{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:49:48Z","timestamp":1770230988171,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819610709","type":"print"},{"value":"9789819610716","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1071-6_16","type":"book-chapter","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:03:39Z","timestamp":1738901019000},"page":"177-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Fuzzy Commitment Cryptosystem Based on One Permutation Hashing"],"prefix":"10.1007","author":[{"given":"Ce","family":"Gao","sequence":"first","affiliation":[]},{"given":"Weiwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuxing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhicheng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Heng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Feng, J., Jain, A.: Fingerprint reconstruction: from minutiae to phase. IEEE Trans. Pattern Anal. Mach. Intell. 33(2), 209\u2013223 (2011)","DOI":"10.1109\/TPAMI.2010.77"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Cao, K., Jain, A.: Learning fingerprint reconstruction: from minutiae to image. IEEE Trans. Inf. Forensics Secur. 10(1), 104\u2013117 (2015)","DOI":"10.1109\/TIFS.2014.2363951"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Cappelli, R., et al.: Fingerprint image reconstruction from standard templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(9), 1489\u20131503 (2007)","DOI":"10.1109\/TPAMI.2007.1087"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2008\/579416","volume":"2008","author":"A Jain","year":"2008","unstructured":"Jain, A., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 1\u201317 (2008)","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"16_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5230-9","volume-title":"Security and Privacy in Biometrics","author":"P Campisi","year":"2013","unstructured":"Campisi, P.: Security and Privacy in Biometrics. Springer, London (2013)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, ser. CCS 1999, pp, 28\u201336. ACM. New York (1999)","DOI":"10.1145\/319709.319714"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Zhou, X., Kuijper, A., Veldhuis, R., Busch, C.: Quantifying privacy and security of biometric fuzzy commitment. In: 2011 IEEE International Joint Conference on Biometrics (IJCB), pp, 1\u20138 (2011)","DOI":"10.1109\/IJCB.2011.6117543"},{"key":"16_CR8","unstructured":"Ignatenko, T.: Secret-Key Rates and Privacy Leakage in Biometric Systems (Ph.D. thesis), Eindhoven University of Technology, Eindhoven, Netherlands (2009)"},{"issue":"23","key":"16_CR9","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1587\/elex.4.724","volume":"4","author":"B Andrew","year":"2007","unstructured":"Andrew, B., Kim, J.: Secure biometric template protection in fuzzy commitment scheme. IEICE Electron. Express 4(23), 724\u2013730 (2007)","journal-title":"IEICE Electron. Express"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Nandakumar, K.: A fingerprint cryptosystem based on minutiae phase spectrum. In: Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, pp. 1\u20136 (2010)","DOI":"10.1109\/WIFS.2010.5711456"},{"issue":"10","key":"16_CR11","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1109\/TSMC.2015.2499725","volume":"46","author":"Z Jin","year":"2016","unstructured":"Jin, Z., Lim, M., Andrew, B., Goi, B., Tay, Y.: Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans. Syst. Man Cybern. Syst. 46(10), 1415\u20131428 (2016)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"44803","DOI":"10.1109\/ACCESS.2019.2906265","volume":"7","author":"S Shi","year":"2019","unstructured":"Shi, S., Cui, J., Zhang, X., Liu, Y., Gao, J., Wang, Y.: Fingerprint recognition strategies based on a fuzzy commitment for cloud-assisted IoT: a minutiae-based sector coding approach. IEEE Access 7, 44803\u201344812 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"16_CR13","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1049\/ise2.12024","volume":"15","author":"S Shukla","year":"2021","unstructured":"Shukla, S., Patel, S.: Securing fingerprint templates by enhanced minutiae-based encoding scheme in Fuzzy Commitment. IET Inf. Secur. 15(3), 256\u2013266 (2021)","journal-title":"IET Inf. Secur."},{"key":"16_CR14","volume-title":"Research on the Ordered Fixed-Length Bit-String Feature Extraction of Fingerprint and its Encryption Application","author":"H Yang","year":"2021","unstructured":"Yang, H.: Research on the Ordered Fixed-Length Bit-String Feature Extraction of Fingerprint and its Encryption Application. Xidian University, Xi\u2019an (2021). (in Chinese)"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1109\/LSP.2021.3071262","volume":"28","author":"Y Li","year":"2021","unstructured":"Li, Y., Zhao, H., Cao, Z., Liu, E., Pang, L.: Compact and cancelable fingerprint binary codes generation via one permutation hashing. IEEE Signal Process. Lett. 28, 738\u2013742 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"16_CR16","unstructured":"VeriFinger Software. https:\/\/www.neurotechnology.com\/"},{"issue":"12","key":"16_CR17","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/TPAMI.2010.52","volume":"32","author":"C Raffaele","year":"2010","unstructured":"Raffaele, C., Matteo, F., Davide, M.: Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32(12), 2128\u20132141 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"16_CR18","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/TIT.1969.1054251","volume":"15","author":"D Swick","year":"1969","unstructured":"Swick, D.: Walsh function generation. IEEE Trans. Inf. Theory 15(1), 167 (1969)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"16_CR19","unstructured":"Fingerprint Verification Competition (2002). http:\/\/bias.csr.unibo.it\/fvc2002"},{"key":"16_CR20","unstructured":"Fingerprint Verification Competition (2004). http:\/\/bias.csr.unibo.it\/fvc2004"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Security 13(6), 1406\u20131420 (2018)","DOI":"10.1109\/TIFS.2017.2788000"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1071-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:03:49Z","timestamp":1738901029000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1071-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819610709","9789819610716"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1071-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}