{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:32:06Z","timestamp":1775579526583,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,9,23]],"date-time":"2012-09-23T00:00:00Z","timestamp":1348358400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s13389-012-0041-3","type":"journal-article","created":{"date-parts":[[2012,9,22]],"date-time":"2012-09-22T03:40:37Z","timestamp":1348285237000},"page":"189-206","source":"Crossref","is-referenced-by-count":23,"title":["Analysis and experimental evaluation of image-based PUFs"],"prefix":"10.1007","volume":"2","author":[{"given":"Saloomeh","family":"Shariati","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Jacques","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Macq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,23]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.R., Standaert, F.X., Wachsmann, C.: A formalization of the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397\u2013412 (2011)","DOI":"10.1109\/SP.2011.10"},{"key":"41_CR2","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1109\/6144.991192","volume":"25","author":"S Bastia","year":"2002","unstructured":"Bastia, S.: Next generation technologies to combat counterfeiting of electronic components. IEEE Trans. Compon. Packag. Tech. 25, 175\u2013176 (2002)","journal-title":"IEEE Trans. Compon. Packag. Tech."},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Chong, C.N., et al.: Anti-counterfeiting with a random pattern. In: International Conference on Emerging Security Information, Systems and Technology, pp. 146\u2013153 (2008)","DOI":"10.1109\/SECURWARE.2008.12"},{"key":"41_CR4","unstructured":"Bauder, D.W.: An anti-counterfeiting concept for currency systems. Technical Report PTK-11990, Sandia National Labs, Albuquerque, NM (1983)"},{"key":"41_CR5","unstructured":"Commission on Engineering Committee on Next-Generation Currency Design and National Research Council Technical Systems. Counterfeit Deterrent Features for the Next-Generation Currency Design. The National Academies Press, Washington (1993)"},{"key":"41_CR6","unstructured":"Pappu, R.: Physical One-Way Functions. PhD thesis, MIT Press, Cambridge (2001)"},{"key":"41_CR7","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"RS Pappu","year":"2002","unstructured":"Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM conference on Computer and Communications Security (2002)","DOI":"10.1145\/586131.586132"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Schrijen, G.J., Skoric, B., van Geloven, J., Verhaegh, N., Wolters, R: Read-proof hardware from protective coatings. In: Cryprographic Hardware and Embedded Systems Workshop. LNCS, vol. 4249, pp. 369\u2013383. Springer, Berlin (2006)","DOI":"10.1007\/11894063_29"},{"issue":"10","key":"41_CR10","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 13(10), 1200\u20131205 (2005)","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"41_CR11","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: VLSI Circuits. Digest of Technical Papers, pp. 176\u2013179 (2004)"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). LNCS, vol. 4727, pp. 63\u201380 (2007)","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"41_CR13","unstructured":"Metois, E., Yarin, P., Salzman, N., Smit, J.R.: Fiberfingerprint identification. In: Workshop on Automatic Identification, pp. 147\u2013154 (2002)"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Buchanan, J.D.R., Cowburn, R.P., Jausovec, A.V., Petit, D., Seem, P., Xiong, G., Atkinson, D., Fenton, K., Allwood, D.A., Bryan, M.T.: Fingerprinting documents and packaging. Nature 475 (2005)","DOI":"10.1038\/436475a"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Clarkson, W., Weyrich, T., Finkelstein, A., Heninger, N., Halderman, J.A., Felten, E.W.: Fingerprinting blank paper using commodity scanners. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 301\u2013314 (2009)","DOI":"10.1109\/SP.2009.7"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Sharma, A., Subramanian, L., Brewer, E.A.: Paperspeckle: microscopic fingerprinting of paper. In: Proceedings of the 18th ACM conference on Computer and communications security, CCS \u201911, pp. 99\u2013110. ACM, New York (2011)","DOI":"10.1145\/2046707.2046721"},{"key":"41_CR17","unstructured":"Shariati, S., Standaert, F.-X., Jacques, L., Macq, B., Salhi, M.A., Antoine, P.: Random profiles of laser marks. In: WIC Symposium on Information Theory in the Benelux, pp. 27\u201334 (2010)"},{"key":"41_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84628-984-2","volume-title":"Security with Noisy Data","author":"P Tuyls","year":"2007","unstructured":"Tuyls, P., Skoric, B., Kevenaar, T.: Security with Noisy Data. Springer, Berlin (2007)"},{"key":"41_CR19","doi-asserted-by":"crossref","unstructured":"Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 3\u201337. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"41_CR20","doi-asserted-by":"crossref","unstructured":"Tuyls, P., \u0160kori\u0107, B.: Strong authentication with physical unclonable functions. In: Security, Privacy, and Trust in Modern Data Management, pp. 133\u2013148 (2007)","DOI":"10.1007\/978-3-540-69861-6_10"},{"key":"41_CR21","unstructured":"Tuyls, P., et al.: Secure Key Storage and Anti-Counterfeiting, pp. 255\u2013268 Springer, Berlin (2008)"},{"key":"41_CR22","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Topics in Cryptology\u2014CT-RSA 2006. LNCS, vol. 3860, pp. 115\u2013131. Springer, Berlin (2006)","DOI":"10.1007\/11605805_8"},{"issue":"2","key":"41_CR23","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1049\/iet-ifs.2009.0032","volume":"4","author":"P Bulens","year":"2010","unstructured":"Bulens, P., Standaert, F.-X., Quisquater, J.-J.: How to strongly link data and its medium: the paper case. IET Inf. Secur. 4(2), 125\u2013136 (2010)","journal-title":"IET Inf. Secur."},{"key":"41_CR24","doi-asserted-by":"crossref","unstructured":"Kirovski, D. Anti-counterfeiting: mixing the physical and the digital world. In: Foundations for Forgery-Resilient Cryptographic Hardware. Dagstuhl Seminar Proceedings, vol. 09282 (2010)","DOI":"10.1007\/978-3-642-14452-3_10"},{"key":"41_CR25","doi-asserted-by":"crossref","unstructured":"Shariati, S., Koeune, F., Standaert, F.-X.: Security analysis of image-based PUFs for anti-counterfeiting. In: Communications and Multimedia Security, pp. 27\u201334. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-32805-3_3"},{"key":"41_CR26","doi-asserted-by":"crossref","unstructured":"Skoric, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Applied Cryptography and Network Security (ACNS), pp. 407\u2013422 (2005)","DOI":"10.1007\/11496137_28"},{"issue":"10","key":"41_CR27","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10), 1200\u20131205 (2005)","journal-title":"IEEE Trans. VLSI Syst."},{"key":"41_CR28","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions.In Advances in Cryptology (ASIACRYPT). LNCS, vol. 5912, pp. 685\u2013702 (2009)","DOI":"10.1007\/978-3-642-10366-7_40"},{"key":"41_CR29","doi-asserted-by":"crossref","unstructured":"Baoshi, Z., Jiankang, W., Kankanhalli, M.S.: Print signatures for document authentication. In: ACM Conference on Computer and Communications Security, pp. 145\u2013153 (2003)","DOI":"10.1145\/948109.948131"},{"key":"41_CR30","doi-asserted-by":"crossref","unstructured":"Kirovski, D.: Toward an automated verification of certificates of authenticity. In: Proceedings of the 5th ACM conference on Electronic commerce, EC \u201904, pp. 160\u2013169. ACM, New York (2004)","DOI":"10.1145\/988772.988797"},{"key":"41_CR31","doi-asserted-by":"crossref","unstructured":"Chen, Y., Mih\u00e7ak, K., Kirovski, D.: Certifying authenticity via fiber-infused paper. SIGecom Exch. 5, 29\u201337 (April 2005)","DOI":"10.1145\/1120680.1120685"},{"key":"41_CR32","doi-asserted-by":"crossref","unstructured":"Chong, C.N., Jiang, D.: Anti-counterfeiting using phosphor puf. In: International Conference on In Anti-Counterfeiting, pp. 59\u201362 (2008)","DOI":"10.1109\/IWASID.2008.4688338"},{"key":"41_CR33","doi-asserted-by":"crossref","unstructured":"Beekhof, F., Voloshynovskiy, S., Koval, O., Vill\u00e1n, R.: Secure surface identification codes. In: Steganography, and Watermarking of Multimedia Contents X. Proceedings of SPIE, vol. 6819 (2008)","DOI":"10.1117\/12.765118"},{"key":"41_CR34","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Skoric, B.: Secret key generation from classical physics. In: Philips Research Book Series (2005)","DOI":"10.1007\/1-4020-4198-5_20"},{"key":"41_CR35","doi-asserted-by":"crossref","unstructured":"Shariati, S., Jacques, L., Standaert, F.-X., Macq, B., Salhi, M.A., Antoine, P.: Randomly driven fuzzy key extraction of uncloneable images. In: International Conference on Image Processing (ICIP) (2010)","DOI":"10.1109\/ICIP.2010.5652420"},{"key":"41_CR36","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conference on Computer and Communications Security (1999)","DOI":"10.1145\/319709.319714"},{"key":"41_CR37","doi-asserted-by":"crossref","unstructured":"Dodis, Y., et al.: Fuzzy extractors: How to generate strong secret keys from biometrics and other noisy data. In: Eurocrypt\u201904, pp. 523\u2013540 (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"41_CR38","unstructured":"Mallat, S.: A wavelet tour of signal processing: the sparse way, 3rd edn. Academic Press, New York (2008)"},{"key":"41_CR39","doi-asserted-by":"crossref","unstructured":"Jacques, L., Duval, L., Chaux, C., Peyr\u00e9, G.: A panorama on multiscale geometric representations, intertwining spatial, directional and frequency selectivity. Signal Process. 91, 2699\u20132730 (2011)","DOI":"10.1016\/j.sigpro.2011.04.025"},{"key":"41_CR40","doi-asserted-by":"crossref","unstructured":"Laska, J.N., Kirolos, S., Duarte, M.F., Ragheb, T., Baraniuk, R.G., Massoud, Y.: Theory and implementation of an analog-to-information converter using random demodulation. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1959\u20131962 (2007)","DOI":"10.1109\/ISCAS.2007.378360"},{"key":"41_CR41","doi-asserted-by":"crossref","unstructured":"Candes, E.J., Romberg, J.: Quantitative robust uncertainty principles and optimally sparse decompositions. Found. Comput. Math. 6, 227\u2013254 (April 2006)","DOI":"10.1007\/s10208-004-0162-x"},{"key":"41_CR42","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"Y Tsaig","year":"2006","unstructured":"Tsaig, Y., Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theory 52, 1289\u20131306 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"41_CR43","doi-asserted-by":"crossref","unstructured":"Ignatenko, T.: Secret-Key Rates and Privacy Leakage in Biometric Systems. PhD thesis, TU Eindhoven (2009)","DOI":"10.1109\/ISIT.2009.5205878"},{"key":"41_CR44","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"key":"41_CR45","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s00365-007-9003-x","volume":"28","author":"R Baraniuk","year":"2008","unstructured":"Baraniuk, R., Davenport, M., DeVore, R., Wakin, M.: A simple proof of the restricted isometry property for random matrices. Constr. Approx. 28, 253\u2013263 (2008)","journal-title":"Constr. Approx."},{"key":"41_CR46","first-page":"1145","volume":"42","author":"M Goemans","year":"1995","unstructured":"Goemans, M., Williamson, D.: Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. ACM 42, 1145 (1995)","journal-title":"ACM"},{"key":"41_CR47","unstructured":"Jacques, L., Laska, J. N., Boufounos, P.T., Baraniuk, R.G.: Robust 1-bit compressive sensing via binary stable embeddings of sparse vectors. ArXiv e-prints (2011)"},{"key":"41_CR48","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MSP.2007.914730","volume":"25","author":"MF Duarte","year":"2008","unstructured":"Duarte, M.F., Davenport, M.A., Takhar, D., Laska, J.N., Sun, T., Kelly, K.F., Baraniuk, R.G.: Single-pixel imaging via compressive sampling. IEEE Signal Proc. Mag 25, 83\u201391 (2008)","journal-title":"IEEE Signal Proc. Mag"},{"key":"41_CR49","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1038\/381607a0","volume":"381","author":"BA Olshausen","year":"1996","unstructured":"Olshausen, B.A., Field, D.J.: Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature 381, 607\u2013609 (1996)","journal-title":"Nature"},{"key":"41_CR50","unstructured":"Malacara, D.: Optical Shop Testing, 2nd edn. Wiley, New York (1992)"},{"key":"41_CR51","unstructured":"Wyant, J.C.: White light interferometry. In: Conference on Holography (SPIE) (2002)"},{"key":"41_CR52","unstructured":"Vincent, L.: Grayscale area openings and closings, their efficient implementation and applications. pp. 22\u201327 (1993)"},{"key":"41_CR53","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/83.217222","volume":"2","author":"L Vincent","year":"1993","unstructured":"Vincent, L.: Morphological grayscale reconstruction in image analysis: applications and efficient algorithms. IEEE Trans. Image Process. 2, 176\u2013201 (1993)","journal-title":"IEEE Trans. Image Process."},{"key":"41_CR54","doi-asserted-by":"crossref","unstructured":"Naini, F.M., Gribonval, R., Jacques, L., Vandergheynst, P.: Compressive sampling of pulse trains: spread the spectrum! In: IEEE International Conference on Acoustics Speech Signal Processing, pp. 2877\u20132880 (2009)","DOI":"10.1109\/ICASSP.2009.4960224"},{"key":"41_CR55","doi-asserted-by":"crossref","unstructured":"Puy, G., Vandergheynst, P., Gribonval, R., Wiaux, Y.: Universal and efficient compressed sensing by spread spectrum and application to realistic fourier imaging techniques. CoRR, abs\/1110.5870 (2011)","DOI":"10.1186\/1687-6180-2012-6"},{"issue":"3","key":"41_CR56","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1093\/biomet\/66.3.605","volume":"66","author":"W David","year":"1979","unstructured":"David, W.: SCOTT. On optimal and data-based histograms. Biometrika 66(3), 605\u2013610 (1979)","journal-title":"Biometrika"},{"key":"41_CR57","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TPAMI.2006.20","volume":"28","author":"Raffaele Cappelli","year":"2006","unstructured":"Cappelli, Raffaele, Maio, Dario, Maltoni, Davide, Wayman, James L., Jain, Anil K.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 28, 3\u201318 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-012-0041-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-012-0041-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-012-0041-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T06:12:51Z","timestamp":1744179171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-012-0041-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,23]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["41"],"URL":"https:\/\/doi.org\/10.1007\/s13389-012-0041-3","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,23]]}}}