.: A nonlinear orientation model for global description of fingerprints. Pattern Recogn. 29, 1221\u20131231 (1996)","journal-title":"Pattern Recogn"},{"unstructured":"Soutar, C., Gilroy, R., Stoianov, A.: Biometric system performance and security. In: Proceedings of the Conference of IEEE Auto Identification Advanced Technology (1999)","key":"64_CR11_64"},{"doi-asserted-by":"crossref","unstructured":"Adler, A.: Sample images can be independently restored from face recognition templates. In: Proceedings of Can. Conf. Elec. Comp. Eng.\u2009 Montr\u00e9al, Canada, pp. 1163\u20131166 (2003)","key":"64_CR12_64","DOI":"10.1109\/CCECE.2003.1226104"},{"doi-asserted-by":"crossref","unstructured":"Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Proc. SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI 5306, 622\u2013633 (2004)","key":"64_CR13_64","DOI":"10.1117\/12.530907"},{"unstructured":"BioAPI Consortium.: BioAPI Specification version 1.1 (2001)","key":"64_CR14_64"},{"doi-asserted-by":"crossref","unstructured":"Adler, A.: Images can be regenerated from quantized biometric match score data. In: Proceedings of Can. Conf. Elec. Comp. Eng.\u2009 Niagara Falls, Canada, pp. 469\u2013472 (2004)","key":"64_CR15_64","DOI":"10.1109\/CCECE.2004.1345057"},{"unstructured":"International Labour Organization.: Biometric testing campaign report (Addendum to Part I). Geneva (2005)","key":"64_CR16_64"},{"unstructured":"The Guardian.: Cracked it! (17 Nov. 2006)","key":"64_CR17_64"}],"container-title":["Encyclopedia of Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73003-5_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T12:35:57Z","timestamp":1739277357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73003-5_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387730028","9780387730035"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73003-5_64","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}