{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T02:30:11Z","timestamp":1770517811477,"version":"3.49.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319763538","type":"print"},{"value":"9783319763545","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76354-5_28","type":"book-chapter","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T11:43:48Z","timestamp":1520595828000},"page":"309-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Biometric Template Privacy Using Visual Cryptography"],"prefix":"10.1007","author":[{"given":"Sana","family":"Ibjaoun","sequence":"first","affiliation":[]},{"given":"Anas","family":"Abou El Kalam","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Poirriez","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Ait Ouahman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04117-4","volume-title":"Handbook of Information and Communication Security","author":"P Stavroulakis","year":"2010","unstructured":"Stavroulakis, P., Stamp, M.: Handbook of Information and Communication Security. Springer, Heidelberg (2010)"},{"issue":"3","key":"28_CR2","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometric-based authentication systems. IBM Syst. J. 40(3), 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"key":"28_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2009","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, London (2009)"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric encryption using image processing. In: Photonics West 1998 Electronic Imaging, International Society for Optics and Photonics, pp. 178\u2013188 (1998)","DOI":"10.1117\/12.304705"},{"issue":"6","key":"28_CR5","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948\u2013960 (2004)","journal-title":"Proc. IEEE"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)","DOI":"10.1109\/ISIT.2002.1023680"},{"issue":"4","key":"28_CR7","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K Nandakumar","year":"2007","unstructured":"Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744\u2013757 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28\u201336. ACM (1999)","DOI":"10.1145\/319709.319714"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Li, Q., Chang, E.C.: Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 56\u201361. ACM (2006)","DOI":"10.1145\/1161366.1161377"},{"issue":"3","key":"28_CR10","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/TIFS.2007.902022","volume":"2","author":"Y Sutcu","year":"2007","unstructured":"Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: theory and practice. IEEE Trans. Inf. Forensics Secur. 2(3), 503\u2013512 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M., Chikkerur, S.: Cancelable biometrics: a case study in fingerprints. In: 18th International Conference on Pattern Recognition (ICPR 2006), vol. 4, pp. 370\u2013373 (2006)","DOI":"10.1109\/ICPR.2006.353"},{"issue":"4","key":"28_CR12","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561\u2013572 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"28_CR13","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/TSMCA.2010.2041653","volume":"40","author":"E Maiorana","year":"2010","unstructured":"Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., Neri, A.: Cancelable templates for sequence based biometrics with application to on-line signature recognition. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(3), 525\u2013538 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."},{"issue":"1","key":"28_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ipl.2004.09.014","volume":"93","author":"T Connie","year":"2005","unstructured":"Connie, T., Teoh, A., Goh, M., Ngo, D.: Palmhashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93(1), 1\u20135 (2005)","journal-title":"Inf. Process. Lett."},{"issue":"11","key":"28_CR15","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ABJ Teoh","year":"2004","unstructured":"Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245\u20132255 (2004)","journal-title":"Pattern Recogn."},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1007\/978-3-642-01793-3_88","volume-title":"Advances in Biometrics","author":"S Hirata","year":"2009","unstructured":"Hirata, S., Takahashi, K.: Cancelable biometrics with perfect secrecy for correlation-based matching. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 868\u2013878. Springer, Heidelberg (2009)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Chen, X., Bai, X., Tao, X., Pan, X.: Chaotic random projection for cancelable biometric key generation. In: Intelligent Science and Intelligent Data Engineering, pp. 605\u2013612. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-36669-7_74"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT 1994, pp. 1\u201312. Springer, Heidelberg (1995)","DOI":"10.1007\/BFb0053419"},{"key":"28_CR19","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.procs.2010.11.018","volume":"2","author":"T Monoth","year":"2010","unstructured":"Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143\u2013148 (2010)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"28_CR20","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/TIFS.2010.2097252","volume":"6","author":"A Ross","year":"2011","unstructured":"Ross, A., Othman, A.: Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70\u201381 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Ross, A., Othman, A.A.: Visual cryptography for face privacy. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, p. 76,670B (2010)","DOI":"10.1117\/12.852280"},{"issue":"12","key":"28_CR22","first-page":"2250","volume":"2","author":"C Divya","year":"2012","unstructured":"Divya, C., Surya, E.: Visual cryptography using palm print based on DCT algorithm. Int. J. Emerg. Technol. Adv. Eng. 2(12), 2250\u20132459 (2012)","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"28_CR23","unstructured":"Revenkar, P., Anjum, A., Gandhare, W.: Secure iris authentication using visual cryptography. arXiv preprint arXiv:10041748 (2010)"},{"issue":"2","key":"28_CR24","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.cviu.2006.01.002","volume":"102","author":"CS Chin","year":"2006","unstructured":"Chin, C.S., Jin, A.T.B., Ling, D.N.C.: High security iris verification system based on random secret integration. Comput. Vis. Image Underst. 102(2), 169\u2013177 (2006)","journal-title":"Comput. Vis. Image Underst."},{"key":"28_CR25","unstructured":"Sinduja, R., Sathiya, R., Vaithiyanathan, V.: Sheltered iris attestation by means of visual cryptography (SIA-VC). In: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp. 650\u2013655 (2012)"},{"issue":"113","key":"28_CR26","first-page":"1","volume":"2008","author":"AK Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A., et al.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008(113), 1\u201317 (2008)","journal-title":"EURASIP J. Adv. Sig. Process."}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76354-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T15:36:35Z","timestamp":1570894595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76354-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763538","9783319763545"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76354-5_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}