{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:22:28Z","timestamp":1763202148117,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T00:00:00Z","timestamp":1520985600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Key Program of the Nature Science Foundation of Zhejiang province, China","award":["LZ17F020002"],"award-info":[{"award-number":["LZ17F020002"]}]},{"name":"the National Science Foundation of China","award":["61272045","61772166"],"award-info":[{"award-number":["61272045","61772166"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s00500-018-3046-8","type":"journal-article","created":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T04:15:34Z","timestamp":1521000934000},"page":"3843-3851","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion"],"prefix":"10.1007","volume":"23","author":[{"given":"Lin","family":"You","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4219-5603","authenticated-orcid":false,"given":"Ting","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,14]]},"reference":[{"key":"3046_CR1","doi-asserted-by":"crossref","unstructured":"Cavoukian A, Stoianov A (2011) Biometric encryption. In: Van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 90\u201398","DOI":"10.1007\/978-1-4419-5906-5_880"},{"issue":"11","key":"3046_CR2","doi-asserted-by":"publisher","first-page":"4286","DOI":"10.1007\/s11771-014-2426-1","volume":"21","author":"CJ Chae","year":"2014","unstructured":"Chae CJ, Choi KN, Choi K, Kin JS, Shin YJ (2014) Enhanced biometric encryption algorithm for private key protection in BioPKI system. J Cent South Univ Technol 21(11):4286\u20134290","journal-title":"J Cent South Univ Technol"},{"key":"3046_CR3","doi-asserted-by":"crossref","unstructured":"Dodis Y, Reyzin L. FuzzyeExtractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the international conference on advances in cryptology (EUROCRYPT\u2019 2004). Interlaken, pp 523\u2013540","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"3046_CR4","unstructured":"Geetika, Kaur M (2013) Multimodal based fuzzy vault using iris retina and finger vein. In: Proceedings of the fourth international conference on computing, communications and networking technologies. Tiruchengode, pp 1\u20135"},{"key":"3046_CR5","doi-asserted-by":"crossref","unstructured":"Hirschbichler M, Boyd C, Boles W (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In: the Proceeding of the 2008 international conference on digital image computing: techniques and applications. Canberra, pp 540\u2013547","DOI":"10.1109\/DICTA.2008.81"},{"key":"3046_CR6","doi-asserted-by":"crossref","unstructured":"Juels A, Sudan M (2002) A fuzzy vault scheme. In: Proceedings of the international symposium on information theory. Lausanne, p 408","DOI":"10.1109\/ISIT.2002.1023680"},{"issue":"2","key":"3046_CR7","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237\u2013257","journal-title":"Des Codes Cryptogr"},{"issue":"2","key":"3046_CR8","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/TIFS.2012.2234740","volume":"8","author":"S Li","year":"2013","unstructured":"Li S, Kot AC (2013) Fingerprint combination for privacy protection. IEEE Trans Inf Forensics Secur 8(2):350\u2013360","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3046_CR9","doi-asserted-by":"crossref","unstructured":"Liu H, Sun D, Xiong K, et al (2010) 3D fuzzy vault based on palmprint. In: Proceedings of the 2010 IEEE international conference on cyber-enabled distributed computing and knowledge discovery (CyberC). Huangshan, pp 230\u2013234","DOI":"10.1109\/CyberC.2010.49"},{"key":"3046_CR10","first-page":"1035","volume":"7","author":"L Lu","year":"2014","unstructured":"Lu L, Peng J (2014) Finger multi-biometric cryptosystem using feature-level fusion. Int J Signal Process Image Process Pattern Recognit 7:1035\u20131046","journal-title":"Int J Signal Process Image Process Pattern Recognit"},{"issue":"2","key":"3046_CR11","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10845-012-0656-3","volume":"25","author":"D Moon","year":"2014","unstructured":"Moon D, Chung Y, Seo C et al (2014) A practical implementation of fuzzy fingerprint vault for smart cards. J Intell Manuf 25(2):293\u2013302","journal-title":"J Intell Manuf"},{"issue":"1","key":"3046_CR12","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2011.2166545","volume":"7","author":"A Nagar","year":"2012","unstructured":"Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255\u2013268","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3046_CR13","doi-asserted-by":"crossref","unstructured":"Nandakumar K, Jain A K (2008) Multibiometric template security using fuzzy vault. In: the Proceeding of the 2008 international conference on biometrics: theory, applications and systems. Arlington, pp 1\u20136","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"3046_CR14","doi-asserted-by":"crossref","unstructured":"Nandakumar K, Nagar A, Jain A K (2007) Hardening fingerprint fuzzy vault using password. In: Proceeding of the 2007 international conference on Advances in Biometrics. Berlin, pp 927\u2013937","DOI":"10.1007\/978-3-540-74549-5_97"},{"key":"3046_CR15","doi-asserted-by":"crossref","unstructured":"Omar MN, Salleh M, Bakhtiari M (2014) Biometric encryption to enhance confidentiality in cloud computing. In: Proceeding of 2014 international symposium on biometrics and security technologies (ISBAST\u2019 15). Kuala Lumpur, pp 45\u201350","DOI":"10.1109\/ISBAST.2014.7013092"},{"key":"3046_CR16","doi-asserted-by":"crossref","unstructured":"Uludag U, Jain A (2006) Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of Cvpr workshop on privacy research in vision. New York, pp 17\u201322","DOI":"10.1109\/CVPRW.2006.185"},{"key":"3046_CR17","doi-asserted-by":"crossref","unstructured":"Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Lecture notes in computer science, vol 3546, pp 310\u2013319","DOI":"10.1007\/11527923_32"},{"key":"3046_CR18","doi-asserted-by":"crossref","unstructured":"Wu L, Xiao P, Jiang S, et al (2011) A fuzzy vault scheme for feature fusion. In: Proceedings of the 6th Chinese conference on Biometric recognition (CCBR\u201911). Beijing, pp 237\u2013243","DOI":"10.1007\/978-3-642-25449-9_30"},{"key":"3046_CR19","doi-asserted-by":"crossref","unstructured":"Wu L, Yuan S (2010) A face based fuzzy vault scheme for secure online authentication. In: Proceedings of the 2010 second international symposium on data, privacy, and e-commerce. New York, pp 45\u201349","DOI":"10.1109\/ISDPE.2010.13"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3046-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3046-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3046-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T23:57:16Z","timestamp":1660607836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3046-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,14]]},"references-count":19,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["3046"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3046-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2018,3,14]]},"assertion":[{"value":"14 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}