{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T21:49:09Z","timestamp":1777672149015,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642044731","type":"print"},{"value":"9783642044748","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_11","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T11:25:17Z","timestamp":1251977117000},"page":"135-142","source":"Crossref","is-referenced-by-count":71,"title":["Cancelable Iris Biometrics Using Block Re-mapping and Image Warping"],"prefix":"10.1007","author":[{"given":"Jutta","family":"H\u00e4mmerle-Uhl","sequence":"first","affiliation":[]},{"given":"Elias","family":"Pschernig","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N.K. Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J.\u00a040(3), 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"issue":"2","key":"11_CR2","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.cviu.2006.01.002","volume":"102","author":"S.C. Chong","year":"2006","unstructured":"Chong, S.C., Jin, A.T.B., Ling, D.N.C.: High security iris verification system based on random secret integration. Computer Vision and Image Understanding\u00a0102(2), 169\u2013177 (2006)","journal-title":"Computer Vision and Image Understanding"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/11608288_51","volume-title":"Advances in Biometrics","author":"S.C. Chong","year":"2005","unstructured":"Chong, S.C., Jin, A.T.B., Ling, D.N.C.: Iris authentication using privatized advanced correlation filter. In: Zhang, D., Jain, A.K. (eds.) ICB 2005. LNCS, vol.\u00a03832, pp. 382\u2013388. Springer, Heidelberg (2005)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Zuo, J., Ratha, N., Cornell, J.: Cancelable iris biometric. In: Proceedings of the 19th International IAPR Conference on Pattern Recognition (ICPR 2008), pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761886"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.cviu.2007.08.005","volume":"110","author":"K. Bowyer","year":"2008","unstructured":"Bowyer, K., Hollingsworth, K., Flinn, P.: Image understanding for iris biometrics: A survey. Computer Vision and Image Understanding\u00a0110(2), 281\u2013307 (2008)","journal-title":"Computer Vision and Image Understanding"},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J. Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Transactions on Circiuts and Systems for Video Technology\u00a014(1), 21\u201330 (2004)","journal-title":"IEEE Transactions on Circiuts and Systems for Video Technology"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1109\/TIP.2004.827237","volume":"13","author":"L. Ma","year":"2004","unstructured":"Ma, L., Tan, T., Wang, Y., Zhang, D.: Efficient iris recognition by characterizing key local variations. IEEE Transactions on Image Processing\u00a013, 739\u2013750 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"8\/9","key":"11_CR8","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s003710050148","volume":"14","author":"G. Wolberg","year":"1998","unstructured":"Wolberg, G.: Image morphing: a survey. The Visual Computer\u00a014(8\/9), 360\u2013372 (1998)","journal-title":"The Visual Computer"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:41:24Z","timestamp":1739317284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}