{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:32:22Z","timestamp":1753601542784},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/elinfocom.2014.6914383","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T16:58:06Z","timestamp":1412787486000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["A security- and privacy-driven hybrid biometric template protection technique"],"prefix":"10.1109","author":[{"given":"Wei Jing","family":"Wong","sequence":"first","affiliation":[]},{"given":"M. L.","family":"Dennis Wong","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Beng Jin Teoh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CYBERC.2009.5342191"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2038760"},{"key":"17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CVPR.2008.4587699","article-title":"Fuzzy extractors for asymmetric biometric representations","author":"li","year":"2008","journal-title":"Computer Vision and Pattern Recognition Workshops 2008 (CVPRW '08) IEEE Computer Society Conference on"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.07.003"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_27"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.11.011"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339034"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166545"},{"key":"13","first-page":"750","article-title":"Robust extraction of secret bits from minutiae","author":"chang","year":"2007","journal-title":"Proceedings of International Conference on Biometrics LNCS 4642"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.12.002"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/sec.205"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSA.2008.52"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634545"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/BSYM.2008.4655523"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"10","first-page":"760","article-title":"Fuzzy extractor for minutiae-based fingerprint authentication","author":"arakala","year":"2007","journal-title":"Proceedings of International Conference on Biometrics LNCS 4642"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"6","article-title":"On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting","author":"blanton","year":"2012","journal-title":"IACR Cryptology EPrint Archive Report 2012\/608"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2535523"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"journal-title":"Kernel PCA Enabled Bit-String Representation for Minutiae-Based Cancellable Fingerprint Template","year":"0","author":"wong","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.03.039"}],"event":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","start":{"date-parts":[[2014,1,15]]},"location":"Kota Kinabalu, Sabah, Malaysia","end":{"date-parts":[[2014,1,18]]}},"container-title":["2014 International Conference on Electronics, Information and Communications (ICEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6899292\/6914344\/06914383.pdf?arnumber=6914383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:04:16Z","timestamp":1498154656000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6914383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/elinfocom.2014.6914383","relation":{},"subject":[],"published":{"date-parts":[[2014,1]]}}}