{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:10:20Z","timestamp":1737357020776,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540742814"},{"type":"electronic","value":"9783540742821"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74282-1_96","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T15:13:02Z","timestamp":1186672382000},"page":"858-867","source":"Crossref","is-referenced-by-count":0,"title":["Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques"],"prefix":"10.1007","author":[{"given":"Hakjae","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sungju","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Daesung","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Yongwha","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"96_CR1","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2003","unstructured":"Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)"},{"key":"96_CR2","first-page":"33","volume-title":"Biometric Recognition: Security and Privacy Concerns","author":"S. Prabhakar","year":"2003","unstructured":"Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns, pp. 33\u201342. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"96_CR3","unstructured":"Stalling, W.: Cryptography and Network Security. Pearson Ed. Inc. (2003)"},{"key":"96_CR4","volume-title":"Digital Watermarking","author":"I. Cox","year":"2002","unstructured":"Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"key":"96_CR5","unstructured":"Korea Information Security Agency: A Guideline to the Security of Biometric Data (in Korean) (2005)"},{"key":"96_CR6","unstructured":"Moon, D., et al.: Performance Analysis of the Match-on-Card System for the Fingerprint Authentication. In: Proc. of International Workshop on Information Security Applications, pp. 449\u2013459 (2001)"},{"key":"96_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/b97425","volume-title":"Automatic Fingerprint Recognition Systems","author":"N. Ratha","year":"2004","unstructured":"Ratha, N., Bolle, R.: Automatic Fingerprint Recognition Systems. Springer, Heidelberg (2004)"},{"key":"96_CR8","unstructured":"Jain, A., Uludag, U.: Hiding Fingerprint Minutiae in Images. In: Proc. of AutoID, pp. 97\u2013102 (2002)"},{"key":"96_CR9","doi-asserted-by":"crossref","unstructured":"Jain, A., Uludag, U., Hsu, R.: Hiding a Face in a Fingerprint Image. In: Proc. of ICPR, pp. 756\u2013759 (2002)","DOI":"10.1109\/ICPR.2002.1048100"},{"key":"96_CR10","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1117\/1.1287795","volume":"9","author":"M. Yeung","year":"2000","unstructured":"Yeung, M., Pankanti, S.: Verification Watermarks on Fingerprint Recognition and Retrieval. Journal of Electronic Imaging\u00a09, 468\u2013476 (2000)","journal-title":"Journal of Electronic Imaging"},{"key":"96_CR11","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.1016\/S0031-3203(01)00250-3","volume":"35","author":"B. Gunsel","year":"2002","unstructured":"Gunsel, B., Uludag, U., Tekalp, A.: Robust Watermarking of Fingerprint Images. Pattern Recognition\u00a035, 2739\u20132747 (2002)","journal-title":"Pattern Recognition"},{"key":"96_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1007\/11553939_147","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"Y. Chung","year":"2005","unstructured":"Chung, Y., et al.: Hiding Biometric Data for Secure Transmission. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol.\u00a03683, pp. 1049\u20131057. Springer, Heidelberg (2005)"},{"key":"96_CR13","series-title":"Lecture Notes in Computer Science","first-page":"217","volume-title":"Digital Rights Management","author":"T. Kim","year":"2006","unstructured":"Kim, T., et al.: Secure Remote Fingerprint Verification using Dual Watermarks. In: Safavi-Naini, R., Yung, M. (eds.) DRMTICS 2005. LNCS, vol.\u00a03919, pp. 217\u2013227. Springer, Heidelberg (2006)"},{"key":"96_CR14","unstructured":"Dugad, R., Ratakonda, K., Ahuja, N.: A New Wavelet-based Scheme for Watermarking Images. In: Proc. of the ICIP (1998)"},{"key":"96_CR15","doi-asserted-by":"crossref","unstructured":"Ye, W., Vijaykrishnan, N., Kandemir, M., Irwin, M.J.: The Design and Use of SimplePower: A Cycle-Accurate Energy Estimation Tool*. In: Annual ACM IEEE Design Automation Conference, pp. 340\u2013345 (2000)","DOI":"10.1145\/337292.337436"},{"key":"96_CR16","volume-title":"Computer Architecture \u2013 A Quantitative Approach","author":"J. Hennessy","year":"2007","unstructured":"Hennessy, J., Patterson, D.: Computer Architecture \u2013 A Quantitative Approach. Morgan Kaufmann, San Francisco (2007)"},{"key":"96_CR17","unstructured":"Intel: Intel StrongARM* SA-1110 Microprocessor (2000)"},{"key":"96_CR18","unstructured":"NiGen: http:\/\/www.nitgen.com"}],"container-title":["Communications in Computer and Information Science","Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74282-1_96","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T06:46:49Z","timestamp":1737355609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74282-1_96"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540742814","9783540742821"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74282-1_96","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2007]]}}}