{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T21:51:15Z","timestamp":1774389075899,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Sci Technol"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1007\/s11390-007-9006-x","type":"journal-article","created":{"date-parts":[[2007,2,9]],"date-time":"2007-02-09T18:31:12Z","timestamp":1171045872000},"page":"54-59","source":"Crossref","is-referenced-by-count":2,"title":["Two-Factor Cancelable Biometrics Authenticator"],"prefix":"10.1007","volume":"22","author":[{"given":"Ying-Han","family":"Pang","sequence":"first","affiliation":[]},{"given":"Andrew T. B.","family":"J.","sequence":"additional","affiliation":[]},{"given":"David N. C.","family":"L","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,14]]},"reference":[{"key":"9006_CR1","first-page":"141","volume-title":"Secret & Lies: Digital Security in a Networked","author":"B Schneier","year":"2000","unstructured":"Schneier B. Secret & Lies: Digital Security in a Networked World, New York: John Wiley & Sons, 2000, pp.141\u2013145."},{"key":"9006_CR2","unstructured":"Braithwaite M, Ulf Cahn von Seelen, Cambier J et al. Application-specific biometrics templates. In Proc. IEEE Workshop on Automatic Identification Advanced Technologies, Tarrytown, NY, 2002, pp.167\u2013171."},{"key":"9006_CR3","doi-asserted-by":"crossref","first-page":"2727","DOI":"10.1016\/S0031-3203(01)00247-3","volume":"35","author":"R M Bolle","year":"2002","unstructured":"Bolle R M, Connel J H, Ratha N K. Biometric perils and patches. Pattern Recognition, 2002, 35: 2727\u20132738.","journal-title":"Pattern Recognition"},{"key":"9006_CR4","unstructured":"Daugman J. Biometric decision landscapes. Technical Report, No.482, Cambridge University Computer Laboratory, 2002."},{"issue":"6","key":"9006_CR5","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Umut","year":"2004","unstructured":"Umut U, Sharah P, Salil P et al. Biometric cryptosystems: Issues and challenges. Proc. the IEEE, 2004, 92(6): 948\u2013960.","journal-title":"Proc. the IEEE"},{"key":"9006_CR6","doi-asserted-by":"crossref","unstructured":"Goh A, Ngo D. Computation of cryptographic keys from face biometrics. In Proc. 7th IFIP Communications and Multimedia Security, Torino, 2003, pp.1\u201313.","DOI":"10.1007\/978-3-540-45184-6_1"},{"issue":"3","key":"9006_CR7","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N Ratha","year":"2001","unstructured":"Ratha N, Connell J, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J., 2001, 40(3): 614\u2013634.","journal-title":"IBM Syst. J"},{"key":"9006_CR8","doi-asserted-by":"crossref","unstructured":"Davida G I, Frankel Y, Matt B J. On enabling secure applications through off-line biometric identification. In Proc. IEEE Symp. Privacy and Security, 1998, pp.148\u2013157.","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"9006_CR9","doi-asserted-by":"crossref","unstructured":"Mukundan R, Ramakrishnan K R. Moment Functions in Image Analysis\u2014Theory and Applications. World Scientific Publishing, 1998.","DOI":"10.1142\/9789812816092"},{"key":"9006_CR10","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1109\/34.3913","volume":"10","author":"C H Teh","year":"1998","unstructured":"Teh C H, Chin R T. On image analysis by the methods of moments. IEEE Trans. Pattern Anal. Machine Intell., 1998, 10: 496\u2013512.","journal-title":"IEEE Trans. Pattern Anal. Machine Intell"},{"issue":"5","key":"9006_CR11","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/34.55109","volume":"12","author":"A Khotanzad","year":"1990","unstructured":"Khotanzad A. Invariant image recognition by Zernike moments. IEEE Trans. Pattern. Anal. Machine Intell., 1990, 12(5): 489\u2013497.","journal-title":"IEEE Trans. Pattern. Anal. Machine Intell"},{"key":"9006_CR12","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes A, Oorschot P V, Vanstone S. Handbook of Applied Cryptography. Boca Raton: CRC Press, 1996."},{"key":"9006_CR13","unstructured":"Vision Group of Essex University\u2014Face Database, http:\/\/cswww.essex.ac.uk\/allfaces\/index.html ."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9006-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-007-9006-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9006-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T18:36:31Z","timestamp":1736793391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-007-9006-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["9006"],"URL":"https:\/\/doi.org\/10.1007\/s11390-007-9006-x","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}