{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:11:58Z","timestamp":1729624318196,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/iwcmc.2015.7289189","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T22:02:15Z","timestamp":1444082535000},"page":"822-827","source":"Crossref","is-referenced-by-count":4,"title":["Vulnerabilities of fuzzy vault schemes using biometric data with traces"],"prefix":"10.1109","author":[{"given":"Maryam","family":"Lafkih","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Lacharme","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Rosenberger","sequence":"additional","affiliation":[]},{"given":"Mounia","family":"Mikram","sequence":"additional","affiliation":[]},{"given":"Sanaa","family":"Ghouzali","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"El Haziti","sequence":"additional","affiliation":[]},{"given":"Driss","family":"Aboutajdine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Protecting face biometric data on smartcard with reed-solomon code","author":"feng","year":"2006","journal-title":"CVPR Workshop on Biometrics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/12.665875"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.6"},{"journal-title":"A new approach of altered fingerprints detection on the altered and normal fingerprint database","year":"2012","author":"josphineleela","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/319709.319714","article-title":"A fuzzy commitment scheme","author":"juels","year":"1999","journal-title":"ACM CCS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_84"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1201\/9781420009781"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.161"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128845"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1109\/TIP.2008.2010638","article-title":"Low bit-rate image compression via adaptive down-sampling and constrained least squares upconversion","volume":"18","author":"wu","year":"2009","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2272786"},{"key":"ref6","first-page":"355","article-title":"Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter","volume":"8","author":"el-sisi","year":"2011","journal-title":"Int Arab J Inf Technol"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"ref8","article-title":"Fingerprint alteration","author":"feng","year":"2009","journal-title":"IEEE TIFS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2012.6343468"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.149"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.401"},{"journal-title":"JTC1 SC2 security techniques information technology - security techniques - biometric information protection","year":"2011","key":"ref1"},{"journal-title":"The AR face database","year":"1998","author":"martinez","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"ref21","first-page":"1","article-title":"Securing fingerprint template: Fuzzy vault with minutiae descriptors","author":"nagar","year":"2008","journal-title":"International Conference on Pattern Recognition (ICPR)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/11527923_32","article-title":"Fuzzy vaults for fingerprints","author":"uludag","year":"2005","journal-title":"Audio and Video based Biometric Person Authentication"},{"journal-title":"Cryptanalysis of the Fuzzy Vault for Fingerprints Vulnerabilities and Countermeasures","year":"2012","author":"tams","key":"ref25"}],"event":{"name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2015,8,24]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7275105\/7288920\/07289189.pdf?arnumber=7289189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T23:17:17Z","timestamp":1692055037000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7289189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2015.7289189","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}