{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:40:56Z","timestamp":1762004456904,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_17","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"168-177","source":"Crossref","is-referenced-by-count":3,"title":["Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions"],"prefix":"10.1007","author":[{"given":"Aravind","family":"Ashok","sequence":"first","affiliation":[]},{"given":"Prabaharan","family":"Poornachandran","sequence":"additional","affiliation":[]},{"given":"Krishnasree","family":"Achuthan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Prabhakar, S., Pankanti, S., Jain, A.K.: Biometirc Recognition: Security and Privacy Concerns. IEEE Security & Privacy, 33\u201344 (March\/April 2003)","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"17_CR2","unstructured":"Delac, K., Grgic, M.: A Survey of Biometric Recognition Methods. In: 46th International Symposium Electronics in Marine, Zadar, Croatia (June 2004)"},{"key":"17_CR3","unstructured":"NIST report to United State Congress. Summary of NIST Standards for Biometric Accuracy, Tamper Resistance, and Interoperability (November 13, 2000), http:\/\/www.itl.nist.gov\/iad\/894.03\/NISTAPP_Nov02.pdf"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Snelick, R., Indovina, M., Yen, J., Mink, A.: Multimodal Biometrics: Issues in Design and Testing. In: International Conference on Multimodal Interfaces (ICMI), Vancouver, British Columbia, Canada. ACM (November 2003) 1-58113-621-8\/03\/0011","DOI":"10.1145\/958444.958447"},{"key":"17_CR5","unstructured":"Korte, U., Krawczak, M., Martini, U., Merkle, J., Plaga, R., Niesing, M., Tiemann, C., Vinck, H.: A cryptographic biometric authentication system based on genetic fingerprints. LNI, vol.\u00a0P-128, pp. 263\u2013276. Springer (2008)"},{"key":"17_CR6","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Trans. on Computers\u00a055(9) (September 2009)"},{"issue":"1","key":"17_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"A.K. Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Trans. on Circuits and Systems for Video Technology\u00a014(1), 4\u201319 (2004)","journal-title":"IEEE Trans. on Circuits and Systems for Video Technology"},{"key":"17_CR8","unstructured":"Zhang, Z.B., Ma, S.L., Zuo, P., Ma, J.: Fast Iris Detection and Localization Algorithm Based on AdaBoost Algorithm and Neural Networks. In: International Conference on Neural Networks and Brain (ICNN), vol.\u00a02, pp. 1009\u20131014 (October 2005)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Chen, W.-S., Chih, K.-H., Shih, S.-W., Hsieh, C.-M.: Personal Identification Technique based on Human Iris Recognition with Wavelet Transform. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol.\u00a02, pp. 949\u2013952 (March 2005)","DOI":"10.1109\/ICASSP.2005.1415563"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Z., Yan, J.-Q., Zhang, D., Tang, Q.-L.: A Tongue-Print Image Database for Recognition. In: Procedings of the Sixth International Conference on Cybernetics, Hong Kong (August 2007)","DOI":"10.1109\/ICMLC.2007.4370517"},{"key":"17_CR11","unstructured":"SHA-1 Hash function, http:\/\/en.wikipedia.org\/wiki\/SHA-1"},{"key":"17_CR12","unstructured":"Pongyupinpanich, S., Choomchuay, S.: An Architecture for a SHA-1 Applied for DSA. In: 3rd Asian International Mobile Computing Conference, AMOC 2004, Thailand, May 26-28 (2004)"},{"key":"17_CR13","unstructured":"National Institute of Standards and Technology (NIST), \u201cSecure Hash Standard\u201d, Federal Information Processing Standards Publication 180-2 (August 2002)"},{"key":"17_CR14","unstructured":"Unique Identification Authority of India, Planning Commission, Government of India, http:\/\/uidai.gov.in\/"},{"key":"17_CR15","unstructured":"Cryptographic hash function, http:\/\/en.wikipedia.org\/wiki\/Cryptographic_hash_function"},{"key":"17_CR16","unstructured":"Alderson, N.: Increasing Security Expertise in Aviation- oriented Computing Education: A Modular Approach, part of Cryptography module, Embry-Riddle Aeronautical University in Prescott, Arizona, http:\/\/nsfsecurity.pr.erau.edu\/crypto\/sha1.html"},{"key":"17_CR17","unstructured":"Kisasondi, T., Baca, M., Lovrencic, A.: Biometric Cryptography and Network Authentication. Journal of Information and Organizational Sciences\u00a031(1) (2007)"},{"key":"17_CR18","unstructured":"How hashes are cracked, http:\/\/crackstation.net\/hashing-security.html"},{"key":"17_CR19","unstructured":"How Crackstation cracks hashes, http:\/\/crackstation.net\/"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Hellman, M.E.: A cryptanalytical time-memory trade off. IEEE Transactions on Information Theory IT-26 (1980)","DOI":"10.1109\/TIT.1980.1056220"},{"issue":"6","key":"17_CR21","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1049\/ip-vis:20031078","volume":"150","author":"J. Ortega-Garcia","year":"2003","unstructured":"Ortega-Garcia, J., Fierrez-Aguilar, J., Simon, D., Gonzalez, J., Faundez-Zanuy, M., Espinosa, V., Satue, A., Hernaez, I., Igarza, J.-J., Vivaracho, C., Escudero, D., Moro, Q.-I.: MCYT baseline corpus: a bimodal biometric database. IEE Proc.-Vis. Image Signal Process.\u00a0150(6), 391\u2013401 (2003)","journal-title":"IEE Proc.-Vis. Image Signal Process."}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:30:26Z","timestamp":1744079426000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}