{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:09:45Z","timestamp":1729634985870,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/iwbf.2017.7935094","type":"proceedings-article","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T16:21:59Z","timestamp":1496074919000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Sensor dependency in efficient fingerprint image protection using selective JPEG2000 encryption"],"prefix":"10.1109","author":[{"given":"Martin","family":"Draschl","sequence":"first","affiliation":[]},{"given":"Jutta","family":"Hammerle-Uhl","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"851","article-title":"On JPEG2000 error concealment attacks","author":"st\u00fctz","year":"2009","journal-title":"Advantages in Image and Video Technology Proceedings of the 3rd Pacific-Rim Symposium on Image and Video Technology PSIVT '09 ser Lecture Notes in Computer Science"},{"key":"ref11","first-page":"171","article-title":"Visual quality indices and low quality images","author":"hofbauer","year":"2010","journal-title":"Proc IEEE 2nd Eur Workshop Visual Inform Process"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.05.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref14","first-page":"682","article-title":"A fingerprint matching algorithm using phase-only correlation","volume":"e87 a","author":"koichi","year":"2004","journal-title":"IEICE Transactions on Fundamentals"},{"key":"ref15","first-page":"3","article-title":"Towards standardised fingerprint matching robustness assessment: The stirmark toolkit-cross-feature type cmparisons","volume":"8099","author":"hammcrle-uhl","year":"2013","journal-title":"Proceedings of the 14th IFIP International Conference on Communications and Multimedia Security (CMS'13) ser Springer Lecture Notes on Computer Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/83.841531"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.922058"},{"key":"ref3","volume":"15","author":"uhl","year":"2005","journal-title":"Image and Video Encryption From Digital Rights Management to Secured Personal Communication ser Advances in Information Security"},{"key":"ref6","first-page":"87","article-title":"Format-compliant JPEG2000 encryption with combined packet header and packet body protection","year":"2007","journal-title":"MM and Sec'07-Proceedings of the Multimedia and Security Workshop"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-008-0150-0"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-50011-9_19","article-title":"Assessment of Efficient Fingerprint Image Protection Principles using different Types of AFIS","author":"draschl","year":"2016","journal-title":"Proceedings of the 18th International Conference on Information and Communications Security (ICICS'16) ser"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2006.119"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SPLIM.2016.7528392"},{"key":"ref1","volume":"59","author":"rathgeb","year":"2013","journal-title":"Iris Recognition From Segmentation to Template Security ser Advances in Information Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45184-6_16"}],"event":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2017,4,4]]},"location":"Coventry, United Kingdom","end":{"date-parts":[[2017,4,5]]}},"container-title":["2017 5th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7933063\/7935078\/07935094.pdf?arnumber=7935094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T02:39:06Z","timestamp":1569379146000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7935094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwbf.2017.7935094","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}