{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:43:07Z","timestamp":1773654187301,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2009,8,20]],"date-time":"2009-08-20T00:00:00Z","timestamp":1250726400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s10207-009-0090-5","type":"journal-article","created":{"date-parts":[[2009,8,19]],"date-time":"2009-08-19T10:16:32Z","timestamp":1250676992000},"page":"447-454","source":"Crossref","is-referenced-by-count":12,"title":["Biometric keys: suitable use cases and achievable information content"],"prefix":"10.1007","volume":"8","author":[{"given":"Rainer","family":"Plaga","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,20]]},"reference":[{"key":"90_CR1","doi-asserted-by":"crossref","unstructured":"Adler, A.: Vulnerabilities in biometric encryption systems. In: Proceedings Audio- and Video-based Biometric Person Authentication (AVBPA 2005), Rye Brook, New York. LNCS, vol. 3546, pp.1100\u20131109. Springer, Berlin (2005)","DOI":"10.1007\/11527923_114"},{"key":"90_CR2","unstructured":"BioP2: Untersuchung der Leistungsf\u00e4higkeit von biometrischen Verifikationssystemen\u2014BioP2. BSI, BKA, Secunet. Available at http:\/\/www.bsi.bund.de\/fachthem\/biometrie\/projekte\/index.htm (2005)"},{"key":"90_CR3","unstructured":"BioFinger: Evaluierung biometrischer Systeme Fingerabdrucktechnologien BioFinger. BSI, BKA, Fraunhofer IGD. Available at http:\/\/www.bsi.bund.de\/fachthem\/biometrie\/projekte\/index.htm (2004)"},{"key":"90_CR4","unstructured":"Bodo, A.: Verfahren zur Erzeugung einer digitalen Signatur mit Hilfe eines biometrischen Merkmals. Deutsches Patent DE 4243908 A1, Anmeldung (1992)"},{"key":"90_CR5","volume-title":"Cryptography, Information Theory and Error Correction","author":"A.A. Bruen","year":"2005","unstructured":"Bruen A.A., Forcinito M.A.: Cryptography, Information Theory and Error Correction. Wiley Interscience, Hoboken (2005)"},{"key":"90_CR6","unstructured":"Burnett, A., Duffy, A., Towling, T.: A Biometric Identity Based Signature Scheme. eprint.iacr.org, number 176 (2004)"},{"key":"90_CR7","volume-title":"Forensic DNA Typing","author":"J.M. Butler","year":"2005","unstructured":"Butler J.M.: Forensic DNA Typing. Elsevier, Amsterdam (2005)"},{"key":"90_CR8","doi-asserted-by":"crossref","unstructured":"Cappelli, R., Erol, A., Maio, D., Maltoni, D.: Synthetic fingerprint-image generation. In: Proceedings International Conference on Pattern Recognition (ICPR2000), vol. 3, pp.475\u2013478. \u201cSfinge\u201d tool is available for download at http:\/\/bias.csr.unibo.it\/research\/biolab\/sfinge.html (2000)","DOI":"10.1109\/ICPR.2000.903586"},{"key":"90_CR9","doi-asserted-by":"crossref","unstructured":"Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, pp. 45\u201352. ACM Press, Berkeley (2003)","DOI":"10.1145\/982507.982516"},{"key":"90_CR10","doi-asserted-by":"crossref","unstructured":"Davida, G.I., Frankel, Y., Matt B.J.: On enabling secure applications through off-line biometric identification. In: 1998 IEEE Symposium on Security and Privacy, pp. 148\u2013157 (1998)","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"90_CR11","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/S0031-3203(02)00030-4","volume":"36","author":"J. Daugman","year":"2003","unstructured":"Daugman J.: The importance of being random: statistical principles of iris recognition. Pattern Recognit. 36, 279\u2013291 (2003)","journal-title":"Pattern Recognit."},{"key":"90_CR12","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate String Keys from Biometrics and Other Noisy Data. eprint.iacr.org, number 235 (2003)","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"2","key":"90_CR13","first-page":"159","volume":"10","author":"F. Hao","year":"2002","unstructured":"Hao F., Chan C.W.: Private key generation from on-line handwritten signatures. Inf. Manag. Comput. Secur. 10(2), 159\u2013164 (2002)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"90_CR14","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F. Hao","year":"2006","unstructured":"Hao F., Anderson R., Daugman J.: Combining crypto with biometrics effectively. IEEE Trans. Comp. 55, 1081\u20131088 (2006)","journal-title":"IEEE Trans. Comp."},{"key":"90_CR15","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Tsudik, G (ed.) Sixth ACM Conference on Computer and Communiation Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"key":"90_CR16","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A. Juels","year":"2006","unstructured":"Juels A., Sudan M.A.: Fuzzy Vault Scheme. Des. Codes Cryptogr. 38, 237\u2013257 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"90_CR17","doi-asserted-by":"crossref","unstructured":"Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Computational Science and its Applications. Lecture Notes in Computer Science, vol. 3043, pp.728\u2013737. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24707-4_85"},{"key":"90_CR18","doi-asserted-by":"crossref","unstructured":"Linnartz, J.P., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Proceedings of 4th International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA 2003). LNCS, vol. 2688, pp.393\u2013402. Springer, Berlin (2003)","DOI":"10.1007\/3-540-44887-X_47"},{"key":"90_CR19","unstructured":"Martini, U., Beinlich, S.: Virtual PIN: Biometric Encryption Using Coding Theory. In: Br\u00f6mme, A., Busch, C (eds.) Proceedings of BIOSIG 2003: Biometric and Electronic Signatures. Lecture Notes in Informatics (LNI P-31), pp. 91\u201399. GI edition (2003)"},{"key":"90_CR20","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MSECP.2003.1203221","volume":"33","author":"V. Matyas Jr.","year":"2003","unstructured":"Matyas V. Jr., Riha Z.: Toward reliable user authentication through biometrics. IEEE Secur. Priv. 33, 45\u201349 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"90_CR21","volume-title":"Biometrics\u2014Identity Verification in a Networked World","author":"S. Nanavati","year":"2002","unstructured":"Nanavati S., Thieme M., Nanavati R.: Biometrics\u2014Identity Verification in a Networked World. Wiley, New York (2002)"},{"key":"90_CR22","unstructured":"Rainbow: http:\/\/www.rainbowcrack-online.com\/ (2005)"},{"key":"90_CR23","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier B.: Applied Cryptography. Wiley, Hoboken (1996)"},{"key":"90_CR24","doi-asserted-by":"crossref","unstructured":"Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption TM using image processing. In: Proceedings of SPIE, vol. 3314, pp. 178\u2013188; see also Website of Bioscrypt Inc. http:\/\/www.bioscrypt.com (1998)","DOI":"10.1117\/12.304705"},{"key":"90_CR25","doi-asserted-by":"crossref","unstructured":"Tuyls, T., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: 5th International Conference on Audio- and Video-Based Personal Authentication (AVBPA 2005), Rye Brook, New York. LNCS, vol. 3546, pp. 436\u2013441. Springer, Berlin (2005)","DOI":"10.1007\/11527923_45"},{"key":"90_CR26","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U. Uludag","year":"2004","unstructured":"Uludag U., Pankanti S., Prabhakar S., Jain A.K.: Biometric Cryptosystems: Issues and Challenges. Proc. IEEE 92, 948\u2013960 (2004)","journal-title":"Proc. IEEE"},{"key":"90_CR27","doi-asserted-by":"crossref","unstructured":"Uludag, U., Pankanti, S., Jain, A.: Fuzzy Vault for Fingerprints. In: Proceedings of Audio- and Video-based Biometric Person Authentication (AVBPA 2005), Rye Brook, New York. LNCS, vol. 3546, pp. 310\u2013319. Springer, Berlin (2005)","DOI":"10.1007\/11527923_32"},{"key":"90_CR28","unstructured":"Vogel, K., Beinlich, S., Martini, U.: Verfahren zum Schutz von Daten. Deutsches Patent DE 19940341 A1, Anmeldung (1999)"},{"key":"90_CR29","doi-asserted-by":"crossref","unstructured":"Wheeler, D.: Protocols using keys from faulty data. In: Security Protocols. LNCS, vol. 2467, pp. 170\u2013179 (2002)","DOI":"10.1007\/3-540-45807-7_26"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0090-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0090-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0090-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T19:55:04Z","timestamp":1739303704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0090-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,20]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["90"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0090-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8,20]]}}}