{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:45:26Z","timestamp":1758123926393,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819985647"},{"type":"electronic","value":"9789819985654"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-8565-4_31","type":"book-chapter","created":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T06:03:13Z","timestamp":1701410593000},"page":"325-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Random Undersampling and\u00a0Local-Global Matching Mechanism for\u00a0Cancellable Biometrics Against Authentication Attack"],"prefix":"10.1007","author":[{"given":"Ying","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ming Jie","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xingbo","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,2]]},"reference":[{"issue":"5","key":"31_CR1","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2015.2434151","volume":"32","author":"VM Patel","year":"2015","unstructured":"Patel, V.M., Ratha, N.K., Chellappa, R.: Cancelable biometrics: a review. IEEE Signal Process. Mag. 32(5), 54\u201365 (2015)","journal-title":"IEEE Signal Process. Mag."},{"issue":"3","key":"31_CR2","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Riaz, S.A., Khan, A.: Biometric template security: an overview. Sens. Rev. 38(1), 120\u2013127 (2018)","DOI":"10.1108\/SR-07-2017-0131"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"853023","DOI":"10.3389\/fphar.2022.853023","volume":"13","author":"E Noviana","year":"2022","unstructured":"Noviana, E., Indrayanto, G., Rohman, A.: Advances in fingerprint analysis for standardization and quality control of herbal medicines. Front. Pharmacol. 13, 853023 (2022)","journal-title":"Front. Pharmacol."},{"issue":"5","key":"31_CR5","first-page":"6111","volume":"45","author":"JJ Engelsma","year":"2022","unstructured":"Engelsma, J.J., Grosz, S., Jain, A.K.: PrintsGAN: synthetic fingerprint generator. IEEE Trans. Pattern Anal. Mach. Intell. 45(5), 6111\u20136124 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"31_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2017","unstructured":"Jin, Z., Hwang, J.Y., Lai, Y.-L., Kim, S., Teoh, A.B.J.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393\u2013407 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"102583","DOI":"10.1016\/j.cose.2021.102583","volume":"114","author":"W Yang","year":"2022","unstructured":"Yang, W., Wang, S., Kang, J.J., Johnstone, M.N., Bedari, A.: A linear convolution-based cancelable fingerprint biometric authentication system. Comput. Secur. 114, 102583 (2022)","journal-title":"Comput. Secur."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"103021","DOI":"10.1016\/j.cose.2022.103021","volume":"125","author":"Y Sun","year":"2023","unstructured":"Sun, Y., Li, H., Li, N.: A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter. Comput. Secur. 125, 103021 (2023)","journal-title":"Comput. Secur."},{"issue":"3","key":"31_CR9","doi-asserted-by":"publisher","first-page":"033025","DOI":"10.1117\/1.JEI.31.3.033025","volume":"31","author":"G Siddhad","year":"2022","unstructured":"Siddhad, G., Khanna, P.: Max-min threshold-based cancelable biometric templates for low-end devices. J. Electron. Imaging 31(3), 033025 (2022)","journal-title":"J. Electron. Imaging"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Manisha, Kumar, N.: CBRC: a novel approach for cancelable biometric template generation using random permutation and Chinese remainder theorem. Multimedia Tools Appl. 81(16), 22027\u201322064 (2022)","DOI":"10.1007\/s11042-021-11284-2"},{"issue":"5","key":"31_CR11","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","volume":"32","author":"K Nandakumar","year":"2015","unstructured":"Nandakumar, K., Jain, A.K.: Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 32(5), 88\u2013100 (2015)","journal-title":"IEEE Signal Process. Mag."},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"3449","DOI":"10.1109\/TIFS.2022.3208812","volume":"17","author":"MJ Lee","year":"2022","unstructured":"Lee, M.J., Jin, Z., Liang, S.-N., Tistarelli, M.: Alignment-robust cancelable biometric scheme for iris verification. IEEE Trans. Inf. Forensics Secur. 17, 3449\u20133464 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"31_CR13","doi-asserted-by":"publisher","first-page":"6314","DOI":"10.1109\/TSMC.2022.3144854","volume":"52","author":"Y Li","year":"2022","unstructured":"Li, Y., Pang, L., Zhao, H., Cao, Z., Liu, E., Tian, J.: Indexing-min-max hashing: relaxing the security-performance tradeoff for cancelable fingerprint templates. IEEE Trans. Syst. Man Cybern. Syst. 52(10), 6314\u20136325 (2022)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"31_CR14","unstructured":"Daugman, J.: Biometric decision landscapes. University of Cambridge, Computer Laboratory, Technical report (2000)"},{"issue":"8","key":"31_CR15","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1002\/cpe.3042","volume":"26","author":"C Li","year":"2014","unstructured":"Li, C., Hu, J.: Attacks via record multiplicity on cancelable biometrics templates. Concurrency Comput. Pract. Experience 26(8), 1593\u20131605 (2014)","journal-title":"Concurrency Comput. Pract. Experience"},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25948-0_1","volume-title":"Biometric Authentication","author":"D Maio","year":"2004","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2004: third fingerprint verification competition. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 1\u20137. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25948-0_1"},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"101700","DOI":"10.1016\/j.cose.2019.101700","volume":"90","author":"M Gomez-Barrero","year":"2020","unstructured":"Gomez-Barrero, M., Galbally, J.: Reversing the irreversible: a survey on inverse biometrics. Comput. Secur. 90, 101700 (2020)","journal-title":"Comput. Secur."},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622\u2013633. SPIE (2004)","DOI":"10.1117\/12.530907"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-19530-3_8","volume-title":"Biometrics and ID Management","author":"M Gomez-Barrero","year":"2011","unstructured":"Gomez-Barrero, M., Galbally, J., Fierrez, J., Ortega-Garcia, J.: Hill-climbing attack based on the uphill simplex algorithm and its application to signature verification. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds.) BioID 2011. LNCS, vol. 6583, pp. 83\u201394. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19530-3_8"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Gomez-Barrero, M., Galbally, J., Fierrez, J., Ortega-Garcia, J.: Face verification put to test: a hill-climbing attack based on the uphill-simplex algorithm. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 40\u201345. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199756"},{"key":"31_CR21","unstructured":"Pashalidis, A.: Simulated annealing attack on certain fingerprint authentication systems. In: International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1\u201311. IEEE (2013)"},{"issue":"10","key":"31_CR22","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1016\/j.cviu.2013.06.003","volume":"117","author":"J Galbally","year":"2013","unstructured":"Galbally, J., Ross, A., Gomez-Barrero, M., Fierrez, J., Ortega-Garcia, J.: Iris image reconstruction from binary templates: an efficient probabilistic approach based on genetic algorithms. Comput. Vis. Image Underst. 117(10), 1512\u20131525 (2013)","journal-title":"Comput. Vis. Image Underst."},{"key":"31_CR23","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-319-25958-1_8","volume-title":"Advances in Face Detection and Facial Image Analysis","author":"E Learned-Miller","year":"2016","unstructured":"Learned-Miller, E., Huang, G.B., RoyChowdhury, A., Li, H., Hua, G.: Labeled faces in the wild: a survey. In: Kawulok, M., Celebi, M.E., Smolka, B. (eds.) Advances in Face Detection and Facial Image Analysis, pp. 189\u2013248. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-25958-1_8"},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.patcog.2019.01.039","volume":"91","author":"JB Kho","year":"2019","unstructured":"Kho, J.B., Kim, J., Kim, I.-J., Teoh, A.B.: Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn. 91, 245\u2013260 (2019)","journal-title":"Pattern Recogn."},{"issue":"12","key":"31_CR25","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/TPAMI.2010.52","volume":"32","author":"R Cappelli","year":"2010","unstructured":"Cappelli, R., Ferrara, M., Maltoni, D.: Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32(12), 2128 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"31_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TPAMI.2006.20","volume":"28","author":"R Cappelli","year":"2005","unstructured":"Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 28(1), 3\u201318 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2002: second fingerprint verification competition. In: International Conference on Pattern Recognition, vol. 3, pp. 811\u2013814. IEEE (2002)","DOI":"10.1109\/34.990140"},{"key":"31_CR28","doi-asserted-by":"crossref","unstructured":"Dong, X., Jin, Z., Jin, A.T.B.: A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/BTAS46853.2019.9185997"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8565-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:12:56Z","timestamp":1701735176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8565-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819985647","9789819985654"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8565-4_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xuzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}