{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T23:21:06Z","timestamp":1775172066965,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642112065","type":"print"},{"value":"9783642112072","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11207-2_7","type":"book-chapter","created":{"date-parts":[[2010,3,5]],"date-time":"2010-03-05T09:46:11Z","timestamp":1267782371000},"page":"78-92","source":"Crossref","is-referenced-by-count":7,"title":["A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem"],"prefix":"10.1007","author":[{"given":"Ileana","family":"Buhan","sequence":"first","affiliation":[]},{"given":"Jeroen","family":"Breebaart","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Guajardo","sequence":"additional","affiliation":[]},{"given":"Koen","family":"de Groot","sequence":"additional","affiliation":[]},{"given":"Emile","family":"Kelkboom","sequence":"additional","affiliation":[]},{"given":"Ton","family":"Akkermans","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1145\/1229285.1229325","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS)","author":"I.R. Buhan","year":"2007","unstructured":"Buhan, I.R., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. In: Deng, R., Samarati, P. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, pp. 353\u2013355. ACM, New York (2007)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-88625-9_20","volume-title":"Information and Communications Security","author":"I.R. Buhan","year":"2008","unstructured":"Buhan, I.R., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Embedding renewable cryptographic keys into continuous noisy data. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 294\u2013310. Springer, Heidelberg (2008)"},{"issue":"1-2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008107127819","volume":"27","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation methods for digital watermarking and information embedding of multimedia. The Journal of VLSI Signal Processing\u00a027(1-2), 7\u201333 (2001)","journal-title":"The Journal of VLSI Signal Processing"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"7_CR5","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2000","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Hoboken (2000)","edition":"2"},{"key":"7_CR6","first-page":"17","volume":"2008","author":"A.K. Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. Journal on Advances in Signal Processing (EURASIP)\u00a02008, 17 (2008)","journal-title":"Journal on Advances in Signal Processing (EURASIP)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Kelkboom, E., Garcia Molina, G., Breebaart, J., Kevenaar, T.A.M., Veldhuis, R.N.J., Jonker, W.: Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumptions. IEEE Transactions on Systems, Man and Cybernetics (to appear, 2009)","DOI":"10.1109\/TSMCA.2010.2041657"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/11935230_7","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"Q. Li","year":"2006","unstructured":"Li, Q., Sutcu, Y., Memon, N.: Secure sketch for biometric templates. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 99\u2013113. Springer, Heidelberg (2006)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"J.P. Linnartz","year":"2003","unstructured":"Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 393\u2013402. Springer, Heidelberg (2003)"},{"key":"7_CR10","first-page":"395","volume-title":"IEEE Proceedings on Vision, Image and Signal Processing, Special Issue on Biometrics on the Internet","author":"J. Ortega-Garcia","year":"2003","unstructured":"Ortega-Garcia, J., Fierrez-Aguillar, J., Simon, D., Gonzalez, J., Faundez-Zanuy, M., Espinosa, V., Satue, A., Hernaez, I., Igarza, J.-J., Vivaracho, C., Escudero, D., Moro, Q.-I.: Myct baseline corpus: a bimodal biometric database. In: IEEE Proceedings on Vision, Image and Signal Processing, Special Issue on Biometrics on the Internet, vol.\u00a0150, pp. 395\u2013401. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"7_CR11","unstructured":"ISO\/IEC\u00a0JTC1 SC27. CD 24745 - information security - biometric template protection"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Simoens, K., Tuyls, P., Preneel, B.: Privacy weakness in biometric sketches. In: IEEE Symposium on Security and Privacy, Oakland, California, USA (May 2009)","DOI":"10.1109\/SP.2009.24"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/11527923_45","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A., Veldhuis, R.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.\u00a03546, pp. 436\u2013446. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11207-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T13:20:19Z","timestamp":1558876819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11207-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642112065","9783642112072"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11207-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}