{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T04:45:14Z","timestamp":1745901914454,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icb.2013.6612960","type":"proceedings-article","created":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T22:31:38Z","timestamp":1380753098000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["Cancelable iris-templates using key-dependent wavelet transforms"],"prefix":"10.1109","author":[{"given":"Jutta","family":"Hammerle-Uhl","sequence":"first","affiliation":[]},{"given":"Elias","family":"Pschernig","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/ICASSP.2010.5495383"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1587\/transinf.E93.D.1878"},{"key":"18","first-page":"882","article-title":"Tokenless cancelable biometrics scheme for protecting iris codes","author":"ouda","year":"2010","journal-title":"Proc Int l Conf Pattern Recognition"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/TIP.2004.827237"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1117\/12.862926"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/CVPR.2009.5206646"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1155\/2008\/895174"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1155\/2008\/579416"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ICIP.2011.6116352"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/978-3-642-13775-4_27"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1147\/sj.403.0614"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1186\/1687-417X-2011-3"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1007\/BF02243850"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1016\/j.patcog.2007.12.002"},{"year":"1994","author":"wickerhauser","journal-title":"Adapted Wavelet Analysis from Theory to Software","key":"25"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1109\/78.205749"},{"key":"27","first-page":"1","article-title":"Cancelable iris biometric","author":"zuo","year":"2008","journal-title":"Proc Int l Conf Pattern Recognition"},{"key":"3","first-page":"382","article-title":"Iris authentication using privatized advanced correlation filter","volume":"3832","author":"chong","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"2","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.cviu.2006.01.002","article-title":"High security iris verification system based on random secret integration","volume":"102","author":"chong","year":"2006","journal-title":"Computer Vision and Image Understanding"},{"key":"10","first-page":"135","article-title":"Cancelable iris biometrics using block re-mapping and image warping","author":"ha?mmerle-uhl","year":"2009","journal-title":"Proc 12th Int'l Information Security Conf Volume 5735 of LNCS"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1016\/j.cviu.2007.08.005"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1186\/1687-417X-2012-2"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1016\/S0165-1684(03)00170-1"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/TCSVT.2003.818350"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1137\/S003614109427429X"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1049\/el:19981379"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/ICICS.2005.1689224"}],"event":{"name":"2013 International Conference on Biometrics (ICB)","start":{"date-parts":[[2013,6,4]]},"location":"Madrid, Spain","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 International Conference on Biometrics (ICB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596180\/6612943\/06612960.pdf?arnumber=6612960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:02:20Z","timestamp":1498086140000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6612960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icb.2013.6612960","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}