{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:08:31Z","timestamp":1770329311094,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/btas.2010.5634538","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T21:30:10Z","timestamp":1290202210000},"page":"1-7","source":"Crossref","is-referenced-by-count":77,"title":["Dynamic random projection for biometric template protection"],"prefix":"10.1109","author":[{"given":"Bian","family":"Yang","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Hartung","sequence":"additional","affiliation":[]},{"given":"Koen","family":"Simoens","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0","journal-title":"VeriFinger Software"},{"key":"17","article-title":"Biometric template transformation: A security analysis","author":"nagar","year":"2010","journal-title":"Proc SPIE Electronic Imaging Media Forensics and Security XI"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.221"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1117\/12.839165"},{"key":"16","first-page":"40","article-title":"An analysis on invertibility of cancelable biometrics based on BioHashing","author":"cheung","year":"2005","journal-title":"CISS-2005"},{"key":"13","article-title":"Robust minutiae hash for fingerprint template protection","author":"yang","year":"2010","journal-title":"Proc SPIE Electronic Imaging Media Forensics and Security XI"},{"key":"14","first-page":"178","article-title":"Extending match-on-card to local biometric identification","author":"bringer","year":"2009","journal-title":"Proceedings of the Joint COST 2101 and 2102 International Conference on Biometric ID Management and Multimodal Communication"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903538"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1109\/ISIT.2002.1023680","article-title":"A fuzzy vault scheme","author":"juels","year":"2002","journal-title":"Proc of IEEE International Symposium on Information Theory"},{"key":"20","year":"2002","journal-title":"Fingerprint Verification Competition (FVC2002) Database DB2-A"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-009-0089-0"},{"key":"1","year":"2010","journal-title":"Information Technology - Security Techniques - Biometric Template Protection"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2021692"},{"key":"7","article-title":"Fuzzy extractors for minutiae-based fingerprint authentication","author":"arakala","year":"2007","journal-title":"Proc of 2nd International Conference on Biometrics"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1073170.1073191"},{"key":"4","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/11527923_45","article-title":"Practical biometric authentication with template protection","author":"tuyls","year":"2005","journal-title":"Proc Int Conf Audio and Video-Based Biometric Person Authentication"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339058"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383110"}],"event":{"name":"2010 IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems (BTAS)","location":"Washington, DC, USA","start":{"date-parts":[[2010,9,27]]},"end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5618724\/5634461\/05634538.pdf?arnumber=5634538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:20:32Z","timestamp":1497889232000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634538\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/btas.2010.5634538","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}