{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:34:52Z","timestamp":1730248492537,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icitcs.2016.7740341","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T16:40:55Z","timestamp":1478796055000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Notice of Removal Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique"],"prefix":"10.1109","author":[{"given":"Suzwani Binti","family":"Ismail","sequence":"first","affiliation":[]},{"given":"Fakariah Hani Mohd","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Syed Ahmad","family":"Aljunid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2011.5929223"},{"key":"ref11","article-title":"Enhanced Face Recognition System Combining PCA, LDA","author":"radha","year":"2013","journal-title":"ICA with Wavelet Packets and Curvelets"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/C2SPCA.2013.6749437"},{"key":"ref13","first-page":"433","article-title":"Iris Recognition Using Independent Component Analysis","volume":"2","author":"gulmire","year":"2012","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"ref14","article-title":"A novel statistical linear discriminant analysis for image matrix: two-dimensional fisherfaces. Paper presented at the Signal Processing","author":"li","year":"2004","journal-title":"2004 Proceedings ICSP'04 2004 7th International Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959722"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563947"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1428","DOI":"10.3844\/jcssp.2012.1428.1433","article-title":"Principal Component Analysis Based Feature Extraction, Morphological Edge Detection and Localization for Fast Iris Recognition","volume":"8","author":"suganthy","year":"2012","journal-title":"Journal of Computer Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139100"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.005"},{"key":"ref4","article-title":"Multimodal Cancelable Biometrics. Paper presented at the Cognitive Informatics & Cognitive Computing (lCCI*CC)","author":"paul","year":"2012","journal-title":"2012 IEEE 11th International Conference on"},{"key":"ref3","first-page":"397","article-title":"A Novel approach for securing biometric template","volume":"3","author":"malhotra","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854304"},{"key":"ref5","first-page":"16","article-title":"Multimodal Biometric Template Access Control Using Fingerprint Data Encrypted By Iris Data","author":"satyavarapu","year":"2014","journal-title":"Proceedings of 13th IRF International Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2011.0095"},{"key":"ref7","first-page":"242","article-title":"Cryptosystem From Multiple Biometric Modalities","volume":"9","author":"wahdan","year":"2013","journal-title":"European Scientific Journal"},{"key":"ref2","first-page":"947","article-title":"Vulnerabilities of Biometric Authentication &#x201C; Threats and Countermeasures","volume":"4","author":"alaswad","year":"2014","journal-title":"International Journal of Information and Computation Technology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400393"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/ijais12-450632"}],"event":{"name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2016,9,26]]},"location":"Prague","end":{"date-parts":[[2016,9,26]]}},"container-title":["2016 6th International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740253\/7740293\/07740341.pdf?arnumber=7740341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T16:16:40Z","timestamp":1536337000000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7740341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2016.7740341","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}