{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:29:36Z","timestamp":1758266976881,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":67,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_7","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"129-157","source":"Crossref","is-referenced-by-count":30,"title":["Bio-Cryptography"],"prefix":"10.1007","author":[{"given":"Kai","family":"Xi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"M.\u00a0McLoone, J.V.\u00a0McCanny: System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Plenum Publishing, USA 2003)","DOI":"10.1007\/978-1-4615-0043-8"},{"key":"7_CR2","volume-title":"Cryptography and Network Security Principles and Practice","author":"W. Stallings","year":"2003","unstructured":"W.\u00a0Stallings: Cryptography and Network Security Principles and Practice, 3rd edn. (Prentice Hall, Upper Saddle River, NJ 2003)","edition":"3"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"2","DOI":"10.2307\/2686311","volume":"18","author":"D. Luciano","year":"1987","unstructured":"D.\u00a0Luciano, G.\u00a0Prichett: Cryptology: From Caesar Ciphers to Public-Key Cryptosystems, Coll. Math. J. 18(1), 2\u201317 (1987)","journal-title":"Coll. Math. J."},{"key":"7_CR4","unstructured":"Substitution cipher: http:\/\/en.wikipedia.org\/wiki\/Substitution_cipher"},{"key":"7_CR5","unstructured":"Enigma: http:\/\/en.wikipedia.org\/wiki\/Enigma_machine"},{"key":"7_CR6","unstructured":"Transposition cipher: http:\/\/everything2.com\/e2node\/transposition"},{"key":"7_CR7","unstructured":"Details of the Data Encryption Standard: http:\/\/www.quadibloc.com\/crypto\/co040201.htm"},{"issue":"3","key":"7_CR8","first-page":"137","volume":"26","author":"J. Daemen","year":"2001","unstructured":"J. Daemen, V. Rijmen: Rijndael: The Advanced Encryption Standard, Dr. Dobb\u2019s J. 26(3), 137\u2013139 (2001)","journal-title":"Dr. Dobb\u2019s J."},{"key":"7_CR9","unstructured":"J. Weise: Public Key Infrastructure Overview, Sun BluePrints\u2122 OnLine (August 2001), http:\/\/www.sun.com\/blueprints\/0801\/publickey.pdf"},{"key":"7_CR10","unstructured":"Encryption with RSA, http:\/\/en.kioskea.net\/contents\/crypto\/rsa.php3"},{"key":"7_CR11","unstructured":"P. Montgomery: Preliminary Design of Post-Sieving Processing for RSA-768, CADO workshop on integer factorization (October 2008)"},{"issue":"7","key":"7_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSPEC.2006.1653001","volume":"43","author":"A.K. Jain","year":"2006","unstructured":"A.K.\u00a0Jain, S.\u00a0Pankanti: A touch of money, IEEE Spectr. 43(7), 14\u201319 (2006)","journal-title":"IEEE Spectr."},{"key":"7_CR13","unstructured":"K.D.\u00a0Mitnick, W.L.\u00a0Simon, S.\u00a0Wozniak: The Art of Deception: Controlling the Human Element of Security (Wiley, Canada 2002)"},{"key":"7_CR14","unstructured":"D.V.\u00a0Klien: Foiling the Cracker: A Survey of, and Improvements to Unix Password Security, Proc. 2nd USENIX Workshop on Security (1990) pp. 5\u201314"},{"key":"7_CR15","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2003","unstructured":"D.\u00a0Maltoni, D.\u00a0Maio, A.K.\u00a0Jain, S.\u00a0Prabhakar: Handbook of Fingerprint Recognition (Springer, New York 2003)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"C.P.F.\u00a0Bergadano, D.\u00a0Gunetti: User authentication through keystroke dynamics, ACM transactions on information and system security (2002)","DOI":"10.1145\/581271.581272"},{"issue":"1","key":"7_CR17","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1142\/S0219467801000086","volume":"1","author":"J.L. Wayman","year":"2001","unstructured":"J.L.\u00a0Wayman: Fundamentals of biometric authentication technologies, Int. J. Image Graph. 1(1), 93\u2013113 (2001)","journal-title":"Int. J. Image Graph."},{"key":"7_CR18","unstructured":"S.H.\u00a0Bazen, G.\u00a0Verwaaijen: A correlation-based fingerprint verification system, ProRISC 2000 Workshop on Circuits, Systems and Signal Processing (2000)"},{"issue":"11","key":"7_CR19","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.1016\/j.patcog.2008.04.002","volume":"41","author":"K.A. Toh","year":"2008","unstructured":"K.A.\u00a0Toh, J.\u00a0Kim, S.\u00a0Lee: Maximizing area under ROC curve for biometric scores fusion, Pattern Recognit. 41(11), 3373\u20133392 (2008)","journal-title":"Pattern Recognit."},{"key":"7_CR20","unstructured":"S. Chikkerur: Online fingerprint verification, http:\/\/www.cubs.buffalo.edu"},{"issue":"1","key":"7_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/LSP.2003.819351","volume":"11","author":"Y.W. Sen Wang","year":"2004","unstructured":"Y.W.\u00a0Sen Wang: Fingerprint enhancement in the singular point area, IEEE Signal Process. Lett. 11(1), 16\u201319 (2004)","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10994-006-9455-4","volume":"65","author":"K.A. Toh","year":"2006","unstructured":"K.A.\u00a0Toh: Training a reciprocal-sigmoid classifier by feature scaling-space, Mach. Learn. 65(1), 273\u2013308 (2006)","journal-title":"Mach. Learn."},{"issue":"4","key":"7_CR23","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TPAMI.2007.70730","volume":"30","author":"K.A. Toh","year":"2008","unstructured":"K.A.\u00a0Toh, H.L.\u00a0Eng: Between classification-error approximation and weighted least-squares learning, IEEE Trans. Pattern Anal. Mach. Intell. 30(4), 658\u2013669 (2008)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"7_CR24","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A. Jain","year":"1997","unstructured":"A.\u00a0Jain, H.\u00a0Lin, R.\u00a0Bolle: On-line fingerprint verification, IEEE Trans. Pattern Anal. Mach. Intell. 19(4), 302\u2013314 (1997)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR25","unstructured":"A.M.\u00a0Bazen, S.H.\u00a0Gerez: Thin-plate spline modelling of elastic deformations in fingerprints, Proc. 3rd IEEE Benelux Signal Processing Symposium, Leuven (2002)"},{"key":"7_CR26","unstructured":"X.\u00a0Jiang, W.\u00a0Yau: Fingerprint minutiae matching based on the local and global structures, Proc. 15th Int. Conf. on Pattern Recognition, Washington: IEEE Computer Society (2000)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"W.Y.\u00a0Zhang Wang: Core-based structure matching algorithm of fingerprint verification, Proc. ICPR 2002, IEEE, Vol. 1 (2002) pp. 70\u201374","DOI":"10.1109\/ICPR.2002.1044615"},{"key":"7_CR28","unstructured":"A.M.\u00a0Bazen, G.T.B. Verwaaijen, S.H.\u00a0Gerez, L.P.J.\u00a0Veelenturf, B.J.\u00a0van der Zwaag: A correlation-based fingerprint verification system, 11th Annual Workshop on Circuits Systems and Signal Processing (2000)"},{"key":"7_CR29","series-title":"LNCS","first-page":"886","volume-title":"AVBPA","author":"K. Venkataramani","year":"2003","unstructured":"K.\u00a0Venkataramani, B.K.V.\u00a0Kumar: Fingerprint Verification Using Correlation Filters. In: AVBPA, LNCS, Vol. 2688, ed. by J.\u00a0Kittler, M.S.\u00a0Nixon (Springer, Berlin 2003) pp. 886\u2013894"},{"issue":"4","key":"7_CR30","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/TPAMI.2007.1003","volume":"29","author":"Y. Wang","year":"2007","unstructured":"Y.\u00a0Wang, J.\u00a0Hu, D.\u00a0Philip: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing, IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 573\u2013585 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"7_CR31","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"N.K. Ratha","year":"2007","unstructured":"N.K.\u00a0Ratha, S.\u00a0Chikkerur, J.H.\u00a0Connell, R.M.\u00a0Bolle: Generating cancelable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561\u2013572 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Z.J. Hou, J.Li, H.K. Lam, T.P. Chen, H.L. Wang, W.Y.\u00a0Yau: Fingerprint orientation analysis with topological modeling, ICPR (2008)","DOI":"10.1109\/ICPR.2008.4761457"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"H.K. Lam, Z.J. Hou, W.Y. Yau, T.P. Chen, J.Li, K.Y.\u00a0Sim: Reference point detection for arch type fingerprints, Int. Conference on Biometrics (ICB) (2009)","DOI":"10.1007\/978-3-642-01793-3_68"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"H. K. Lam, Z. J. Hou, W. Y. Yau, T. P. Chen, J. Li: A systematic topological method for fingerprint singular point detection, 10th International Conf. on Control, Automation, Robotics and Vision, IEEE ICARCV (2008)","DOI":"10.1109\/ICARCV.2008.4795649"},{"key":"7_CR35","unstructured":"S.\u00a0Yang, I.\u00a0Verbauwhede: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme, Proc. IEEE ICASSP, Philadelphia, Vol. 5 (2005) pp. 609\u2013612"},{"key":"7_CR36","unstructured":"U.\u00a0Uludag, A.K.\u00a0Jain: Securing Fingerprint Template: Fuzzy Vault With Helper Data, Proceedings of CVPR Workshop on Privacy Research In Vision, New York (2006) p. 163"},{"issue":"4","key":"7_CR37","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K. Nandakumar","year":"2007","unstructured":"K.\u00a0Nandakumar, A.K.\u00a0Jain, S.\u00a0Pankanti: Fingerprint-based fuzzy vault: implementation and performance, IEEE Trans. Inf. Forensics Secur. 2(4), 744\u2013757 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR38","unstructured":"A.\u00a0Ross, A.\u00a0Jain, J.\u00a0Reisman: A Hybrid Fingerprint Matcher, 16th Int. Conference on Pattern Recognition (2002)"},{"key":"7_CR39","volume-title":"Multibiometric Systems: Fusion Strategies and Template Security","author":"K. Nandakumar","year":"2008","unstructured":"K.\u00a0Nandakumar: Multibiometric Systems: Fusion Strategies and Template Security. Ph.D. Thesis (Michigan State University, East Lansing, MI, USA 2008)"},{"key":"7_CR40","unstructured":"A.K.\u00a0Jain, S.\u00a0Pankanti, S.\u00a0Prabhakar, L.\u00a0Hong, A.\u00a0Ross: Biometrics: A Grand Challenge, Proc. Int. Conference on Pattern Recognition (ICPR), Cambridge, UK, Vol. 2 (2004) pp. 935\u2013942"},{"key":"7_CR41","unstructured":"N.K.\u00a0Ratha, J.H.\u00a0Connell, R.M.\u00a0Bolle: An analysis of minutiae matching strength, Proc. AVBPA 2001, 3rd Int. Conference on Audio- and Video-Based Biometric Person Authentication (2001) pp. 223\u2013228"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"U.\u00a0Uludag, S.\u00a0Pankanti, S.\u00a0Prabhakar, A.K.\u00a0Jain: Biometric Cryptosystems: Issues and Challenges, Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, Vol. 92, No. 6 (2004)","DOI":"10.1109\/JPROC.2004.827372"},{"key":"7_CR43","volume-title":"Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom","author":"D. Brin","year":"1998","unstructured":"D.\u00a0Brin: Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom (Perseus Books, New York 1998)"},{"issue":"9","key":"7_CR44","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/TPAMI.2007.1087","volume":"29","author":"R. Cappelli","year":"2007","unstructured":"R.\u00a0Cappelli, A.\u00a0Lumini, D.\u00a0Maio, D.\u00a0Maltoni: Fingerprint image reconstruction from standard templates, IEEE Trans. Pattern Anal. Mach. Intell. 29(9), 1489\u20131503 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"7_CR45","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/TPAMI.2007.1018","volume":"29","author":"A.K. Ross","year":"2007","unstructured":"A.K.\u00a0Ross, J.\u00a0Shah, A.K.\u00a0Jain: From templates to images: reconstructing fingerprints from minutiae points, IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 544\u2013560 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"A.\u00a0Adler: Images can be Regenerated from Quantized Biometric Match Score Data, Proc. Canadian Conference on Electrical and Computer Engineering, Niagara Falls (2004) pp. 469\u2013472","DOI":"10.1109\/CCECE.2004.1345057"},{"key":"7_CR47","unstructured":"A.B.J.\u00a0Teoh, K.-A.\u00a0Toh, W.K.\u00a0Yip: 2N Discretisation of BioPhasor in Cancellable Biometrics, Proc. 2nd Int. Conference on Biometrics, Seoul (2007) pp. 435\u2013444"},{"issue":"12","key":"7_CR48","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","volume":"28","author":"A.B.J. Teoh","year":"2006","unstructured":"A.B.J.\u00a0Teoh, A.\u00a0Goh, D.C.L.\u00a0Ngo: Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs, IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892\u20131901 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"7_CR49","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.cviu.2006.01.002","volume":"102","author":"C.S. Chin","year":"2006","unstructured":"C.S.\u00a0Chin, A.B.\u00a0J Teoh, D.C.L.\u00a0Ngo: High security iris verification system based on random secret integration, Comput. Vis. Image Underst. 102(2), 169\u2013177 (2006)","journal-title":"Comput. Vis. Image Underst."},{"issue":"1","key":"7_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ipl.2004.09.014","volume":"93","author":"T. Connie","year":"2005","unstructured":"T.\u00a0Connie, A.B.\u00a0J Teoh, M.\u00a0Goh, D.C.L.\u00a0Ngo: PalmHashing: A novel approach for cancelable biometrics, Inf Process. Lett. 93(1), 1\u20135 (2005)","journal-title":"Inf Process. Lett."},{"key":"7_CR51","unstructured":"A.\u00a0Juels, M.\u00a0Wattenberg: A Fuzzy Commitment Scheme, Proc. 6th ACM Conference on Computer and Communications Security, Singapore (1999) pp. 28\u201336"},{"key":"7_CR52","unstructured":"A.\u00a0Juels, M.\u00a0Sudan: A Fuzzy Vault Scheme, Proc. IEEE Int. Symposium on Information Theory, Lausanne (2002) p. 408"},{"key":"7_CR53","unstructured":"Y.-J.\u00a0Chang, W.\u00a0Zhang, T.\u00a0Chen: Biometrics Based Cryptographic Key Generation, Proc. IEEE Conference on Multimedia and Expo, Taipei, Vol. 3 (2004) pp. 2203\u20132206"},{"key":"7_CR54","unstructured":"C.\u00a0Vielhauer, R.\u00a0Steinmetz, A.\u00a0Mayerhofer: Biometric Hash Based on Statistical Features of Online Signatures, Proc. 16th Int. Conference on Pattern Recognition, Quebec, Vol. 1 (2002) pp. 123\u2013126"},{"key":"7_CR55","doi-asserted-by":"crossref","unstructured":"Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Technical Report 235, Cryptology ePrint Archive (February 2006)","DOI":"10.1007\/978-1-84628-984-2_5"},{"key":"7_CR56","unstructured":"U.\u00a0Uludag, S.\u00a0Pankanti, A.K.\u00a0Jain: Fuzzy Vault for Fingerprints, Proc. Audio- and Video-based Biometric Person Authentication, Rye Town (2005) pp. 310\u2013319"},{"key":"7_CR57","unstructured":"T.\u00a0Clancy, D.\u00a0Lin, N.\u00a0Kiyavash: Secure Smartcard-Based Fingerprint Authentication, Proc. ACM SIGMM Workshop on Biometric Methods and Applications, Berkley (2003) pp. 45\u201352"},{"key":"7_CR58","series-title":"LNCS","first-page":"358","volume-title":"CISC 2005, Beijing","author":"Y. Chung","year":"2005","unstructured":"Y.\u00a0Chung, D.\u00a0Moon, S.\u00a0Lee, S.\u00a0Jung, T.\u00a0Kim, D.\u00a0Ahn: Automatic alignment of fingerprint features for fuzzy fingerprint vault. In: CISC 2005, Beijing, LNCS, Vol. 3822 (Springer, Berlin 2005) pp. 358\u2013369"},{"key":"7_CR59","unstructured":"D. Ahn, et al.: Specification of ETRI Fingerprint Database(in Korean), Technical Report \u2013 ETRI (2002)"},{"issue":"4","key":"7_CR60","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/99.641604","volume":"4","author":"H. Wolfson","year":"1997","unstructured":"H.\u00a0Wolfson, I.\u00a0Rigoutsos: Geometric hashing: an overview, IEEE Comput. Sci. Eng. 4(4), 10\u201321 (1997)","journal-title":"IEEE Comput. Sci. Eng."},{"issue":"4","key":"7_CR61","first-page":"389","volume":"10","author":"A. Malickas","year":"1999","unstructured":"A.\u00a0Malickas, R.\u00a0Vitkus: Fingerprint registration using composite features consensus, Informatica 10(4), 389\u2013402 (1999)","journal-title":"Informatica"},{"key":"7_CR62","doi-asserted-by":"crossref","unstructured":"K.\u00a0Xi, J.\u00a0Hu: Biometric Mobile Template Protection: A Composite Feature based Fingerprint Fuzzy Vault, IEEE Int. Conference on Communication (ICC), Germany (2009)","DOI":"10.1109\/ICC.2009.5198785"},{"key":"7_CR63","unstructured":"K.\u00a0Xi, J.\u00a0Hu: A Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection, 4th IEEE Conference on Industrial Electronics and Applications (ICIEA), China (2009)"},{"key":"7_CR64","doi-asserted-by":"crossref","unstructured":"D.P.E.K.\u00a0Mital Teoh: An automated matching technique for fingerprint identification, Proc. KES, Vol. 1 (1997) pp. 142\u2013147","DOI":"10.1109\/KES.1997.616876"},{"issue":"1","key":"7_CR65","doi-asserted-by":"crossref","first-page":"31","DOI":"10.15388\/Informatica.2008.200","volume":"19","author":"A. Kisel","year":"2008","unstructured":"A.\u00a0Kisel, A.\u00a0Kochetkov, J.\u00a0Kranauskas: Fingerprint minutiae matching without global alignment using local structures, Informatica 19(1), 31\u201344 (2008)","journal-title":"Informatica"},{"key":"7_CR66","unstructured":"J.\u00a0Jeffers, A.\u00a0Arakala: Minutiae-Based Structures for A Fuzzy Vault, Biometric Consortium Conference, 2006 Biometrics Symposium (2006) pp. 1\u20136"},{"key":"7_CR67","doi-asserted-by":"crossref","unstructured":"J.\u00a0Hu: Mobile Fingerprint Template Protection: Progress and Open issues, invited session on pattern analysis and biometrics, 3rd IEEE Conference on Industrial Electronics and Applications, Singapore (June 2008)","DOI":"10.1109\/ICIEA.2008.4582896"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:58:13Z","timestamp":1739905093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_7","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}