{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T11:12:58Z","timestamp":1721128378407},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2014,7,18]],"date-time":"2014-07-18T00:00:00Z","timestamp":1405641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s11760-014-0663-2","type":"journal-article","created":{"date-parts":[[2014,7,17]],"date-time":"2014-07-17T18:27:27Z","timestamp":1405621647000},"page":"99-109","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system"],"prefix":"10.1007","volume":"9","author":[{"given":"Ning","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]},{"given":"Jialiang","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Xuehu","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,18]]},"reference":[{"key":"663_CR1","doi-asserted-by":"crossref","unstructured":"Wang, N., Li, Q., El-Latif, A.A.A., Zhang, T., Niu, X.: Toward accurate localization and high recognition performance for noisy iris images. Multimedia Tools Appl. 71(3), 1411 \u20131430 (2014). \u00a0doi: 10.1007\/s11042-012-1278-7","DOI":"10.1007\/s11042-012-1278-7"},{"issue":"2","key":"663_CR2","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/TIFS.2011.2108288","volume":"6","author":"S Venugopalan","year":"2011","unstructured":"Venugopalan, S., Savvides, M.: How to generate spoofed irises from an iris code template. IEEE Trans. Inf. Foren. Sec. 6(2), 385\u2013395 (2011)","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"issue":"5","key":"663_CR3","first-page":"90","volume":"3","author":"VM Mane","year":"2009","unstructured":"Mane, V.M., Jadhav, D.V.: Review of multimodal biometrics: applications, challenges and research areas. J. Biom. Bioinf. 3(5), 90\u201395 (2009)","journal-title":"J. Biom. Bioinf."},{"issue":"4","key":"663_CR4","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1109\/TIFS.2009.2033227","volume":"4","author":"B Fu","year":"2009","unstructured":"Fu, B., Yang, S.X., Li, J., Hu, D.: Multibiometric cryptosystem: model structure and performance analysis. IEEE Trans. Inf. Forensics Secur. 4(4), 867\u2013882 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"663_CR5","doi-asserted-by":"crossref","unstructured":"Nandakumar, K., Jain, A.K.: Multibiometric template security using fuzzy vault. Presented at the IEEE 2nd International Conference on Biometrics: Theory, Applications and Systems, Arlington, VA, United States (2008)","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"663_CR6","volume-title":"Handbook of Multibiometrics, Ch. 1","author":"AA Ross","year":"2006","unstructured":"Ross, A.A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics, Ch. 1. Springer, London (2006)"},{"key":"663_CR7","doi-asserted-by":"crossref","first-page":"1116","DOI":"10.4028\/www.scientific.net\/AMM.236-237.1116","volume":"236\u2013237","author":"M Wang","year":"2012","unstructured":"Wang, M., Wang, N., Yao, X.: Noisy iris segmentation with reflections removal using probable boundary edge detector. Appl. Mech. Mater. 236\u2013237, 1116\u20131121 (2012)","journal-title":"Appl. Mech. Mater."},{"key":"663_CR8","doi-asserted-by":"crossref","unstructured":"Wang, N., Li, Q., El-Latif, A.A.A., Peng, J., Niu, X.: An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients. Multimedia Tools Appl. doi: 10.1007\/s11042-013-1551-4","DOI":"10.1007\/s11042-013-1551-4"},{"issue":"113","key":"663_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2008\/657081","volume":"2008","author":"AK Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Sig. Pr. 2008(113), 1\u201320 (2008)","journal-title":"EURASIP J. Adv. Sig. Pr."},{"key":"663_CR10","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/11506157_21","volume":"3574","author":"R Ang","year":"2005","unstructured":"Ang, R., Safavi-Naini, R., McAven, L.: Cancelable key-based fingerprint templates. Lect. Notes Comput. Sci. 3574, 242\u2013252 (2005)","journal-title":"Lect. Notes Comput. Sci."},{"key":"663_CR11","doi-asserted-by":"crossref","unstructured":"Moon, D., Gil, Y.H., Ahn, D., Pan, S.B., Chung, Y., Park, C.H.: Fingerprint-based authentication for USB token systems Chee Hang park. Lect. Notes Comput. Sci. 2908, 355\u2013364 (2003)","DOI":"10.1007\/978-3-540-24591-9_27"},{"key":"663_CR12","unstructured":"Souta, C., Boberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: ICSA Guide to Cryptography, Ch. 22. McGraw-Hill Companies, New York (1998)"},{"key":"663_CR13","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: Fuzzy commitment scheme. In: Proceedings of ACM Conference Computer and Communications Security, Singapore, Singapore, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"issue":"2","key":"663_CR14","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptogr. 38(2), 237\u2013257 (2006)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"663_CR15","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"663_CR16","unstructured":"Yanikoglu, B., Kholmatov, A.: Combining multiple biometrics to protect privacy. In: Proceedings of 17th International Conference on Pattern Recognition Workshop on Biometrics: Challenges Arising from Theory to Practice, Cambridge, England, pp. 1\u20134 (2004)"},{"key":"663_CR17","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., Li, Q., Memon, N.: Secure biometric templates from fingerprint-face features. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Minneapolis, United States, pp. 17\u201322 (2007)","DOI":"10.1109\/CVPR.2007.383385"},{"key":"663_CR18","doi-asserted-by":"crossref","unstructured":"Kanade, S., Petrovska-Delacretaz, D., Dorizzi, B.: Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication. Presented at the 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, San Francisco, CA, United States, pp. 138\u2013145 (2010)","DOI":"10.1109\/CVPRW.2010.5544618"},{"key":"663_CR19","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., Uhl, A., Wild, P.: Reliability-balanced feature level fusion for fuzzy commitment scheme. Presented at the 2011 International Joint Conference on Biometrics, Washington, DC, United States, pp. 1\u20137 (2011)","DOI":"10.1109\/IJCB.2011.6117535"},{"issue":"1","key":"663_CR20","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TIFS.2011.2166545","volume":"7","author":"A Nagar","year":"2012","unstructured":"Nagar, A., Nandakumar, K., Jain, A.: Multibiometric cryptosystems based on feature-level fusion. IEEE Trans. Inf. Forensics (2) 7(1), 255\u2013268 (2012)","journal-title":"IEEE Trans. Inf. Forensics (2)"},{"key":"663_CR21","doi-asserted-by":"crossref","unstructured":"Abd El-Latif, A.A., Niu, X., Amin, M.: A new image cipher in time and frequency domains. Opt. Commun. 285(21\u201322), 4241\u20134251 (2012)","DOI":"10.1016\/j.optcom.2012.06.041"},{"key":"663_CR22","doi-asserted-by":"crossref","unstructured":"Wang, N., Li, Q., El-Latif, A.A.A., Yan, X., Niu, X.: A novel hybrid multibiometrics based on the fusion of dual iris, visible and thermal face images. Presented at the International Symposium on Biometrics and Security Technologies, pp. 1\u20136 (2013)","DOI":"10.1109\/ISBAST.2013.38"},{"issue":"1","key":"663_CR23","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/BF02189626","volume":"25","author":"A J\u00e1nos","year":"1982","unstructured":"J\u00e1nos, A., Alsina, C.: Characterizations of some classes of quasilinear functions with applications to triangular norms and to synthesizing judgements. Aequationes Math. 25(1), 313\u2013315 (1982)","journal-title":"Aequationes Math."},{"issue":"9","key":"663_CR24","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/5.628719","volume":"85","author":"W Shen","year":"1997","unstructured":"Shen, W., Surette, M., Khanna, R.: Evaluation of automated biometrics-based identification and verification systems. Proc. IEEE 85(9), 1464\u20131467 (1997)","journal-title":"Proc. IEEE"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0663-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-014-0663-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0663-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:45:58Z","timestamp":1559425558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-014-0663-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,18]]},"references-count":24,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["663"],"URL":"https:\/\/doi.org\/10.1007\/s11760-014-0663-2","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,18]]}}}