{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:57:42Z","timestamp":1729677462577,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/ecai.2017.8166461","type":"proceedings-article","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T18:31:59Z","timestamp":1512671519000},"page":"1-7","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing security by combining biometrics and cryptography"],"prefix":"10.1109","author":[{"given":"Diana","family":"Popa","sequence":"first","affiliation":[]},{"given":"Emil","family":"Simion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-012-0283-9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/161932"},{"key":"ref12","first-page":"393","article-title":"New shielding functions to enhance privacy and prevent misuse of biometric templates","author":"jean-paul","year":"2003","journal-title":"International Conference on Audio-and Video-Based Biometric Person Authentication"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1117\/12.462719","article-title":"Impact of artificial gummy fingers on fingerprint systems","author":"matsumoto","year":"2002","journal-title":"Electronic Imaging 2002"},{"key":"ref14","first-page":"1","article-title":"A fingerprint cryptosystem based on minutiae phase spectrum","author":"andakumar","year":"2010","journal-title":"2010 IEEE International Workshop on Information Forensics and Security"},{"key":"ref15","first-page":"1","article-title":"Multibiometric template security using fuzzy vault","author":"andakumar","year":"2008","journal-title":"Biometrics Theory Applications and Systems 2008 BTAS 2008 2nd IEEE International Conference on"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EUVIP.2010.5699103"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"351","DOI":"10.5057\/ijae.IJAE-D-16-00008","article-title":"A study of cancelable biometrics in the security improvement of biometric authentication system using fault tree analysis","volume":"15","author":"sanggyu","year":"2016","journal-title":"International Journal of Affective Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIPA.2015.7412195"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210436949"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.2016635"},{"journal-title":"Guide to Biometrics","year":"2013","author":"ruud bolle","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref1","article-title":"Biometric recognition: Security and privacy concerns","author":"alice","year":"2003","journal-title":"IEEE Security & Privacy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.12.011"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1117\/12.304705","article-title":"Biometric encryption using image processing","author":"soutar","year":"1998","journal-title":"Photonics West'98 Electronic Imaging"},{"journal-title":"Fingerprint Controlled Public Key Cryptographic System","year":"1996","author":"george","key":"ref24"},{"journal-title":"Benjamin Tams Attacks and countermeasures in fingerprint based biometric cryptosystems","year":"2013","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7034018"}],"event":{"name":"2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2017,6,29]]},"location":"Targoviste","end":{"date-parts":[[2017,7,1]]}},"container-title":["2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119309\/8166382\/08166461.pdf?arnumber=8166461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T13:39:28Z","timestamp":1570455568000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8166461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ecai.2017.8166461","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}