{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:25Z","timestamp":1725490525874},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_67","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T02:01:49Z","timestamp":1188352909000},"page":"636-645","source":"Crossref","is-referenced-by-count":2,"title":["Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection"],"prefix":"10.1007","author":[{"given":"Yi C.","family":"Feng","sequence":"first","affiliation":[]},{"given":"Pong C.","family":"Yuen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"67_CR1","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U. Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE\u00a092(6), 948\u2013960 (2004)","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"67_CR2","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N. Ratha","year":"2001","unstructured":"Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometric-based authentication systems. IBM Systems Journal\u00a040(3), 614\u2013634 (2001)","journal-title":"IBM Systems Journal"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Ratha, N., Connell, J., Bolle, R., Chikkerur, S.: Cancelable biometrics: A case study in Fingerprints. In: Proceedings of International Conference on Pattern Recognition (2006)","DOI":"10.1109\/ICPR.2006.353"},{"issue":"2","key":"67_CR4","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A.K. Jain","year":"2006","unstructured":"Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security\u00a01(2), 125\u2013143 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Adler, A.: Images can be regenerated from quantized biometric match score data. In: Proceedings of Canadian conference of Electrical and Computer Engineering, pp. 469\u2013472 (2004)","DOI":"10.1109\/CCECE.2004.1345057"},{"key":"67_CR6","doi-asserted-by":"crossref","unstructured":"Boult, T.: Robust distance measures for face-recognition supporting revocable biometric tokens. In: Proceeding of International Conference on Automatic Face and Gesture recognition (2006)","DOI":"10.1109\/FGR.2006.94"},{"key":"67_CR7","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Sixth ACM Conf. on Comp. and Comm. Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"key":"67_CR8","volume-title":"IEEE International Symposium on Information Theory","author":"A. Juels","year":"2002","unstructured":"Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: IEEE International Symposium on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"67_CR9","doi-asserted-by":"crossref","unstructured":"Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: Proc. ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45\u201352 (2003)","DOI":"10.1145\/982507.982516"},{"key":"67_CR10","doi-asserted-by":"crossref","unstructured":"Ngo, D.C.L., Teoh, A.B.J., Goh, A.: Biometric Hash: High-Confidence Face Recognition. IEEE transactions on circuits and systems for video technology\u00a016(6) (2006)","DOI":"10.1109\/TCSVT.2006.873780"},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Feng, Y.C., Yuen, P.C.: Class-Distribution Preserving Transform for Face Biometric Data Security. In: ICASSP 2007. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing 2007 (in press)","DOI":"10.1109\/ICASSP.2007.366192"},{"issue":"7","key":"67_CR12","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"P.N. Belhumeur","year":"1997","unstructured":"Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. IEEE Trans. on PAMI\u00a019(7), 711\u2013720 (1997)","journal-title":"IEEE Trans. on PAMI"},{"key":"67_CR13","doi-asserted-by":"crossref","unstructured":"Goh, A., Ngo, D.C.L.: Computation of cryptographic keys from face biometrics. In: Proc. 7th IFIP TC6\/TC11 Conf. Commun. Multimedia Security, vol.\u00a022, pp. 1\u201313 (2003)","DOI":"10.1007\/978-3-540-45184-6_1"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:23:40Z","timestamp":1619504620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}