{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:00:03Z","timestamp":1743130803122,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491745"},{"type":"electronic","value":"9783319491752"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49175-2_6","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T06:59:42Z","timestamp":1478674782000},"page":"114-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes"],"prefix":"10.1007","author":[{"given":"Koray","family":"Karabina","sequence":"first","affiliation":[]},{"given":"Angela","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-540-75670-5_10","volume-title":"Provable Security","author":"R Affeldt","year":"2007","unstructured":"Affeldt, R., Tanaka, M., Marti, N.: Formal proof of provable security by game-playing in a proof assistant. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 151\u2013168. Springer, Heidelberg (2007). doi:\n                      10.1007\/978-3-540-75670-5_10"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143\u2013161 (2001)","journal-title":"Theoret. Comput. Sci."},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-70500-0_3","volume-title":"Information Security and Privacy","author":"M Barbosa","year":"2008","unstructured":"Barbosa, M., Brouard, T., Cauchie, S., Sousa, S.M.: Secure biometric authentication with improved accuracy. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 21\u201336. Springer, Heidelberg (2008). doi:\n                      10.1007\/978-3-540-70500-0_3"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Barni, M., Bianchi, T., Catalano, D., Raimondo, M., Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: ACM Workshop on Multimedia and Security, pp. 231\u2013240 (2010)","DOI":"10.1145\/1854229.1854270"},{"key":"6_CR6","first-page":"313","volume":"48","author":"G Blakley","year":"1979","unstructured":"Blakley, G.: Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. 48, 313\u2013317 (1979)","journal-title":"Proc. Natl. Comput. Conf."},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-23822-2_11","volume-title":"Computer Security \u2013 ESORICS 2011","author":"M Blanton","year":"2011","unstructured":"Blanton, M., Gasti, P.: Secure and efficient protocols for Iris and fingerprint identification. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 190\u2013209. Springer, Heidelberg (2011). doi:\n                      10.1007\/978-3-642-23822-2_11"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-73458-1_8","volume-title":"Information Security and Privacy","author":"J Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Izabach\u00e8ne, M., Pointcheval, D., Tang, Q., Zimmer, S.: An application of the goldwasser-micali cryptosystem to biometric authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 96\u2013106. Springer, Heidelberg (2007). doi:\n                      10.1007\/978-3-540-73458-1_8"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.scico.2008.09.016","volume":"74","author":"J Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Kindarji, B.: The best of both worlds: applying secure sketches to cancelable biometrics. Sci. Comput. Program. 74, 43\u201351 (2008)","journal-title":"Sci. Comput. Program."},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/BFb0054760","volume-title":"Computer Vision \u2014 ECCV 98","author":"TF Cootes","year":"1998","unstructured":"Cootes, T.F., Edwards, G.J., Taylor, C.J.: Active appearance models. In: Burkhardt, H., Neumann, B. (eds.) ECCV 1998. LNCS, vol. 1407, pp. 484\u2013498. Springer, Heidelberg (1998). doi:\n                      10.1007\/BFb0054760"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao, F.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55, 1081\u20131088 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MC.2012.364","volume":"45","author":"A Jain","year":"2012","unstructured":"Jain, A., Nanadakumar, K.: Biometric authentication: system security and user privacy. IEEE Comput. Soc. 45, 87\u201392 (2012)","journal-title":"IEEE Comput. Soc."},{"issue":"2","key":"6_CR13","first-page":"303","volume":"10","author":"M Nakajima","year":"2002","unstructured":"Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. J. WSCG 10(2), 303\u2013310 (2002)","journal-title":"J. WSCG"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"M Naor","year":"1997","unstructured":"Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322\u2013336. Springer, Heidelberg (1997). doi:\n                      10.1007\/BFb0052245"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 94","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). doi:\n                      10.1007\/BFb0053419"},{"key":"6_CR16","unstructured":"Neurotechnology. Verilook SDK (1998). \n                      http:\/\/www.neurotechnology.com"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Rao, Y.S., Sukonkina, Y., Bhagwati, C., Singh, U.K.: Fingerprint based authentication application using visual cryptography methods (improved id card). In: TENCON 2008\u20132008 IEEE Region 10 Conference, pp. 1\u20135. IEEE (2008)","DOI":"10.1109\/TENCON.2008.4766425"},{"key":"6_CR18","first-page":"1","volume":"1","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometircs. EURASIP J. Inf. Secur. 1, 1\u201325 (2011)","journal-title":"EURASIP J. Inf. Secur."},{"key":"6_CR19","unstructured":"Revenkar, P., Anjum, A., Gandhare, W.: Secure iris authentication using visual cryptography. arXiv preprint \n                      arXiv:1004.1748\n                      \n                     (2010)"},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/TIFS.2010.2097252","volume":"6","author":"A Ross","year":"2011","unstructured":"Ross, A., Othman, A.: Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70\u201381 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"6_CR22","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs (2004). \n                      http:\/\/eprint.iacr.org\/2004\/332"},{"key":"6_CR23","unstructured":"Stegmann, M.B.: Active appearance models, theory, extensions and cases. Master\u2019s thesis, Informatics and Mathematical Modelling, Technical University of Denmark, DTU, Richard Petersens Plads, Building 321, DK-2800 Kgs. Lyngby, August 2000"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Stoianov, A.: Cryptographically secure biometric. SPIE, Biometric Technology for Human Identification VII, vol. 7667, pp. 1\u201312 (2010)","DOI":"10.1117\/12.849028"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49175-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:38:31Z","timestamp":1558316311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49175-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491745","9783319491752"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49175-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"10 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICITS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Theoretic Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tacoma","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icits2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}