{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T16:45:12Z","timestamp":1648831512595},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11623-013-0142-x","type":"journal-article","created":{"date-parts":[[2013,6,14]],"date-time":"2013-06-14T08:48:37Z","timestamp":1371199717000},"page":"367-370","source":"Crossref","is-referenced-by-count":0,"title":["Towards enhancing the security and accuracy of iris recognition systems"],"prefix":"10.1007","volume":"37","author":[{"given":"Christian","family":"Rathgeb","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,15]]},"reference":[{"issue":"2","key":"142_CR1","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.cviu.2007.08.005","volume":"110","author":"KW Bowyer","year":"2007","unstructured":"K.W. Bowyer, K. Hollingsworth, and P.J. Flynn. Image understanding for iris biometrics: A survey. Computer Vision and Image Understanding, 110(2):281\u2013307, 2007.","journal-title":"Computer Vision and Image Understanding"},{"issue":"1","key":"142_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"J. Daugman, J. (2004). How iris recognition works, IEEE Transactions on Circiuts and Systems for Video Technology 14(1): 21\u201330.","journal-title":"IEEE Transactions on Circiuts and Systems for Video Technology"},{"issue":"9","key":"142_CR3","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"F. Hao, R. Anderson, and J. Daugman. Combining Cryptography with Biometrics Effectively. IEEE Transactions on Computers, 55(9):1081\u20131088, 2006.","journal-title":"IEEE Transactions on Computers"},{"key":"142_CR4","first-page":"28","volume-title":"In Proc. 6th ACM Conf. on Computer and Communications Security","author":"A Juels","year":"1999","unstructured":"A. Juels and M. Wattenberg. A fuzzy commitment scheme. In Proc. 6th ACM Conf. on Computer and Communications Security, pages 28\u201336. ACM, 1999."},{"key":"142_CR5","volume-title":"Recognition of Human Iris Patterns for Biometric Identification","author":"L Masek","year":"2003","unstructured":"L. Masek. Recognition of Human Iris Patterns for Biometric Identification. Master\u2019s thesis, University of Western Australia, 2003."},{"key":"142_CR6","doi-asserted-by":"crossref","unstructured":"C. Rathgeb and A. Uhl. A Survey on Biometric Cryptosystems and Cancelable Biometrics. EURASIP Journal on Information Security, 2011(3), 2011.","DOI":"10.1186\/1687-417X-2011-3"},{"key":"142_CR7","first-page":"1","volume-title":"In Proc. Int\u2019l Joint Conf. on Biometrics","author":"C Rathgeb","year":"2011","unstructured":"C. Rathgeb, A. Uhl, and P. Wild. Reliability-balanced Feature Level Fusion for Fuzzy Commitment Scheme. In Proc. Int\u2019l Joint Conf. on Biometrics, pages 1\u20137. IEEE, 2011."},{"key":"142_CR8","first-page":"1","volume-title":"Proc. 26th ACM Symp. On Applied Computing","author":"C Rathgeb","year":"2011","unstructured":"C. Rathgeb, A. Uhl, and P. Wild. Shifting Score Fusion: On Exploiting Shifting Variation in Iris Recognition. In Proc. 26th ACM Symp. On Applied Computing, pages 1\u20135. ACM, 2011."},{"key":"142_CR9","first-page":"1","volume-title":"Proc. 5th Int\u2019l Conf. on Biometrics","author":"C Rathgeb","year":"2012","unstructured":"C. Rathgeb, A. Uhl, and P. Wild. Iris-Biometric Comparators: Exploiting Comparison Scores towards an Optimal Alignment under Gaussian Assumption. In Proc. 5th Int\u2019l Conf. on Biometrics, pages 1\u20136. IEEE, 2012."},{"key":"142_CR10","first-page":"1","volume-title":"Proc. 19th Int\u2019l Conf. on Pattern Recognition","author":"J Zuo","year":"2008","unstructured":"J. Zuo, N. K. Ratha, and J. H. Connel. Cancelable Iris Biometric. Proc. 19th Int\u2019l Conf. on Pattern Recognition, pages 1\u20134, 2008."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0142-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0142-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0142-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0142-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:36Z","timestamp":1559413356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0142-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":10,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["142"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0142-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}