{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:10:20Z","timestamp":1743091820393,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":13,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132219873"},{"type":"electronic","value":"9788132219880"}],"license":[{"start":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T00:00:00Z","timestamp":1409097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T00:00:00Z","timestamp":1409097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-1988-0_7","type":"book-chapter","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T08:45:57Z","timestamp":1409042757000},"page":"109-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Biometric Template Encryption Scheme Using Sudoku Puzzle"],"prefix":"10.1007","author":[{"given":"Arnab Kumar","family":"Maji","sequence":"first","affiliation":[]},{"given":"Rajat Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,27]]},"reference":[{"key":"7_CR1","unstructured":"www.ftc.gov\/opa\/reporter\/idtheft\/index.shtml"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.cose.2006.12.008","volume":"26","author":"C Roberts","year":"2007","unstructured":"Roberts, C.: Biometric attack vectors and defenses. Comput. Secur. 26(1), 14\u201325 (2007)","journal-title":"Comput. Secur."},{"key":"7_CR3","unstructured":"Jain, A.K., Ross, A., Uludag, U.: Biometric template security: challenges and solutions. In: Proceedings of the European Signal Processing Conference (EUSIPCO \u201905), Antalya, Turkey, Sept 2005"},{"key":"7_CR4","unstructured":"Cukic, B., Bartlow, N.: Biometric system threats and countermeasures: a risk based approach. In: Proceedings of the Biometric Consortium Conference (BCC \u201905), Crystal City, USA, Sept 2005"},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"AK Jain","year":"2006","unstructured":"Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125\u2013143 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR6","unstructured":"http:\/\/www.en.wikipedia.org\/wiki\/Pentomino"},{"key":"7_CR7","unstructured":"http:\/\/www.en.wikipedia.org\/wiki\/Tetris"},{"key":"7_CR8","volume-title":"A\u2013Z of Sudoku","author":"N Jussien","year":"2007","unstructured":"Jussien, N.: A\u2013Z of Sudoku. ISTE Ltd., USA (2007)"},{"key":"7_CR9","volume-title":"Programming Sudoku","author":"W-M Lee","year":"2006","unstructured":"Lee, W.-M.: Programming Sudoku. Apress, USA (2006)"},{"key":"7_CR10","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2003","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Berlin (2003)"},{"issue":"6","key":"7_CR11","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948\u2013960 (2004)","journal-title":"Proc. IEEE"},{"key":"7_CR12","unstructured":"Cavoukian, A., Stoianov, A.: Biometric encryption: a positive-sum technology that achieves strong authentication, security, and privacy. Technical Report, Office of the Information and Privacy Commissioner of Ontario, Toronto, Ontario, Canada, March 2007"},{"key":"7_CR13","unstructured":"Vetro, A., Memon, N.: Biometric system security. In: Proceedings of the Second International Conference on Biometrics, Seoul, South Korea, Aug 2007"}],"container-title":["Advances in Intelligent Systems and Computing","Applied Computation and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1988-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T08:29:26Z","timestamp":1676881766000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1988-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,27]]},"ISBN":["9788132219873","9788132219880"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1988-0_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,8,27]]},"assertion":[{"value":"27 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}