{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T11:10:02Z","timestamp":1746357002735,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662449653"},{"type":"electronic","value":"9783662449660"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44966-0_15","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T11:41:36Z","timestamp":1409139696000},"page":"162-172","source":"Crossref","is-referenced-by-count":4,"title":["An Approach to Cryptographic Key Exchange Using Fingerprint"],"prefix":"10.1007","author":[{"given":"Subhas","family":"Barman","sequence":"first","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall (2010)"},{"key":"15_CR2","unstructured":"Advance Encryption Standard (AES), Federal Information Processing Standards Publication 197 United States National Institute of Standards and Technology (NIST) (November 26, 2001)"},{"key":"15_CR3","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2003","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)"},{"issue":"9","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F. Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Transactions on Computers\u00a055(9), 1081\u20131088 (2006)","journal-title":"IEEE Transactions on Computers"},{"issue":"6","key":"15_CR5","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U. Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proceedings of the IEEE\u00a092(6), 948\u2013960 (2004)","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"N.K. Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancellable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a029(4), 561\u2013572 (2007)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"15_CR7","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Fingerprint Template Protection: From Theory to Practice. In: Security and Privacy in Biometrics. Springer"},{"issue":"2","key":"15_CR8","first-page":"28","volume":"7","author":"A. Jagadeesan","year":"2010","unstructured":"Jagadeesan, A., Duraiswamy, K.: Secured Cryptographic Key Generation from Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris. International Journal of Computer Science and Information Security\u00a07(2), 28\u201337 (2010)","journal-title":"International Journal of Computer Science and Information Security"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K. Nandakumar","year":"2007","unstructured":"Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-Based Fuzzy Vault: Implementation and Performance. IEEE Transactions on Information Forensics and Security\u00a02(4), 744\u2013757 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, M., Janet, S., Ko, K.: User\u2019s Guide to NIST Biometric Image Software (NBIS), National Institute of Standards and Technology (2007)","DOI":"10.6028\/NIST.IR.7392"},{"key":"15_CR11","unstructured":"Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), vol.\u00a05. IEEE (2005)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic key generation from voice. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 202\u2013213 (2001)","DOI":"10.1109\/SECPRI.2001.924299"},{"issue":"4","key":"15_CR13","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1108\/09685220210436949","volume":"10","author":"H. Feng","year":"2002","unstructured":"Feng, H., Wah, C.C.: Private key generation from on-line handwritten signatures. Information Management & Computer Security\u00a010(4), 159\u2013164 (2002)","journal-title":"Information Management & Computer Security"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Chen, B., Chandran, V.: Biometric Based Cryptographic Key Generation from Faces. In: Proceedings of 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394\u2013401 (2007)","DOI":"10.1109\/DICTA.2007.4426824"},{"issue":"6","key":"15_CR15","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1049\/iet-cvi.2010.0176","volume":"5","author":"C. Rathgeb","year":"2011","unstructured":"Rathgeb, C., Uhl, A.: Context-based biometric key generation for Iris. IET Computer Vision\u00a05(6), 389\u2013397 (2011)","journal-title":"IET Computer Vision"},{"issue":"2","key":"15_CR16","first-page":"57","volume":"11","author":"S.V.K. Gaddam","year":"2010","unstructured":"Gaddam, S.V.K., Lal, M.: Efficient Cancellable Biometric Key Generation Scheme for Cryptography. International Journal of Network Security\u00a011(2), 57\u201365 (2010)","journal-title":"International Journal of Network Security"},{"issue":"3","key":"15_CR17","first-page":"372","volume":"31","author":"N. Lalithamani","year":"2009","unstructured":"Lalithamani, N., Soman, K.P.: Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme. European Journal of Scientific Research\u00a031(3), 372\u2013387 (2009)","journal-title":"European Journal of Scientific Research"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Tsudik, G. (ed.) Proc. 6th ACM Conf. Computer and Communications Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"key":"15_CR19","unstructured":"Fingerprint Verification Competition FVC2004 (2004), http:\/\/bias.csr.unibo.it\/fvc2004"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44966-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T10:50:54Z","timestamp":1746355854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44966-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662449653","9783662449660"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44966-0_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}