{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:14:44Z","timestamp":1774541684396,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/btas.2010.5634506","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T21:30:10Z","timestamp":1290202210000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["Reversing protected minutiae vicinities"],"prefix":"10.1109","author":[{"given":"Koen","family":"Simoens","sequence":"first","affiliation":[]},{"given":"Chi-Ming","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TSMCB.2007.896999","article-title":"Alignment-free cancelable fingerprint templates based on local minutiae information","volume":"37","author":"lee","year":"2007","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B Cybernetics"},{"key":"17","first-page":"750","article-title":"Robust extraction of secret bits from minutiae","volume":"4642","author":"chang","year":"2007","journal-title":"ICB 2007"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366189"},{"key":"15","first-page":"760","article-title":"Fuzzy extractors for minutiae-based fingerprint authentication","volume":"4642","author":"arakala","year":"2007","journal-title":"ICB 2007"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383110"},{"key":"13","first-page":"242","article-title":"Cancelable key-based fingerprint templates","volume":"3574","author":"ang","year":"2005","journal-title":"ACISP"},{"key":"14","first-page":"310","article-title":"Fuzzy vault for fingerprints","volume":"3546","author":"uludag","year":"2005","journal-title":"AVBPA"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903538"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.016"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339058"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"key":"24","first-page":"1","article-title":"Securing fingerprint template: Fuzzy vault with minutiae descriptors","author":"nagar","year":"2008","journal-title":"Proc International Conf on Pattern Recognition (ICPR)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2021692"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1117\/12.839976","article-title":"Biometric template transformation: A security analysis","volume":"7541","author":"nagar","year":"2010","journal-title":"Media Forensics and Security II"},{"key":"27","first-page":"61","article-title":"The practical subtleties of biometric key generation","author":"ballard","year":"2008","journal-title":"Proc of the 17th Annual USENIX Security Symposium"},{"key":"28","article-title":"Audio- and video-based biometric person authentication","volume":"3546","author":"kanade","year":"2005","journal-title":"5th International Conference AVBPA 2005"},{"key":"29","volume":"4642","author":"lee","year":"2007","journal-title":"Advances in Biometrics International Conference ICB 2007"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"2","author":"cavoukian","year":"2007","journal-title":"Biometric Encryption A Positive-Sum Technology that Achieves Strong Authentication Security AND Privacy"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401904"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"7","first-page":"393","article-title":"New shielding functions to enhance privacy and prevent misuse of biometric templates","volume":"2688","author":"linnartz","year":"2003","journal-title":"AVBPA"},{"key":"6","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/ISIT.2002.1023680","article-title":"A fuzzy vault scheme","author":"juels","year":"2002","journal-title":"Proc of IEEE International Symposium on Information Theory"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"9","first-page":"436","article-title":"Practical biometric authentication with template protection","volume":"3546","author":"tuyls","year":"2005","journal-title":"AVBPA"},{"key":"8","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"Advances in Cryptology - EUROCRYPT 2004"}],"event":{"name":"2010 IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems (BTAS)","location":"Washington, DC, USA","start":{"date-parts":[[2010,9,27]]},"end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5618724\/5634461\/05634506.pdf?arnumber=5634506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:20:38Z","timestamp":1497889238000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/btas.2010.5634506","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}