{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:27:01Z","timestamp":1725600421056},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/btas.2017.8272719","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T21:44:08Z","timestamp":1517521448000},"page":"367-374","source":"Crossref","is-referenced-by-count":2,"title":["On the guessability of binary biometric templates: A practical guessing entropy based approach"],"prefix":"10.1109","author":[{"given":"Guangcan","family":"Mai","sequence":"first","affiliation":[]},{"given":"Meng-Hui","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Pong C.","family":"Yuen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/319709.319714","article-title":"A fuzzy commitment scheme","author":"juels","year":"1999","journal-title":"Proceedings of the 6th ACM conference on Computer and communications security"},{"key":"ref11","article-title":"Highly reliable key generation from electrocardiogram (ecg)","author":"karimian","year":"2016","journal-title":"IEEE Transactions on Biomedical Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25958-1_8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996301"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.122"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.06.018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2423271"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_6"},{"journal-title":"Face image reconstruction from deep templates","year":"2017","author":"mai","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.11.011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2013.12.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00030-4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2170422"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.03.003"},{"key":"ref8","first-page":"1","article-title":"Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme","author":"hidano","year":"2012","journal-title":"Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2038760"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2426728"},{"year":"2011","key":"ref9","article-title":"ISO\/IEC 24745:2011 Information technology - Security techniques - Biometric information protection"},{"journal-title":"Openface A general-purpose face recognition library with mobile applications","year":"2016","author":"amos","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2384735"},{"key":"ref22","article-title":"Fast, lean and accurate: Modeling password guessability using neural networks","author":"melicher","year":"2016","journal-title":"Proceedings of USENIX Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166545"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"}],"event":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2017,10,1]]},"location":"Denver, CO","end":{"date-parts":[[2017,10,4]]}},"container-title":["2017 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8263072\/8272674\/08272719.pdf?arnumber=8272719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T19:44:04Z","timestamp":1660419844000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8272719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/btas.2017.8272719","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}