{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:38:42Z","timestamp":1770226722832,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,4]]},"DOI":"10.1109\/ijcb52358.2021.9484391","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:34:10Z","timestamp":1626813250000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["BioCanCrypto: An LDPC Coded Bio-Cryptosystem on Fingerprint Cancellable Template"],"prefix":"10.1109","author":[{"given":"Xingbo","family":"Dong","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhe","family":"Jin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leshan","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhenhua","family":"Guo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref32","first-page":"70","article-title":"Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack","author":"wang","year":"0","journal-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision"},{"key":"ref31","article-title":"On the security risk of cancelable biometrics","author":"dong","year":"2019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185997"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.06.083"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.12.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_7"},{"key":"ref12","article-title":"How to generate strong keys from biometrics and other noisy, data april 13","author":"dodis","year":"2004","journal-title":"Eurocrypt"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"ref14","first-page":"117","article-title":"Reusable fuzzy extractors for low-entropy distributions","author":"canetti","year":"2016","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.52"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2499725"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2753172"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref19","first-page":"28","article-title":"A fuzzy commitment scheme","author":"juels","year":"1999","journal-title":"Proceedings of the 6th ACM Conference on Computer and Communications Security CCS '99"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983250"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1023799"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2018.8389007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2434151"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093722"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/11527923_32","article-title":"Fuzzy vault for fingerprints","author":"uludag","year":"2005","journal-title":"International Conference on Audio-and Video-Based Biometric Person Authentication"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTECH.2011.5941948"},{"key":"ref7","first-page":"323","article-title":"Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities","author":"sandhya","year":"2017","journal-title":"Biometric Security and Privacy Opportunities & Challenges in The Big Data Era Signal Processing for Security Technologies"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374457-9.00025-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"ref20","year":"0","journal-title":"ISO\/IEC 24745 2011 Information technology &#x2013; Security techniques &#x2013; Biometric information protection"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844182"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_28"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0029"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2013.6743946"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.04.013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.048"}],"event":{"name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","location":"Shenzhen, China","start":{"date-parts":[[2021,8,4]]},"end":{"date-parts":[[2021,8,7]]}},"container-title":["2021 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9484326\/9484328\/09484391.pdf?arnumber=9484391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:13Z","timestamp":1652197693000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9484391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ijcb52358.2021.9484391","relation":{},"subject":[],"published":{"date-parts":[[2021,8,4]]}}}