{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T05:44:06Z","timestamp":1672724646734},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11623-022-1712-6","type":"journal-article","created":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T11:15:19Z","timestamp":1672658119000},"page":"31-36","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-biometrische Kryptosysteme"],"prefix":"10.1007","volume":"47","author":[{"given":"Christian","family":"Rathgeb","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Merkle","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Tams","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Neu","sequence":"additional","affiliation":[]},{"given":"Ulrike","family":"Korte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,2]]},"reference":[{"key":"1712_CR1","doi-asserted-by":"crossref","unstructured":"C. Rathgeb and A. Uhl, \u201cA survey on biometric cryptosystems and cancelable biometrics,\u201d EURASIP Journal on Information Security, vol. 2011, no. 3, 2011.","DOI":"10.1186\/1687-417X-2011-3"},{"key":"1712_CR2","doi-asserted-by":"crossref","unstructured":"K. Nandakumar and A. K. Jain, \u201cBiometric template protection: Bridging the performance gap between theory and practice,\u201d IEEE Signal Processing Magazine \u2013 Special Issue on Biometric Security and Privacy, pp. 1\u201312, 2015.","DOI":"10.1109\/MSP.2015.2427849"},{"key":"1712_CR3","unstructured":"ISO\/IEC JTC 1\/SC 27 IT Security techniques, ISO\/IEC 24745:2011. Information technology \u2013 Security techniques \u2013 Biometric information protection, 2011."},{"key":"1712_CR4","doi-asserted-by":"crossref","unstructured":"A. Juels and M. Wattenberg, \u201cA fuzzy commitment scheme,\u201d in 6th ACM Conf. on Computer and Communications Security (CCS), 1999, pp. 28\u201336.","DOI":"10.1145\/319709.319714"},{"key":"1712_CR5","unstructured":"A. Juels and M. Sudan, \u201cA fuzzy vault scheme,\u201d in IEEE Int\u2019l Symposium on Information Theory (ISIT), 2002, p. 408."},{"key":"1712_CR6","doi-asserted-by":"crossref","unstructured":"C. Rathgeb und C. Busch, \u201eMulti-biometric Template Protection: Issues and Challenges,\u201c in New Trends and Developments in Biometrics, InTech, 2012.","DOI":"10.5772\/52152"},{"key":"1712_CR7","unstructured":"J. Merkle, T. Kevenaar, and U. Korte, \u201cMulti-modal and multi-instance fusion for biometric cryptosystems,\u201d in Int\u2019l Conf. of Biometrics Special Interest Group (BIOSIG), 2012, pp. 1\u20136."},{"key":"1712_CR8","doi-asserted-by":"crossref","unstructured":"M.-H. Lim, A. B. J. Teoh, and J. Kim, \u201cBiometric feature-type transformation: Making templates compatible for secret protection,\u201d IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 77\u201387, 2015.","DOI":"10.1109\/MSP.2015.2423693"},{"key":"1712_CR9","doi-asserted-by":"crossref","unstructured":"B. Tams, \u201cUnlinkable minutiae-based fuzzy vault for multiple fingerprints,\u201d IET Biometrics, vol. 5, pp. 170\u2013180, 2016.","DOI":"10.1049\/iet-bmt.2014.0093"},{"key":"1712_CR10","doi-asserted-by":"crossref","unstructured":"C. Rathgeb, B. Tams, J. Wagner, and C. Busch, \u201cUnlinkable improved multi-biometric iris fuzzy vault,\u201d EURASIP Journal on Information Security, vol. 2016, 2016.","DOI":"10.1186\/s13635-016-0049-9"},{"key":"1712_CR11","doi-asserted-by":"crossref","unstructured":"K. Nandakumar und A. Jain, \u201eMultibiometric Template Security Using Fuzzy Vault,\u201c in International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2008.","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"1712_CR12","doi-asserted-by":"crossref","unstructured":"V. S. Meenakshia und G. Padmavathi, \u201eSecurity analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications,\u201c Proc. Computer. Science, 2010.","DOI":"10.1016\/j.procs.2010.11.025"},{"key":"1712_CR13","doi-asserted-by":"crossref","unstructured":"A. Nagar, K. Nandakumar, and A. Jain, \u201cMultibiometric cryptosystems based on feature-level fusion,\u201d Trans. on Information Forensics and Security, vol. 7, no. 1, pp. 255\u2013268, 2012.","DOI":"10.1109\/TIFS.2011.2166545"},{"key":"1712_CR14","doi-asserted-by":"crossref","unstructured":"K. Zhang, Z. Zhang, Z. Li and Y. Qiao, \u201cJoint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks,\u201d in IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.","DOI":"10.1109\/LSP.2016.2603342"},{"key":"1712_CR15","doi-asserted-by":"crossref","unstructured":"J. Deng, J. Guo, N. Xue, and S. Zafeiriou, \u201cArcFace: Additive angular margin loss for deep face recognition,\u201d in Conf. on Computer Vision and Pattern Recognition (CVPR), 2019, pp. 4685\u20134694.","DOI":"10.1109\/CVPR.2019.00482"},{"key":"1712_CR16","doi-asserted-by":"crossref","unstructured":"C. Rathgeb, J. Merkle, J. Scholz, B. Tams und V. Nesterowicz, \u201eDeep Face Fuzzy Vault: Implementation and Performance,\u201c Computers & Secuirty, 2022.","DOI":"10.1016\/j.cose.2021.102539"},{"key":"1712_CR17","doi-asserted-by":"crossref","unstructured":"J. Merkle, B. Tams, B. Dieckmann und U. Korte, \u201exTARP: Improving the Tented Arch Reference Point Detection Algorithm\u201c, in Int\u2019l Conf. of Biometrics Special Interest Group (BIOSIG), 2017.","DOI":"10.23919\/BIOSIG.2017.8053525"},{"key":"1712_CR18","doi-asserted-by":"crossref","unstructured":"V. Guruswami and M. Sudan, \u201cImproved decoding of Reed-Solomon and algebraic-geometric codes,\u201d IEEE Transactions on Information Theory, vol. 45, pp. 1757\u20131767, 1998.","DOI":"10.1109\/18.782097"},{"key":"1712_CR19","doi-asserted-by":"crossref","unstructured":"A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, \u201cA survey on homomorphic encryption schemes: Theory and implemention,\u201d ACM Computing Surveys (CSUR), vol. 51, no. 4, pp. 1\u201335, 2018.","DOI":"10.1145\/3214303"},{"key":"1712_CR20","doi-asserted-by":"crossref","unstructured":"Y. Sutcu, H. T. Sencar, and N. Memon, \u201cHow to measure biometric information?\u201d in Int\u2019l Conf. on Pattern Recognition (ICPR), 2010, pp. 1469\u20131472.","DOI":"10.1109\/ICPR.2010.363"},{"key":"1712_CR21","unstructured":"BioKeyS: Kryptographisch-biometrische Authentisierungssysteme mittels biometrischer Template-Protection-Verfahren. URL: https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Informationen-und-Empfehlungen\/Technologien_sicher_gestalten\/Biometrie\/BSIProjekte\/BioKeyS\/biokeys.html"},{"key":"1712_CR22","doi-asserted-by":"crossref","unstructured":"J. Merkle, U. Korte, H. Ihmor, M. Niesing and M. Schwaiger: \u201cSecurity Capacity of the Fuzzy Fingerprint Vault\u201d, International Journal on Advances in Security, Vol. 3, no. 3&4, S. 146-168, 2010.","DOI":"10.1109\/ICIMP.2010.17"},{"key":"1712_CR23","unstructured":"J. Merkle, U. Korte, H. Ihmor, M. Niesing, and M. Schwaiger: \u201cPerformance of the Fuzzy Vault for Multiple Fingerprints\u201d, in Int\u2019l Conference of the Biometrics Special Interest Group (BIOSIG, 57-72, 2010."},{"key":"1712_CR24","doi-asserted-by":"crossref","unstructured":"M. Neu, U. Korte, M. Ullmann: \u201cImprovement of Fuzzy Vault for Multiple Fingerprints with Angles\u201d, Int\u2019l Conference of the Biometrics Special Interest Group (BIOSIG), 233-240, 2016.","DOI":"10.1109\/BIOSIG.2016.7736926"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1712-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-022-1712-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1712-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T11:51:59Z","timestamp":1672660319000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-022-1712-6"}},"subtitle":["Fuzzy Vault mit Gesicht und Fingerabdr\u00fccken"],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["1712"],"URL":"https:\/\/doi.org\/10.1007\/s11623-022-1712-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}