{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:21:12Z","timestamp":1742934072213,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819610709"},{"type":"electronic","value":"9789819610716"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1071-6_15","type":"book-chapter","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:04:30Z","timestamp":1738901070000},"page":"159-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Cancelable Biometric Template Protection Scheme"],"prefix":"10.1007","author":[{"given":"Shuaichao","family":"Song","sequence":"first","affiliation":[]},{"given":"Songhui","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yeming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ruiyang","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2014","unstructured":"Meng, W., Wong, D.S., Furnell, S., et al.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutorials 17(3), 1268\u20131293 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"15_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113114","volume":"143","author":"S Dargan","year":"2020","unstructured":"Dargan, S., Kumar, M.: A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Syst. Appl. 143, 113114 (2020)","journal-title":"Expert Syst. Appl."},{"issue":"9","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/TPAMI.2007.1087","volume":"29","author":"R Cappelli","year":"2007","unstructured":"Cappelli, R., Maio, D., Lumini, A., et al.: Fingerprint image reconstruction from standard templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(9), 1489\u20131503 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TPAMI.2018.2827389","volume":"41","author":"G Mai","year":"2018","unstructured":"Mai, G., Cao, K., Yuen, P.C., et al.: On the reconstruction of face images from deep face templates. IEEE Trans. Pattern Anal. Mach. Intell. 41(5), 1188\u20131202 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Manisha., Kumar, N.: Cancelable biometrics: a comprehensive survey. Artif. Intell. Rev. 53(5), 3403\u20133446 (2020)","DOI":"10.1007\/s10462-019-09767-8"},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","volume":"32","author":"K Nandakumar","year":"2015","unstructured":"Nandakumar, K., Jain, A.K.: Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 32(5), 88\u2013100 (2015)","journal-title":"IEEE Signal Process. Mag."},{"issue":"11","key":"15_CR7","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245\u20132255 (2004)","journal-title":"Pattern Recogn."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Teoh, A.B.J., Yuang, C.T.: Cancelable biometrics realization with multispace random projections. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 37(5), 1096\u20131106 (2007)","DOI":"10.1109\/TSMCB.2007.903538"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"IEEE transactions on pattern analysis and machine intelligence, 2007, 29(9): 1489\u20131503. Maiorana, E., Campisi, P., Neri, A.: Bioconvolving: cancelable templates for a multi-biometrics signature recognition system. In: 2011 IEEE International Systems Conference, pp. 495\u2013500. IEEE (2011)","DOI":"10.1109\/SYSCON.2011.5929064"},{"issue":"3","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1016\/j.patcog.2013.10.003","volume":"47","author":"S Wang","year":"2014","unstructured":"Wang, S., Hu, J.: Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recogn. 47(3), 1321\u20131329 (2014)","journal-title":"Pattern Recogn."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Pillai, J.K., Patel, V.M., Chellappa, R., et al.: Sectored random projections for cancelable iris biometrics. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1838\u20131841. IEEE (2010)","DOI":"10.1109\/ICASSP.2010.5495383"},{"issue":"4","key":"15_CR12","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., et al.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561\u2013572 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Quan, F., Fei, S., Anni, C., et al.: Cracking cancelable fingerprint template of Ratha. In: 2008 International Symposium on Computer Science and Computational Technology, vol. 2, pp. 572\u2212575. IEEE (2008)","DOI":"10.1109\/ISCSCT.2008.226"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., Breitinger, F., Busch, C.: Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/ICB.2013.6612976"},{"key":"15_CR15","unstructured":"Hermans, J., Mennink, B., Peeters, R.: When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system. In: 2014 international conference of the biometrics special interest group (BIOSIG), pp. 1\u20136. IEEE (2014)"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.patcog.2017.01.019","volume":"66","author":"S Wang","year":"2017","unstructured":"Wang, S., Yang, W., Hu, J.: Design of alignment-free cancelable fingerprint templates with zoned minutia pairs. Pattern Recogn. 66, 295\u2013301 (2017)","journal-title":"Pattern Recogn."},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"2926","DOI":"10.1109\/TIFS.2021.3069170","volume":"16","author":"QN Tran","year":"2021","unstructured":"Tran, Q.N., Hu, J.: A multi-filter fingerprint matching framework for cancelable template design. IEEE Trans. Inf. Forensics Secur. 16, 2926\u20132940 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.patcog.2016.10.035","volume":"64","author":"YL Lai","year":"2017","unstructured":"Lai, Y.L., Jin, Z., Teoh, A.B.J., et al.: Cancellable iris template generation based on indexing-first-one hashing. Pattern Recogn. 64, 105\u2013117 (2017)","journal-title":"Pattern Recogn."},{"issue":"2","key":"15_CR19","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2017","unstructured":"Jin, Z., Hwang, J.Y., Lai, Y.L., et al.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393\u2013407 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"15_CR20","doi-asserted-by":"publisher","first-page":"6314","DOI":"10.1109\/TSMC.2022.3144854","volume":"52","author":"Y Li","year":"2022","unstructured":"Li, Y., Pang, L., Zhao, H., et al.: Indexing-min\u2013max hashing: relaxing the security\u2013performance tradeoff for cancelable fingerprint templates. IEEE Trans. Syst. Man Cybern. Syst. 52(10), 6314\u20136325 (2022)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1109\/LSP.2021.3071262","volume":"28","author":"Y Li","year":"2021","unstructured":"Li, Y., Zhao, H., Cao, Z., et al.: Compact and cancelable fingerprint binary codes generation via one permutation hashing. IEEE Signal Process. Lett. 28, 738\u2013742 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Gao, C., Zhang, K., Wang, W., et al.: Protected face templates generation based on multiple partial walsh transformations and Simhash. IEEE Trans. Inf. Forensics Secur. 19, 4100\u22124113 (2024)","DOI":"10.1109\/TIFS.2024.3369322"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Charikar, M.S.: Similarity estimation techniques from rounding algorithms. In: Proceedings of the Thiry-Fourth Annual ACM Symposium on Theory of Computing, pp. 380\u2013388 (2002)","DOI":"10.1145\/509907.509965"},{"issue":"1","key":"15_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3047307","volume":"50","author":"L Chi","year":"2017","unstructured":"Chi, L., Zhu, X.: Hashing techniques: A survey and taxonomy. ACM Comput. Surv. (Csur) 50(1), 1\u201336 (2017)","journal-title":"ACM Comput. Surv. (Csur)"},{"key":"15_CR25","unstructured":"Li, P., Owen, A., Zhang, C.H.: One permutation hashing. Adv. Neural Inf. Process. Syst. 25 (2012)"},{"key":"15_CR26","unstructured":"Huang, G.B., Mattar, M., Berg, T., et al.: Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. In: Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition (2008)"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., et al.: Arcface: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"issue":"10","key":"15_CR28","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., et al.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Guo, Y., Zhang, L., Hu, Y., et al.: Ms-celeb-1m: a dataset and benchmark for large-scale face recognition. In: Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III 14. Springer International Publishing, pp. 87\u2212102 (2016)","DOI":"10.1007\/978-3-319-46487-9_6"},{"issue":"1","key":"15_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TPAMI.2006.20","volume":"28","author":"R Cappelli","year":"2005","unstructured":"Cappelli, R., Maio, D., Maltoni, D., et al.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 28(1), 3\u201318 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Maio, D., Maltoni, D., Cappelli, R., et al.: FVC2002: Second fingerprint verification competition. In: 2002 International conference on pattern recognition, vol. 3, pp. 811-814. IEEE (2002)","DOI":"10.1109\/ICPR.2002.1048144"},{"issue":"12","key":"15_CR32","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/TPAMI.2010.52","volume":"32","author":"R Cappelli","year":"2010","unstructured":"Cappelli, R., Ferrara, M., Maltoni, D.: Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32(12), 2128\u20132141 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"10","key":"15_CR33","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1109\/TSMC.2015.2499725","volume":"46","author":"Z Jin","year":"2016","unstructured":"Jin, Z., Lim, M.H., Teoh, A.B.J., et al.: Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans. Syst. Man Cybern. Syst. 46(10), 1415\u20131428 (2016)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: 2007 Biometrics Symposium, pp. 1\u20136. IEEE (2007)","DOI":"10.1109\/BCC.2007.4430534"},{"key":"15_CR35","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.patcog.2019.01.039","volume":"91","author":"JB Kho","year":"2019","unstructured":"Kho, J.B., Kim, J., Kim, I.J., et al.: Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn. 91, 245\u2013260 (2019)","journal-title":"Pattern Recogn."},{"key":"15_CR36","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.patrec.2014.02.011","volume":"42","author":"Z Jin","year":"2014","unstructured":"Jin, Z., Lim, M.H., Teoh, A.B.J., et al.: A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recogn. Lett. 42, 137\u2013147 (2014)","journal-title":"Pattern Recogn. Lett."},{"key":"15_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115832","volume":"186","author":"AK Trivedi","year":"2021","unstructured":"Trivedi, A.K., Thounaojam, D.M., Pal, S.: A novel minutiae triangulation technique for non-invertible fingerprint template generation. Expert Syst. Appl. 186, 115832 (2021)","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"15_CR38","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1109\/TIFS.2017.2788000","volume":"13","author":"M Gomez-Barrero","year":"2017","unstructured":"Gomez-Barrero, M., Galbally, J., Rathgeb, C., et al.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406\u20131420 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1071-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:04:46Z","timestamp":1738901086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1071-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819610709","9789819610716"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1071-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}