{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:51:15Z","timestamp":1725540675238},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642102677"},{"type":"electronic","value":"9783642102684"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10268-4_10","type":"book-chapter","created":{"date-parts":[[2009,11,14]],"date-time":"2009-11-14T05:20:27Z","timestamp":1258176027000},"page":"85-94","source":"Crossref","is-referenced-by-count":2,"title":["K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation"],"prefix":"10.1007","author":[{"given":"H. A.","family":"Garcia-Baleon","sequence":"first","affiliation":[]},{"given":"V.","family":"Alarcon-Aquino","sequence":"additional","affiliation":[]},{"given":"O.","family":"Starostenko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smart card-based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop of Biometrics Methods and Application (2003)","DOI":"10.1145\/982507.982516"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"2828","author":"A. Goh","year":"2003","unstructured":"Goh, A., Ngo, D.C.L.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol.\u00a02828, pp. 1\u201313. Springer, Heidelberg (2003)"},{"key":"10_CR3","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining Cryptography with Biometrics Effectively, Computer Laboratory, University of Cambridge, Technical Report Number 640 (2005)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Hao, F., Chan, C.W.: Private key generation from on-line handwritten signatures. Information Management & Computer Society\u00a010(4) (2002)","DOI":"10.1108\/09685220210436949"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","first-page":"181","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"Q. Zhang","year":"2005","unstructured":"Zhang, Q., Couloigner, I.: A New and Efficient K-Medoid Algorithm for Spatial Clustering. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03482, pp. 181\u2013189. Springer, Heidelberg (2005)"},{"issue":"3","key":"10_CR6","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.jss.2007.06.019","volume":"81","author":"M.C.N. Barioni","year":"2008","unstructured":"Barioni, M.C.N., Razente, H., Traina, A.J.M., Traina Jr., C.: Accelerating k-medoid-based algorithms through metric access methods. Journal of Systems and Software\u00a081(3), 343\u2013355 (2008)","journal-title":"Journal of Systems and Software"},{"key":"10_CR7","unstructured":"Kardi, T.: Minkowski Distance of order \u03bb (2009), \n                    \n                      http:\/\/people.revoledu.com\/kardi\/tutorial\/Similarity\/MinkowskiDistance.html"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Garcia-Baleon, H.A., Alarcon-Aquino, V.: Cryptographic Key Generation from Biometric Data Using Wavelets. In: Proceedings of the IEEE Electronics, Robotics and Automotive Mechanics Conference, CERMA 2009 (September 2009)","DOI":"10.1109\/CERMA.2009.16"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Garcia-Baleon, H.A., Alarcon-Aquino, V., Ramirez-Cruz, J.F.: Bimodal Biometric System for Cryptographic Key Generation Using Wavelet Transforms. In: Proceedings of the IEEE Mexican International Conference on Computer Science, ENC 2009 (September 2009)","DOI":"10.1109\/ENC.2009.25"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10268-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:40:42Z","timestamp":1558269642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10268-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642102677","9783642102684"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10268-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}