{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:45:16Z","timestamp":1761648316422,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_8","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation"],"prefix":"10.1007","author":[{"given":"Thi Ai Thao","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dinh Thanh","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/962081.962102","volume":"47","author":"AK Jain","year":"2004","unstructured":"Jain, A.K., Ross, A.: Multibiometric systems. Commun. ACM 47(1), 34\u201340 (2004)","journal-title":"Commun. ACM"},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2011-1","volume":"2011","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 1\u201325 (2011)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2010.2043188","volume":"5","author":"M Upmanyu","year":"2010","unstructured":"Upmanyu, M., et al.: Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans. Inf. Forensics Secur. 5(2), 255\u2013268 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2008\/657081","volume":"2008","author":"AK Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 1\u201317 (2008)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"4B","key":"8_CR5","first-page":"30","volume":"51","author":"VQP Huynh","year":"2013","unstructured":"Huynh, V.Q.P., et al.: A combination of ANN and secure sketch for generating strong biometric key. J. Sci. Technol. Vietnamese Acad. Sci. Technol. 51(4B), 30\u201339 (2013)","journal-title":"J. Sci. Technol. Vietnamese Acad. Sci. Technol."},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","first-page":"57","volume-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI","author":"TTB Le","year":"2015","unstructured":"Le, T.T.B., Dang, T.K., Truong, Q.C., Nguyen, T.A.T.: Protecting biometric features by periodic function-based transformation and fuzzy vault. In: Hameurlain, A., K\u00fcng, J., Wagner, R., Thoai, N., Dang, T.K. (eds.) TLDKS XVI. LNCS, vol. 8960, pp. 57\u201370. Springer, Heidelberg (2015)"},{"key":"8_CR7","unstructured":"Lifang, W., Songlong, Y.: A face based fuzzy vault scheme for secure online authentication. In: Second International Symposium on Data, Privacy and E-Commerce (ISDPE) (2010)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Failla, P., Sutcu, Y., Barni, M.: eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, pp. 241\u2013246. ACM, Roma (2010)","DOI":"10.1145\/1854229.1854271"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H.L., Nguyen, T.T.H.: An approach to protect private key using fingerprint biometric encryption key in BioPKI based security system. In: The 10th International Conference on Control, Automation, Robotics and Vision, ICARCV (2008)","DOI":"10.1109\/ICARCV.2008.4795763"},{"issue":"5","key":"8_CR10","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1002\/sec.225","volume":"4","author":"K Xi","year":"2011","unstructured":"Xi, K., et al.: A fingerprint based bio-cryptographic security protocol designed for client\/server authentication in mobile computing environment. Secur. Commun. Netw. 4(5), 487\u2013499 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Al-Assam, H., Rashid, R., Jassim, S.: Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. In: The 8th International Conference for Internet Technology and Secured Transactions (ICITST 2013) (2013)","DOI":"10.1109\/ICITST.2013.6750224"},{"issue":"11","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/TPAMI.2003.1240122","volume":"25","author":"AK Jain","year":"2003","unstructured":"Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25(11), 1494\u20131498 (2003)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR13","unstructured":"Fengling, H., Alkhathami, M., Van Schyndel, R.: Biometric-Kerberos authentication scheme for secure mobile computing services. In: The 6th International Congress on Image and Signal Processing (CISP 2013) (2013)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Juels, A. Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28\u201336. ACM, Kent Ridge Digital Labs, Singapore (1999)","DOI":"10.1145\/319709.319714"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Al-Assam, H., Sellahewa, H., Jassim, S.: A lightweight approach for biometric template protection. In: Proceedings of SPIE (2009)","DOI":"10.1117\/12.818291"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:51:53Z","timestamp":1569383513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}