{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:17:31Z","timestamp":1726003051603},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050627"},{"type":"electronic","value":"9783030050634"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05063-4_50","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T19:23:45Z","timestamp":1544124225000},"page":"643-653","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Biometric Authentication Scheme Based on Chaotic Map"],"prefix":"10.1007","author":[{"given":"Jiahao","family":"Liang","sequence":"first","affiliation":[]},{"given":"Lin","family":"You","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"5","key":"50_CR1","first-page":"123","volume":"25","author":"SJ Deng","year":"2003","unstructured":"Deng, S.J., Li, C.D.: Chaos theory and its application in cryptography. J. Civil, Archit. Environ. Eng. 25(5), 123\u2013127 (2003)","journal-title":"J. Civil, Archit. Environ. Eng."},{"issue":"1","key":"50_CR2","first-page":"1","volume":"2008","author":"AK Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008(1), 1\u201317 (2008)","journal-title":"EURASIP J. Adv. Sig. Process."},{"issue":"2","key":"50_CR3","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1049\/cje.2017.01.009","volume":"26","author":"L You","year":"2017","unstructured":"You, L., Yang, L., Yu, W., Wu, Z.: A cancelable fuzzy vault algorithm based on transformed fingerprint features. Chin. J. Electron. 26(2), 236\u2013243 (2017)","journal-title":"Chin. J. Electron."},{"key":"50_CR4","unstructured":"Kaur, M., Sofat, S.: Fuzzy vault template protection for multimodal biometric system. In: International Conference on Computing, Communication and Automation, pp. 237\u2013243. IEEE, Greater Noida (2011)"},{"issue":"5","key":"50_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MSP.2015.2423693","volume":"32","author":"MH Lim","year":"2015","unstructured":"Lim, M.H., Teoh, A.B.J., Kim, J.: Biometric feature-type transformation: making templates compatible for secret protection. IEEE Signal Process. Mag. 32(5), 77\u201387 (2015)","journal-title":"IEEE Signal Process. Mag."},{"issue":"C","key":"50_CR6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.patcog.2017.01.024","volume":"67","author":"M Gomez-Barrero","year":"2017","unstructured":"Gomez-Barrero, M., Maiorana, E., Galbally, J., Campisi, P., Fierrez, J.: Multi-biometric template protection based on homomorphic encryption. Pattern Recognit. 67(C), 149\u2013163 (2017)","journal-title":"Pattern Recognit."},{"issue":"10","key":"50_CR7","first-page":"1","volume":"77","author":"L Teng","year":"2017","unstructured":"Teng, L., Wang, X., Meng, J.: A chaotic color image encryption using integrated bit-level permutation. Multimed. Tools Appl. 77(10), 1\u201314 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"50_CR8","first-page":"247","volume":"10","author":"M Ahmad","year":"2018","unstructured":"Ahmad, M., Alam, M.Z., Umayya, Z., Khan, S., Ahmad, F.: An image encryption approach using particle swarm optimization and chaotic map. Int. J. Inf. Technol. 10(3), 247\u2013255 (2018)","journal-title":"Int. J. Inf. Technol."},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Liew, C.Z., Shaw, R., Li, L., Yang, Y.: Survey on biometric data security and chaotic encryption strategy with Bernoulli mapping. In: 2014 International Conference on Medical Biometrics, pp. 174\u2013180. IEEE, Shenzhen (2014)","DOI":"10.1109\/ICMB.2014.37"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Ghouzali, S., Abdul, W.: Private chaotic biometric template protection algorithm. In: Image Information Processing (ICIIP), pp. 655\u2013659. IEEE, Shimla (2013)","DOI":"10.1109\/ICIIP.2013.6707676"},{"issue":"5","key":"50_CR11","first-page":"31","volume":"2","author":"D James","year":"2012","unstructured":"James, D., Philip, M.: A novel face template protection scheme based on chaos and visual cryptography. Int. J. Appl. Inf. Syst. 2(5), 31\u201335 (2012)","journal-title":"Int. J. Appl. Inf. Syst."},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Supriya, V.G., Manjunatha, R.: Logistic map for cancellable biometrics. In: ICAMT (2016)","DOI":"10.1088\/1757-899X\/225\/1\/012176"},{"issue":"3","key":"50_CR13","first-page":"340","volume":"38","author":"L Bing","year":"2017","unstructured":"Bing, L.: A binary sequence scrambling encryption algorithm based on improved logistic mapping. J. China West Normal Univ. (Nat. Sci.) 38(3), 340\u2013346 (2017)","journal-title":"J. China West Normal Univ. (Nat. Sci.)"},{"issue":"6","key":"50_CR14","first-page":"1231","volume":"7","author":"L You","year":"2016","unstructured":"You, L., Wang, J., Yan, B.: A secure finger vein recognition algorithm based on MB-GLBP and logistic mapping. J. Inf. Hiding Multimedia Sig. Process. 7(6), 1231\u20131242 (2016)","journal-title":"J. Inf. Hiding Multimedia Sig. Process."},{"key":"50_CR15","unstructured":"Cheng, W., An, G.: Face template protection using chaotic encryption. In: 5th IET International Conference on Wireless, Mobile and Multimedia Networks, pp. 245\u2013248. IET, Beijing (2013)"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Fu, C., Zhu, Z.: A chaotic image encryption scheme based on circular bit shift method. In: International Conference for Young Computer Scientists, pp. 3057\u20133061. IEEE, Zhang Jiajie (2008)","DOI":"10.1109\/ICYCS.2008.522"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05063-4_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T18:20:13Z","timestamp":1573064413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05063-4_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050627","9783030050634"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05063-4_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2018\/authors.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"407","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"141","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}