{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:20:56Z","timestamp":1740097256623,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319303024"},{"type":"electronic","value":"9783319303031"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30303-1_8","type":"book-chapter","created":{"date-parts":[[2016,2,24]],"date-time":"2016-02-24T05:41:07Z","timestamp":1456292467000},"page":"117-133","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes"],"prefix":"10.1007","author":[{"given":"Masaya","family":"Yasuda","sequence":"first","affiliation":[]},{"given":"Takeshi","family":"Shimoyama","sequence":"additional","affiliation":[]},{"given":"Narishige","family":"Abe","sequence":"additional","affiliation":[]},{"given":"Shigefumi","family":"Yamada","sequence":"additional","affiliation":[]},{"given":"Takashi","family":"Shinzaki","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Koshiba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,25]]},"reference":[{"key":"8_CR1","volume-title":"Recent Application in Biometrics","author":"R Belguechi","year":"2011","unstructured":"Belguechi, R., Alimi, V., Cherrier, E., Lacharme, P., Rosenberger, C.: An overview on privacy preserving biometrics. In: Yang, J. (ed.) Recent Application in Biometrics. InTech, Croatia (2011)"},{"key":"8_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543401","volume-title":"Algebraic Codes on Lines, Planes, and Curves: An Engineering Approach","author":"RE Blahut","year":"2008","unstructured":"Blahut, R.E.: Algebraic Codes on Lines, Planes, and Curves: An Engineering Approach. Cambridge University Press, Cambridge (2008)"},{"issue":"11","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J Daugman","year":"1993","unstructured":"Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 15(11), 1148\u20131161 (1993)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"8_CR4","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0031-3203(02)00030-4","volume":"36","author":"J Daugman","year":"2003","unstructured":"Daugman, J.: The importance of being random: statistical principles of iris recognition. Pattern Recogn. 36(2), 279\u2013291 (2003)","journal-title":"Pattern Recogn."},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523\u2013540. Springer, Heidelberg (2004). Full version in SIAM Journal on Computing, 38 (1), 97\u2013139 (2008)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Failla, P., Sutcu, Y., Barni, M.: Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, pp. 241\u2013246. ACM (2010)","DOI":"10.1145\/1854229.1854271"},{"key":"8_CR7","unstructured":"Fujitsu Laboratories Ltd.: Press release: Fujitsu develops world\u2019s first authentication technology to extract and match 2,048-bit feature codes from palm vein images (2013), \n                      http:\/\/www.fujitsu.com\/global\/news\/pr\/archives\/month\/2013\/20130805-01.html"},{"issue":"9","key":"8_CR8","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081\u20131088 (2006)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-015-0273-1","volume":"14","author":"T Hoang","year":"2015","unstructured":"Hoang, T., Choi, D., Nguyen, T.: Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. Int. J. Inf. Secur. 14(6), 1\u201312 (2015)","journal-title":"Int. J. Inf. Secur."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Ignatenko, T., Willems, F.M.: On privacy in secure biometric authentication systems. In: IEEE International Conference on Acoustics, Speech and Signal Processing\u2013ICASSP, vol. 2, pp. 121\u2013124 (2007)","DOI":"10.1109\/ICASSP.2007.366187"},{"issue":"2","key":"8_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TIFS.2010.2046984","volume":"5","author":"T Ignatenko","year":"2010","unstructured":"Ignatenko, T., Willems, F.M.: Information leakage in fuzzy commitment schemes. IEEE Trans. Inf. Forensics Secur. 5(2), 337\u2013348 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"113:1","DOI":"10.1155\/2008\/579416","volume":"2008","author":"AK Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 113:1\u2013113:17 (2008). \n                      http:\/\/dx.doi.org\/10.1155\/2008\/579416","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Crypt. 38(2), 237\u2013257 (2006)","journal-title":"Des. Codes Crypt."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28\u201336. ACM (1999)","DOI":"10.1145\/319709.319714"},{"key":"8_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of fingerprint recognition","author":"D Maltoni","year":"2009","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of fingerprint recognition, 2nd edn. Springer, Heidelberg (2009)","edition":"2"},{"issue":"44","key":"8_CR16","first-page":"114","volume":"42","author":"RJ McEliece","year":"1978","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42(44), 114\u2013116 (1978)","journal-title":"DSN Prog. Rep."},{"key":"8_CR17","volume-title":"Mathematical Methods and Algorithms","author":"TK Moon","year":"2005","unstructured":"Moon, T.K.: Error correction coding. Mathematical Methods and Algorithms. Wiley, Hoboken (2005)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/978-3-540-74549-5_97","volume-title":"Advances in Biometrics","author":"K Nandakumar","year":"2007","unstructured":"Nandakumar, K., Nagar, A., Jain, A.K.: Hardening fingerprint fuzzy vault using password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927\u2013937. Springer, Heidelberg (2007)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"8_CR20","first-page":"16","volume":"9","author":"J Pandey","year":"2005","unstructured":"Pandey, J., Ojha, D., Sharma, A.: Enhance fuzzy commitment scheme: an approach for post quantum cryptosystem. J. Appl. Theor. Inf. Technol. 9, 16\u201319 (2005)","journal-title":"J. Appl. Theor. Inf. Technol."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., Uhl, A.: Statistical attack against iris-biometric fuzzy commitment schemes. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops\u2013CVPRW, pp. 23\u201330 (2011)","DOI":"10.1109\/CVPRW.2011.5981720"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/978-3-642-41827-3_47","volume-title":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","author":"C Rathgeb","year":"2013","unstructured":"Rathgeb, C., Uhl, A., Wild, P.: Iris-biometric fuzzy commitment schemes under image compression. In: Ruiz-Shulcloper, J., Sanniti di Baja, G. (eds.) CIARP 2013, Part II. LNCS, vol. 8259, pp. 374\u2013381. Springer, Heidelberg (2013)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 111\u2013116. ACM (2005)","DOI":"10.1145\/1073170.1073191"},{"issue":"12","key":"8_CR24","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","volume":"28","author":"AB Teoh","year":"2006","unstructured":"Teoh, A.B., Goh, A., Ngo, D.C.: Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892\u20131901 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR25","unstructured":"U.S. Department of Homeland Security: Privacy impact assessment for the biometric storage system (28 March 2007)"},{"issue":"2","key":"8_CR26","first-page":"3","volume":"108","author":"X Zhou","year":"2007","unstructured":"Zhou, X., Kevenaar, T.A., Kelkboom, E., Busch, C., Veen, M., Nouak, A.: Privacy enhancing technology for a 3D-face recognition system. BIOSIG 108(2), 3\u201314 (2007)","journal-title":"BIOSIG"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30303-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:34:44Z","timestamp":1559388884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30303-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319303024","9783319303031"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30303-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}