{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:19:46Z","timestamp":1758273586253,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/iwbf49977.2020.9107943","type":"proceedings-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T16:31:04Z","timestamp":1591288264000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Fingervein Sample Image Encryption"],"prefix":"10.1109","author":[{"given":"Sanjay","family":"Shekhawat","sequence":"first","affiliation":[]},{"given":"Heinz","family":"Hofbauer","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Prommegger","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0146"},{"key":"ref11","first-page":"1","article-title":"Compression standards in fingervein recognition","author":"ablinger","year":"2016","journal-title":"Proceedings of the 9th IAPR\/IEEE International Conference on Biometrics (ICB&#x2019;16)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-008-0150-0"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1117\/12.564837","article-title":"JPSEC for secure imaging in JPEG2000","volume":"5558","author":"dufaux","year":"2004","journal-title":"Applications of Digital Image Processing XXVII"},{"key":"ref14","first-page":"241","article-title":"Assessment of Efficient Fingerprint Image Protection Principles using different Types of AFIS","volume":"9977","author":"draschl","year":"2016","journal-title":"Proceedings of the 18th International Conference on Information and Communications Security (ICICS&#x2019;16)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935094"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2018.8401552"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683196"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92957-4_74"},{"key":"ref19","first-page":"113","article-title":"An available open-source vein recognition framework","author":"kauba","year":"2019","journal-title":"Handbook of Vascular Biometrics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358762"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-6524-8","author":"marcel","year":"2014","journal-title":"Handbook of Biometric Anti-spoofing"},{"key":"ref6","first-page":"111","article-title":"On the vulnerability of finger vein recognition to spoofing attacks","author":"tome","year":"2014","journal-title":"Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8091016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2015.74"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139056"},{"key":"ref2","first-page":"3","article-title":"State of the art in vascular biometrics","author":"uhl","year":"2019","journal-title":"Handbook of Vascular Biometrics"},{"key":"ref1","article-title":"Handbook of Vascular Biometrics","author":"uhl","year":"2019","journal-title":"Advances in computer vision and pattern recognition Cham"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.04.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s131114339"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612966"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.11.033"}],"event":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2020,4,29]]},"location":"Porto, Portugal","end":{"date-parts":[[2020,4,30]]}},"container-title":["2020 8th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9105916\/9107938\/09107943.pdf?arnumber=9107943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T19:23:16Z","timestamp":1696188196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iwbf49977.2020.9107943","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}