{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:03Z","timestamp":1773511023488,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,25]]},"DOI":"10.1109\/ijcb57857.2023.10448963","type":"proceedings-article","created":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T13:31:14Z","timestamp":1709299874000},"page":"1-10","source":"Crossref","is-referenced-by-count":12,"title":["Multi-Biometric Fuzzy Vault based on Face and Fingerprints"],"prefix":"10.1109","author":[{"given":"C.","family":"Rathgeb","sequence":"first","affiliation":[{"name":"secunet Security Networks AG,Essen,Germany"}]},{"given":"B.","family":"Tams","sequence":"additional","affiliation":[{"name":"secunet Security Networks AG,Essen,Germany"}]},{"given":"J.","family":"Merkle","sequence":"additional","affiliation":[{"name":"secunet Security Networks AG,Essen,Germany"}]},{"given":"V.","family":"Nesterowicz","sequence":"additional","affiliation":[{"name":"secunet Security Networks AG,Essen,Germany"}]},{"given":"U.","family":"Korte","sequence":"additional","affiliation":[{"name":"Federal Office for Information Security,Bonn,Germany"}]},{"given":"M.","family":"Neu","sequence":"additional","affiliation":[{"name":"Federal Office for Information Security,Bonn,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-008-0120-3"},{"issue":"5","key":"ref2","first-page":"750","article-title":"Multi biometric fuzzy vault generation using chaff points and cuckoo search optimization","volume":"9","author":"Annapurani","year":"2014","journal-title":"International Review on Computers and Software (IRECOS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4172\/2155-6180.1000150"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref6","volume-title":"Fingerjetfx ose \u2013 fingerprint feature extractor, open source edition","year":"2011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2961349"},{"key":"ref9","volume-title":"Entry\/exit system (ees)","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3789-9_5"},{"key":"ref11","volume-title":"On the capacity of face representation","author":"Gong","year":"2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/18.782097"},{"key":"ref13","year":"2022","journal-title":"ISO\/IEC24745:2022. Information Technology - Security Techniques - Biometric Information Protection"},{"key":"ref14","volume-title":"ISO\/IEC 19795-1:2021. Information Technology \u2013 Biometric Performance Testing and Reporting \u2013 Part 1: Principles and Framework","year":"2021"},{"key":"ref15","year":"2022","journal-title":"ISO\/IEC 2382-37:2022. Information technology \u2013 Vocabulary \u2013 Part 37: Biometrics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1117\/12.766861"},{"key":"ref20","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"The Journal of Machine Learning Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_84"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.122"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2423693"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2423271"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.11.025"},{"key":"ref26","first-page":"1","article-title":"Multi-modal and multi-instance fusion for biometric cryptosystems","volume-title":"Intl. Conf. of Biometrics Special Interest Group (BIOSIG)","author":"Merkle"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053525"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166545"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.07.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_97"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20031078"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5772\/52152"},{"key":"ref37","article-title":"Deep learning in the field of biometric template protection: An overview","author":"Rathgeb","year":"2023","journal-title":"ArXiv preprint, abs\/2303.02715"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102539"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0049-9"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007995"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1220-x"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3190618"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2014.0093"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2392559"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2053901"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139055"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3046-8"}],"event":{"name":"2023 IEEE International Joint Conference on Biometrics (IJCB)","location":"Ljubljana, Slovenia","start":{"date-parts":[[2023,9,25]]},"end":{"date-parts":[[2023,9,28]]}},"container-title":["2023 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10447019\/10448524\/10448963.pdf?arnumber=10448963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T20:23:06Z","timestamp":1709842986000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10448963\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,25]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/ijcb57857.2023.10448963","relation":{},"subject":[],"published":{"date-parts":[[2023,9,25]]}}}