{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:14:30Z","timestamp":1771611270305,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031781094","type":"print"},{"value":"9783031781100","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78110-0_7","type":"book-chapter","created":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T21:53:08Z","timestamp":1733089988000},"page":"98-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["One-Factor Cancelable Biometric Template Protection Scheme for\u00a0Real-Valued Features"],"prefix":"10.1007","author":[{"given":"Ruoqi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Peisong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Kewei","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"7_CR1","unstructured":"Casia-facev5. http:\/\/biometrics.idealtest.org\/"},{"key":"7_CR2","unstructured":"Fvc2002. http:\/\/bias.csr.unibo.it\/fvc2002\/"},{"issue":"3","key":"7_CR3","first-page":"175","volume":"7541","author":"NAKN Abhishek","year":"2010","unstructured":"Abhishek, N.A.K.N., Akumar, B., Anil, K.J.A.: Biometric template transformation: a security analysis. Proc. SPIE 7541(3), 175\u2013178 (2010)","journal-title":"Proc. SPIE"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Charikar, M.: Similarity estimation techniques from rounding algorithms. In: Reif, J.H. (ed.) Proceedings on 34th Annual ACM Symposium on Theory of Computing, 19\u201321 May 2002, Montr\u00e9al, Qu\u00e9bec, Canada, pp. 380\u2013388. ACM (2002)","DOI":"10.1145\/509907.509965"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TIFS.2022.3230212","volume":"18","author":"TM Dang","year":"2022","unstructured":"Dang, T.M., Nguyen, T.D., Hoang, T., Kim, H., Teoh, A.B.J., Choi, D.: Avet: a novel transform function to improve cancellable biometrics security. IEEE Trans. Inf. Forensics Secur. 18, 758\u2013772 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: Arcface: additive angular margin loss for deep face recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019, Long Beach, CA, USA, 16\u201320 June 2019, pp. 4690\u20134699. Computer Vision Foundation\/IEEE (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Durbet, A., Lafourcade, P., Migdal, D., Thiry-Atighehchi, K., Grollemund, P.M.: Authentication attacks on projection-based cancelable biometric schemes. In: International Conference on Security and Cryptography (2021)","DOI":"10.5220\/0011277100003283"},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JDM.321546","volume":"34","author":"Y Feng","year":"2023","unstructured":"Feng, Y., Wang, H., Zhang, D., Li, J., Tao, L.: One-factor cancellable fingerprint template protection based on index self-encoding. J. Database Manag. (JDM) 34(3), 1\u201318 (2023)","journal-title":"J. Database Manag. (JDM)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.1109\/TIFS.2020.2977533","volume":"15","author":"L Ghammam","year":"2020","unstructured":"Ghammam, L., Karabina, K., Lacharme, P., Thiry-Atighehchi, K.: A cryptanalysis of two cancelable biometric schemes based on index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 15, 2869\u20132880 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1049\/iet-bmt.2017.0210","volume":"7","author":"EE Hansley","year":"2018","unstructured":"Hansley, E.E., Segundo, M.P., Sarkar, S.: Employing fusion of learned and handcrafted features for unconstrained ear recognition. IET Biometrics 7(3), 215\u2013223 (2018)","journal-title":"IET Biometrics"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: Vitter, J.S. (ed.) Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, Dallas, Texas, USA, 23\u201326 May 1998, pp. 604\u2013613. ACM (1998)","DOI":"10.1145\/276698.276876"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s42400-023-00137-0","volume":"6","author":"Y Jiang","year":"2023","unstructured":"Jiang, Y., Shen, P., Zeng, L., Zhu, X., Jiang, D., Chen, C.: Cancelable biometric schemes for euclidean metric and cosine metric. Cybersecurity 6(1), 4 (2023)","journal-title":"Cybersecurity"},{"issue":"11","key":"7_CR13","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245\u20132255 (2004)","journal-title":"Pattern Recogn."},{"issue":"2","key":"7_CR14","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2017","unstructured":"Jin, Z., Hwang, J.Y., Lai, Y.L., Kim, S., Teoh, A.B.J.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393\u2013407 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"7_CR15","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1109\/TSMC.2015.2499725","volume":"46","author":"Z Jin","year":"2016","unstructured":"Jin, Z., Lim, M., Teoh, A.B.J., Goi, B., Tay, Y.H.: Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans. Syst. Man Cybern. Syst. 46(10), 1415\u20131428 (2016)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Kim, J., Teoh, A.B.J.: One-factor cancellable biometrics based on indexing-first-order hashing for fingerprint authentication. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 3108\u20133113. IEEE (2018)","DOI":"10.1109\/ICPR.2018.8545565"},{"issue":"3","key":"7_CR17","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.patcog.2011.06.005","volume":"45","author":"A Kumar","year":"2012","unstructured":"Kumar, A., Wu, C.: Automated human identification using ear imaging. Pattern Recogn. 45(3), 956\u2013968 (2012)","journal-title":"Pattern Recogn."},{"key":"7_CR18","unstructured":"Lacharme, P.: Analysis of the iriscodes bioencoding scheme. Int. J. Comput. Sci. Softw. Eng. (IJCSSE 2012) 6(5), 315\u2013321 (2012)"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.patcog.2016.10.035","volume":"64","author":"YL Lai","year":"2017","unstructured":"Lai, Y.L., et al.: Cancellable iris template generation based on indexing-first-one hashing. Pattern Recogn. 64, 105\u2013117 (2017)","journal-title":"Pattern Recogn."},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"3170","DOI":"10.1109\/TIFS.2021.3073802","volume":"16","author":"Y Lai","year":"2021","unstructured":"Lai, Y., Jin, Z., Wong, K., Tistarelli, M.: Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans. Inf. Forensics Secur. 16, 3170\u20133185 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Lee, M.J., Jin, Z., Li, M., Chen, D.B.W.: Mixing binary face and fingerprint based on extended feature vector (EFV) hashing. In: 2019 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), pp.\u00a01\u20132. IEEE (2019)","DOI":"10.1109\/ISPACS48206.2019.8986315"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Lee, M.J., Jin, Z., Teoh, A.B.J.: One-factor cancellable scheme for fingerprint template protection: extended feature vector (EFV) hashing. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630782"},{"key":"7_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102350","volume":"108","author":"MJ Lee","year":"2021","unstructured":"Lee, M.J., Teoh, A.B.J., Uhl, A., Liang, S.N., Jin, Z.: A tokenless cancellable scheme for multimodal biometric systems. Comput. Secur. 108, 102350 (2021)","journal-title":"Comput. Secur."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Lee, Y., Chung, Y., Moon, K.: Inverse operation and preimage attack on biohashing. In: 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, pp. 92\u201397. IEEE (2009)","DOI":"10.1109\/CIB.2009.4925692"},{"issue":"9","key":"7_CR25","doi-asserted-by":"publisher","first-page":"13087","DOI":"10.1007\/s11042-022-12424-y","volume":"81","author":"H Li","year":"2022","unstructured":"Li, H., Wang, X.: One factor cancellable fingerprint scheme based on novel minimum hash signature and secure extended feature vector. Multimedia Tools Appl. 81(9), 13087\u201313113 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12424-y","journal-title":"Multimedia Tools Appl."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Manisha, Kumar, N.: Cancelable biometrics: a comprehensive survey. Artif. Intell. Rev. 53(5), 3403\u20133446 (2020)","DOI":"10.1007\/s10462-019-09767-8"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Ouda, O., Tsumura, N., Nakaguchi, T.: Tokenless cancelable biometrics scheme for protecting iris codes. In: 2010 20th International Conference on Pattern Recognition, pp. 882\u2013885. IEEE (2010)","DOI":"10.1109\/ICPR.2010.222"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Pillai, J.K., Patel, V.M., Chellappa, R., Ratha, N.K.: Sectored random projections for cancelable iris biometrics. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1838\u20131841. IEEE (2010)","DOI":"10.1109\/ICASSP.2010.5495383"},{"issue":"3","key":"7_CR29","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Sadhya, D., Akhtar, Z., Dasgupta, D.: A locality sensitive hashing based approach for generating cancelable fingerprints templates. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp.\u00a01\u20139. IEEE (2019)","DOI":"10.1109\/BTAS46853.2019.9185991"},{"issue":"11","key":"7_CR31","doi-asserted-by":"publisher","first-page":"2972","DOI":"10.1109\/TIFS.2019.2907014","volume":"14","author":"D Sadhya","year":"2019","unstructured":"Sadhya, D., Raman, B.: Generation of cancelable iris templates via randomized bit sampling. IEEE Trans. Inf. Forensics Secur. 14(11), 2972\u20132986 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"131338","DOI":"10.1109\/ACCESS.2019.2938019","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang, X., Li, H.: One-factor cancellable palmprint recognition scheme based on oiom and minimum signature hash. IEEE Access 7, 131338\u2013131354 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78110-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T23:32:07Z","timestamp":1733095927000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78110-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"ISBN":["9783031781094","9783031781100"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78110-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}