{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:06:21Z","timestamp":1761645981134},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_29","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T11:31:09Z","timestamp":1224502269000},"page":"227-234","source":"Crossref","is-referenced-by-count":22,"title":["A Multi-biometric Verification System for the Privacy Protection of Iris Templates"],"prefix":"10.1007","author":[{"given":"S.","family":"Cimato","sequence":"first","affiliation":[]},{"given":"M.","family":"Gamassi","sequence":"additional","affiliation":[]},{"given":"V.","family":"Piuri","sequence":"additional","affiliation":[]},{"given":"R.","family":"Sassi","sequence":"additional","affiliation":[]},{"given":"F.","family":"Scotti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"29_CR1","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A.K. Jain","year":"2006","unstructured":"Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A tool for information security. IEEE Trans. on information forensics and security\u00a01(2), 125\u2013143 (2006)","journal-title":"IEEE Trans. on information forensics and security"},{"key":"29_CR2","first-page":"948","volume":"92","author":"U. Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.: Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management\u00a092, 948\u2013960 (2004)","journal-title":"Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management"},{"issue":"3","key":"29_CR3","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/TPAMI.2005.57","volume":"27","author":"R. Snelick","year":"2005","unstructured":"Snelick, R., Uludag, U., Mink, A., Indovina, M., Jain, A.K.: Large scale evaluation of multi-modal biometric authentication using state of the art systems. IEEE Trans. Pattern Analysis and Machine Intelligence\u00a027(3), 450\u2013455 (2005)","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: A biometric verification system addressing privacy concerns. In: IEEE International Conference on Computational Intelligence and Security (CIS 2007), pp. 594\u2013598 (2007)","DOI":"10.1109\/CIS.2007.117"},{"key":"29_CR5","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Cryptology Eprint Archive, Tech. Rep. 2006\/235 (2006)"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-73458-1_8","volume-title":"Information Security and Privacy","author":"J. Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Cohen, G., Kindari, B., Zemor, G.: An application of the goldwasser-micali cryptosystem to biometric authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 96\u2013106. Springer, Heidelberg (2007)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: Theory and practice. IEEE Trans. on Information Forensics and Security\u00a02(3) (2007)","DOI":"10.1109\/TIFS.2007.902022"},{"key":"29_CR8","unstructured":"Chinese Academy of Sciences: Database of 756 greyscale eye images; Version 1.0 (2003), \n                    \n                      http:\/\/www.sinobiometrics.com\/IrisDatabase.htm"},{"key":"29_CR9","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J.G. Daugman","year":"1993","unstructured":"Daugman, J.G.: High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. on Pattern Analysis and Machine Intelligence\u00a015, 1148\u20131161 (1993)","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"key":"29_CR10","unstructured":"Masek, L.: Recognition of human iris patterns for biometric identification. Bachelor\u2019s Thesis, School of Computer Science and Software Engineering, University of Western Australia (2003)"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:04Z","timestamp":1619524624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_29","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}