{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:42:33Z","timestamp":1774417353308,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540745488","type":"print"},{"value":"9783540745495","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_84","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T06:01:49Z","timestamp":1188367309000},"page":"800-808","source":"Crossref","is-referenced-by-count":57,"title":["Biometric Key Binding: Fuzzy Vault Based on Iris Images"],"prefix":"10.1007","author":[{"given":"Youn Joo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Kwanghyuk","family":"Bae","sequence":"additional","affiliation":[]},{"given":"Sung Joo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kang Ryoung","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jaihie","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"84_CR1","doi-asserted-by":"crossref","unstructured":"Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Proceedings of Audio- and Video-based Biometrics, December 4, 2006 DRAFT 31 Person Authentication, Rye Town, USA, July 2005, pp. 310\u2013319 (2005)","DOI":"10.1007\/11527923_32"},{"key":"84_CR2","unstructured":"Trappe, W., Washington, L.C.: Introduction to Cryptography with coding theory. Prentice-Hall, Upper Saddle River, NJ"},{"key":"84_CR3","volume-title":"CCS 2002","author":"A. Juels","year":"2002","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: CCS 2002. ACM Conference on Computer and Communications Security, ACM, New York (2002)"},{"key":"84_CR4","doi-asserted-by":"crossref","unstructured":"Bae, K.H.: An Iris Feature Extraction Method using the Independent Component Analysis. The Graduate School of Yonsei University, Dept. of Electrical and Electronic Eng. (2002)","DOI":"10.1007\/3-540-44887-X_97"},{"key":"84_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1007\/3-540-44887-X_97","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"K.H. Bae","year":"2003","unstructured":"Bae, K.H., Noh, S.I., Park, Kim, J.H.: Iris Feature Extraction Using Independent Component Analysis. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 838\u2013844. Springer, Heidelberg (2003)"},{"key":"84_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/982507.982516","volume-title":"Proceedings of ACM SIGMM Workshop on Biometric Methods and Applications","author":"T. Clancy","year":"2003","unstructured":"Clancy, T., Lin, D., Kiyavash, N.: Secure Smartcard-Based Fingerprint Authentication. In: Proceedings of ACM SIGMM Workshop on Biometric Methods and Applications, Berkley, USA, November 2003, pp. 45\u201352. ACM, New York (2003)"},{"key":"84_CR7","doi-asserted-by":"crossref","unstructured":"Uludag, U., et al.: Securing Fingerprint Template: Fuzzy Vault With Helper Data. In: Proc. of CVPR Workshop on Privacy Research In Vision, New York, USA, June 2006, p. 163 (2006)","DOI":"10.1109\/CVPRW.2006.185"},{"key":"84_CR8","unstructured":"Shibata, Y., Nishigak, M.: A study on biometric key generation. Asian Biometrics Forum (2006)"},{"key":"84_CR9","first-page":"609","volume-title":"Proc. of IEEE ICASSP","author":"S. Yang","year":"2005","unstructured":"Yang, S., et al.: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In: Proc. of IEEE ICASSP, Philadelphia, USA, March 2005, vol.\u00a05, pp. 609\u2013612. IEEE, Los Alamitos (2005)"},{"key":"84_CR10","doi-asserted-by":"crossref","unstructured":"Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia, J.: Cryptographic Key Generation Using Handwritten Signature. In: Proceedings of Biometric Technologies for Human Identification III, Orlando, USA, April 2006, vol.\u00a06202, pp. 225\u2013231 (2006)","DOI":"10.1117\/12.665875"},{"key":"84_CR11","unstructured":"Feng, Y.C., Yuen, P.C.: Protecting Face Biometric Data on Smartcard with Reed-Solomon Code. In: Proceedings of CVPR Workshop on Privacy Research In Vision, New York, USA, June 2006, p. 29 (2006)"},{"issue":"1","key":"84_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J. Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Techno.\u00a014(1), 21\u201330 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Techno."},{"key":"84_CR13","volume-title":"Error Control Systems for Digital Communication and Storage","author":"S.B. Wicker","year":"1995","unstructured":"Wicker, S.B.: Error Control Systems for Digital Communication and Storage. Prentice-Hall, Englewood Cliffs, NJ (1995)"},{"key":"84_CR14","unstructured":"Sylvester, J.: Reed-Solomon Codes (January 2001), Available from http:\/\/www.elektrobit.co.uk"},{"key":"84_CR15","unstructured":"Sklar, B.: Reed-Solomon Codes (accessed on 2007.2.10), Available at http:\/\/www.informit.com\/content\/images\/art_sklar7_reed-solomon\/elementLinks\/art_sklar7_reed-solomon.pdf"},{"key":"84_CR16","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Har, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Chichester (2001)","edition":"2"},{"key":"84_CR17","volume-title":"Advanced Engineering Mathematics","author":"E. Kreyszig","year":"1999","unstructured":"Kreyszig, E.: Advanced Engineering Mathematics, 8th edn. Wiley, Chichester (1999)","edition":"8"},{"key":"84_CR18","unstructured":"(accessed on 2007.1. 2) http:\/\/berc.yonsei.ac.kr"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_84.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:23:47Z","timestamp":1619519027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_84"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_84","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}