{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T13:30:56Z","timestamp":1763904656962,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74549-5_64","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T06:01:49Z","timestamp":1188367309000},"page":"604-613","source":"Crossref","is-referenced-by-count":34,"title":["Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes"],"prefix":"10.1007","author":[{"given":"Val\u00e9rie Viet Triem","family":"Tong","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Sibert","sequence":"additional","affiliation":[]},{"given":"J\u00e9r\u00e9my","family":"Lec\u0153ur","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Girault","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"64_CR1","unstructured":"Bazen, A.M., Guerez, H.: Directional field computation for fingerprints based on the principal component analysis of local gradients. In: Proc. of 11th annual Workshop on Circuits, Systems and Signal Processing, 2000 (2000)"},{"key":"64_CR2","volume-title":"Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society","author":"R. Bolle","year":"1998","unstructured":"Bolle, R., Pankanti, S.: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell, MA, USA (1998)"},{"key":"64_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/11761679_5","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"E.-C. Chang","year":"2006","unstructured":"Chang, E.-C., Li, Q.: Hiding secret points amidst chaff. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 59\u201372. Springer, Heidelberg (2006)"},{"key":"64_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/982507.982516","volume-title":"WBMA 2003","author":"T.C. Clancy","year":"2003","unstructured":"Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: WBMA 2003. Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, pp. 45\u201352. ACM Press, New York (2003)"},{"key":"64_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"issue":"5","key":"64_CR6","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/83.841531","volume":"9","author":"A. Jain","year":"2000","unstructured":"Jain, A., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. Proc. of IEEE Transactions on Image Processing\u00a09(5), 846\u2013859 (2000)","journal-title":"Proc. of IEEE Transactions on Image Processing"},{"key":"64_CR7","doi-asserted-by":"crossref","unstructured":"Jain, A., Ross, A., Prabhakar, S.: Fingerprint matching using minutiae and texture features. In: ICIP. Proc. of International Conference on Image Processing, Thessaloniki, Greece, pp. 282\u2013285 (October 2001)","DOI":"10.1109\/ICIP.2001.958106"},{"key":"64_CR8","unstructured":"Jain, A., Uludag, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence (2003)"},{"key":"64_CR9","volume-title":"Handbook of Fingerprint Recognition","author":"A.K. Jain","year":"2003","unstructured":"Jain, A.K., Maltoni, D.: Handbook of Fingerprint Recognition. Springer, New York (2003)"},{"key":"64_CR10","volume-title":"Proceedings of IEEE International Symposium on Information Theory","author":"A. Juels","year":"2002","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"64_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/319709.319714","volume-title":"CCS 1999","author":"A. Juels","year":"1999","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: CCS 1999. Proceedings of the 6th ACM conference on Computer and communications security, pp. 28\u201336. ACM Press, New York (1999)"},{"key":"64_CR12","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"64_CR13","volume-title":"The Theory of Error-Correcting Codes, Part II","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes, Part II. North-Holland, Amsterdam (1977)"},{"key":"64_CR14","unstructured":"Prabhakar, S.: Fingerprint Classification and Matching Using a Filterbank. PhD thesis"},{"key":"64_CR15","unstructured":"Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proc. Workshop: Biometrics: Challenges Arising from Theory to Practice, pp. 13\u201316 (2004)"},{"key":"64_CR16","doi-asserted-by":"crossref","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.: Biometric cryptosystems: Issues and challenges (2004)","DOI":"10.1109\/JPROC.2004.827372"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:43:54Z","timestamp":1737398634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540745488","9783540745495"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}