{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:04Z","timestamp":1773511024157,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icb.2013.6612973","type":"proceedings-article","created":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T18:31:38Z","timestamp":1380738698000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Towards fingerprints as strings: Secure indexing for fingerprint matching"],"prefix":"10.1109","author":[{"given":"Jesse","family":"Hartloff","sequence":"first","affiliation":[]},{"given":"Jimmy","family":"Dobler","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Tulyakov","sequence":"additional","affiliation":[]},{"given":"Atri","family":"Rudra","sequence":"additional","affiliation":[]},{"given":"Venu","family":"Govindaraju","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TSMCB.2007.896999","article-title":"Alignment-free cancelable fingerprint templates based on local minutiae information","volume":"37","author":"lee","year":"2007","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B Cybernetics"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921876"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.224"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.03.016"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1117\/12.2016635"},{"key":"14","author":"jain","year":"2003","journal-title":"Handbook of Fingerprint Recognition"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.36"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1998.743426"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(97)00127-X"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71629-7_49"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2009.2037286"},{"key":"23","first-page":"57","article-title":"Performance of the fuzzy vault for multiple fingerprints","author":"merkle","year":"2010","journal-title":"BIOSIG"},{"key":"24","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/11527923_88","article-title":"Indexing biometric databases using pyramid technique","volume":"3546","author":"mhatre","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/34.531800"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"28","first-page":"151","article-title":"Fingerprint identification: Classification vs. Indexing","author":"tan","year":"2003","journal-title":"Proceedings IEEE Conference on Advanced Video and Signal Based Surveillance 2003"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/34.277591"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31410-0_5"},{"key":"10","first-page":"268","article-title":"Feature extraction using a chaincoded contour representation of fingerprint images","volume":"2688","author":"govindaraju","year":"2003","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"1","first-page":"115","article-title":"Efficient database techniques for identification with fuzzy vault templates","author":"bo?hm","year":"2011","journal-title":"BIOSIG"},{"key":"7","article-title":"Indexing fingerprint databases based on multiple features","author":"de boer","year":"2001","journal-title":"ProRISC Workshop on Circuits Systems and Signal Processing"},{"key":"6","article-title":"Iris recognition border-crossing system in the UAE","author":"daugman","year":"2004","journal-title":"Int Airport Review"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.036"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.20"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/99.641608"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"}],"event":{"name":"2013 International Conference on Biometrics (ICB)","location":"Madrid, Spain","start":{"date-parts":[[2013,6,4]]},"end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 International Conference on Biometrics (ICB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596180\/6612943\/06612973.pdf?arnumber=6612973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T19:02:13Z","timestamp":1498071733000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6612973\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icb.2013.6612973","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}