{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:43:28Z","timestamp":1761648208671},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319097695"},{"type":"electronic","value":"9783319097701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_6","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T03:25:20Z","timestamp":1408418720000},"page":"60-71","source":"Crossref","is-referenced-by-count":2,"title":["A Hash-Based Index Method for Securing Biometric Fuzzy Vaults"],"prefix":"10.1007","author":[{"given":"Thi Thuy Linh","family":"Vo","sequence":"first","affiliation":[]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[]},{"given":"Josef","family":"K\u00fcng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Cavoukian, A., Stoianov, A.: Biometric Encryption. In: Encyclopedia of Biometrics, pp. 260\u2013269. Springer (2009)","DOI":"10.1007\/978-0-387-73003-5_63"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractor: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"issue":"4B","key":"6_CR3","first-page":"203","volume":"51","author":"Q.P. Huynh Van","year":"2013","unstructured":"Huynh Van, Q.P., Thai, T.T.T., Dang, T.K., Wagner, R.: A Combination of ANN and Secure Sketch for Generating Strong Biometric Key. Journal of Science and Technology, Vietnamese Academy of Science and Technology\u00a051(4B), 203\u2013212 (2013)","journal-title":"Journal of Science and Technology, Vietnamese Academy of Science and Technology"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-642-36818-9_13","volume-title":"Information and Communication Technology","author":"T.T. Dang","year":"2013","unstructured":"Dang, T.T., Truong, Q.C., Dang, T.K.: Practical Constructions of Face-based Authentication Systems with Template Protection Using Secure Sketch. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 121\u2013130. Springer, Heidelberg (2013)"},{"key":"6_CR5","unstructured":"Truong, Q.C., Le, T.B.T., Nguyen, T.A.T., Dang, T.K.: A Hybrid Scheme of Fuzzy Vault and Feature Transformation for Biometric Template Protection. Journal of Science and Technology, Vietnamese Academy of Science and Technology\u00a051(4B), 30\u201339 (2013) ISSN 0866-708X"},{"key":"6_CR6","unstructured":"Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of IEEE, International Symposium on Information Theory, p. 408 (2002)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Chang, E.-C., Shen, R., Teo, F.W.: Finding the Original Point Set Hidden among Chaff. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 182\u2013188 (2006)","DOI":"10.1145\/1128817.1128845"},{"key":"6_CR8","unstructured":"\u0102llescu, P.M.: The Fuzzy Vault Fingerprints is Vulnerable to Brute Force Attack. In: Proceedigs of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 43\u201354 (2009)"},{"key":"6_CR9","unstructured":"Merkle, J., Niesing, M., Schwaiger, M., Lhmor, H.: Performance of the Fuzzy Vault for Multiple Fingerprints. In: Proceedings of the International Conferece of Biometrics Special Interest Group (BIOSIG), pp. 57\u201372 (2010)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Nandakumar, K., Jain, A.K.: Multibiometric Template Security Using Fuzzy Vault. In: Proceedings of the IEEE Second International Conference on Biometrics: Theory, Application and Systems (BTAS), Arlington, VA, USA, pp. 1\u20136 (2008)","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Moon, D., Choi, W.-Y., Moon, K., Chung, Y.: Fuzzy Fingerprint Vault using Multiple Polynomials. In: Proceedings of the 13th IEEE International Symposium on Consumer Electronics, Kyoto, Japan, pp. 290\u2013293 (2009)","DOI":"10.1109\/ISCE.2009.5156914"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"AlTarawneh, M.S., Woo, W.L., Dlay, S.S.: Fuzzy Vault Crypto Biometric Key Based on Fingerprint Vector Features. In: Proceedings of the 6th International Symposium on Communication Systems, Networks and Digital Signal Processing, Graz, pp. 452\u2013456 (2008)","DOI":"10.1109\/CSNDSP.2008.4610727"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Scheirer, W.J., Boult, T.E.: Cracking Fuzzy Vaults and Biometric Enscryption. In: Proceedings of Biometrics Symposium, Baltimore, MD, pp. 1\u20136 (2007)","DOI":"10.1109\/BCC.2007.4430534"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Kholmatov, A., Yanikoglu, B.: Realization of Correlation Attack Against the Fuzzy Vault Scheme. In: Proceedings of the SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X (2008)","DOI":"10.1117\/12.766861"},{"key":"6_CR15","unstructured":"Poona, H.T., Miria, A.: A Collusion Attack on the Fuzzy Vault Scheme. The ISC International Journal of Information Security, 27\u201334 (2009)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Nagar, A., et al.: Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors. In: Proceedings of the 19th International Conference on Pattern Recognition (ICPR), pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761459"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J. Daugman","year":"2004","unstructured":"Daugman, J.: How Iris Recognition Works? IEEE Transactions on Circuits and Systems for Video Technology\u00a014(1), 21\u201330 (2004)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"9","key":"6_CR18","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F. Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Transactions on Computers\u00a055(9), 1081\u20131088 (2006)","journal-title":"IEEE Transactions on Computers"},{"key":"6_CR19","unstructured":"CASIA Iris Image Database: http:\/\/biometrics.idealtest.org\/"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Krichen, E., Dorizzi, B., Sun, Z., Garcia-Salicetti, S., Tan, T.: Iris Recognition. In: Petrovska-Delacr\u00e9taz, D., Chollet, G., Dorizzi, B. (eds.) Guide to Biometric Reference Systems and Performance Evaluation, pp. 25\u201350. Springer (2009)","DOI":"10.1007\/978-1-84800-292-0_3"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-642-55032-4_36","volume-title":"Information and Communication Technology","author":"N. Van Nguyen","year":"2014","unstructured":"Van Nguyen, N., Nguyen, V.Q., Nguyen, M.N.B., Dang, T.K.: Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems. In: Linawati, Mahendra, M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) ICT-EurAsia 2014. LNCS, vol.\u00a08407, pp. 365\u2013374. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T09:04:03Z","timestamp":1598173443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}