{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:17:54Z","timestamp":1766135874321,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_80","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T06:01:49Z","timestamp":1188367309000},"page":"760-769","source":"Crossref","is-referenced-by-count":42,"title":["Fuzzy Extractors for Minutiae-Based Fingerprint Authentication"],"prefix":"10.1007","author":[{"given":"Arathi","family":"Arakala","sequence":"first","affiliation":[]},{"given":"Jason","family":"Jeffers","sequence":"additional","affiliation":[]},{"given":"K. J.","family":"Horadam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"80_CR1","doi-asserted-by":"crossref","unstructured":"Ross, A., Shah, J., Jain, A.K.: Towards reconstructing fingerprints from minutiae points. In: Proc. SPIE, Biometric Technology for Human Identification II, vol.\u00a05779, pp. 68\u201380 (March 2005)","DOI":"10.1117\/12.604477"},{"key":"80_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/319709.319714","volume-title":"Sixth ACM Conference on Computer and Communications Security","author":"A. Juels","year":"1999","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Tsudik, G. (ed.) Sixth ACM Conference on Computer and Communications Security, pp. 28\u201336. ACM Press, New York (1999)"},{"key":"80_CR3","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/ISIT.2002.1023680","volume-title":"Proc. of IEEE ISIT","author":"A. Juels","year":"2002","unstructured":"Juels, A., Sudan, M.: A Fuzzy vault scheme. In: Proc. of IEEE ISIT, Lausanne, Switzerland, June 30-July 5, 2002, p. 408. IEEE Press, Los Alamitos (2002)"},{"key":"80_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"J.-P. Linnartz","year":"2003","unstructured":"Linnartz, J.-P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 393\u2013402. Springer, Heidelberg (2003)"},{"key":"80_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-540-25976-3_15","volume-title":"Biometric Authentication","author":"P. Tuyls","year":"2004","unstructured":"Tuyls, P., Goseling, J.: Capacity and Examples of Template-Protecting Biometric Authentication Systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol.\u00a03087, pp. 158\u2013170. Springer, Heidelberg (2004)"},{"key":"80_CR6","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Cryptology ePrint Archive, Report, 2003\/235 (2003), Available http:\/\/eprint.iacr.org","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"80_CR7","doi-asserted-by":"crossref","unstructured":"Uludag, U., Jain, A.K.: Securing fingerprint template: fuzzy vault with helper data. In: Proc. IEEE Workshop on Privacy Research In Vision, NY, June 22, 2006, p. 163 (2006)","DOI":"10.1109\/CVPRW.2006.185"},{"key":"80_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/11527923_45","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical Biometric Authentication with Template Protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.\u00a03546, pp. 436\u2013446. Springer, Heidelberg (2005)"},{"key":"80_CR9","doi-asserted-by":"crossref","unstructured":"Jeffers, J., Arakala, A.: Minutiae-based Structures for a Fuzzy Vault. In: Proc. of 2006 Biometrics Symposium, MD, USA, September 19-21, 2006 (2006)","DOI":"10.1109\/BCC.2006.4341622"},{"key":"80_CR10","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1017\/CBO9781139165464","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V. Shoup","year":"2005","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra, p. 125. Cambridge University Press, Cambridge (2005)"},{"key":"80_CR11","unstructured":"Harmon, K., Reyzin, L.: Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data (accessed October 3, 2006) (Online), Available: http:\/\/www.cs.bu.edu\/~reyzin\/code\/fuzzy.html"},{"key":"80_CR12","unstructured":"Shoup, V.: NTL: A Library for doing Number Theory (accessed October 9, 2006) (Online), available: http:\/\/shoup.net\/ntl"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_80.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T23:15:15Z","timestamp":1684019715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}