{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:30:41Z","timestamp":1759091441256,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_79","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T06:01:49Z","timestamp":1188367309000},"page":"750-759","source":"Crossref","is-referenced-by-count":21,"title":["Robust Extraction of Secret Bits from Minutiae"],"prefix":"10.1007","author":[{"given":"Ee-Chien","family":"Chang","sequence":"first","affiliation":[]},{"given":"Sujoy","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"79_CR1","doi-asserted-by":"crossref","unstructured":"Buhan, I., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. In: ASIACCS, pp. 353\u2013355 (2007)","DOI":"10.1145\/1229285.1229325"},{"key":"79_CR2","unstructured":"Chang, E.-C., Fedyukovych, V., Li, Q.: Secure sketch for multi-sets. Cryptology ePrint Archive, Report 2006\/090 (2006)"},{"key":"79_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_5","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"E.-C. Chang","year":"2006","unstructured":"Chang, E.-C., Li, Q.: Hiding secret points amongst chaff. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, Springer, Heidelberg (2006)"},{"key":"79_CR4","volume-title":"Proc. ACM Sym on Information, Computer and Communications Security","author":"E.-C. Chang","year":"2006","unstructured":"Chang, E.-C., Shen, R., Teo, W.: Finding the original point set hideen among chaff. In: Proc. ACM Sym on Information, Computer and Communications Security, ACM Press, New York (2006)"},{"key":"79_CR5","volume-title":"IEEE AUTOID","author":"S. Chikkerur","year":"2005","unstructured":"Chikkerur, S., Ratha, N.: Impact of singular point detection on fingerprint matching performance. In: IEEE AUTOID, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"79_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/982507.982516","volume-title":"ACM SIGMM workshop on Biometrics methods and applications","author":"T.C. Clancy","year":"2003","unstructured":"Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: ACM SIGMM workshop on Biometrics methods and applications, pp. 45\u201352. ACM Press, New York (2003)"},{"key":"79_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"79_CR8","volume-title":"IEEE Intl. Symp. on Information Theory","author":"A. Juels","year":"2002","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE Intl. Symp. on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"79_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/319709.319714","volume-title":"ACM Conf. on Computer and Communications Security","author":"A. Juels","year":"1999","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conf. on Computer and Communications Security, pp. 28\u201336. ACM Press, New York (1999)"},{"key":"79_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"J.-P.M.G. Linnartz","year":"2003","unstructured":"Linnartz, J.-P.M.G., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 393\u2013402. Springer, Heidelberg (2003)"},{"key":"79_CR11","unstructured":"Nilsson, K.: Localization of corresponding points in fingerprints by complex filtering. PhD thesis, Chalmers University of Technology, Sweden (2005)"},{"key":"79_CR12","doi-asserted-by":"crossref","unstructured":"Verbauwhede, I.M., Yang, S.: Secure fuzzy vault based fingerprint verification system. In: 38th Asilomar Conf. on Signals, Systems, and Computers, vol.\u00a01, pp. 577\u2013581 (2004)","DOI":"10.1109\/ACSSC.2004.1399199"},{"key":"79_CR13","volume-title":"Proc. IEEE Workshop on Privacy Research In Vision","author":"U. Uludag","year":"2006","unstructured":"Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Proc. IEEE Workshop on Privacy Research In Vision, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"79_CR14","unstructured":"Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, R., Janet, S.: NIST fingerprint image software 2. NIST Special Database\u00a0(2006)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_79.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:44:16Z","timestamp":1737398656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_79","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}