{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:45:51Z","timestamp":1770137151447,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/rait.2018.8389007","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:25:44Z","timestamp":1529954744000},"page":"1-6","source":"Crossref","is-referenced-by-count":13,"title":["Cryptographic key generation from cancelable fingerprint templates"],"prefix":"10.1109","author":[{"given":"Arpita","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Binod Kr.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"202","article-title":"Cryptographic key generation from voice","author":"monrose","year":"2011","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210436949"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2007.4426824"},{"key":"ref13","first-page":"28","article-title":"Secured Cryptographic Key Generation from Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris","volume":"7","author":"jagadeesan","year":"2010","journal-title":"International Journal of Information and Computer Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/673-946"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2010.0176"},{"key":"ref16","first-page":"57","article-title":"Efficient Cancelable Biometric Key Generation Scheme for Cryptography","volume":"11","author":"gaddam","year":"2010","journal-title":"Int J Network Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2009.5234801"},{"key":"ref18","first-page":"2184","article-title":"Fingerprint minutia extraction based on principal curves","volume":"28","author":"milao","year":"2009","journal-title":"Pattern Recognition Letters"},{"key":"ref19","first-page":"11","article-title":"Fingerprint based cryptography technique for improved network security","volume":"5","author":"dutta","year":"2011","journal-title":"Computing in Science & Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00247-3"},{"key":"ref6","first-page":"30","article-title":"Symmetric Hash Functions for Fingerprint Minutiae. International Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance","volume":"3687","author":"tulyakov","year":"2005","journal-title":"(ICAPR 2005)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref8","author":"maiorana","year":"2009","journal-title":"Cancelable Templates for Sequence Based Biometrics with Application to On-line Signature Recognition"},{"key":"ref7","first-page":"242","article-title":"Cancelable Key-Based Fingerprint Templates. Information Security and Privacy","author":"ang","year":"0","journal-title":"10th Australasian Conference (ACISP 2005)"},{"key":"ref2","first-page":"178","article-title":"Biometric Encryption using Image Processing","author":"soutar","year":"1998","journal-title":"SPIE"},{"key":"ref1","author":"stallings","year":"2010","journal-title":"Cryptography and Network Security Principles and Practice"},{"key":"ref9","article-title":"Cancelable Biometrics: Problems and Solutions for Improving Accuracy","author":"nanni","year":"2010","journal-title":"NovaPublisher-Biometrics Methods Applications and Analysis"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88458-3_4"}],"event":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","location":"Dhanbad","start":{"date-parts":[[2018,3,15]]},"end":{"date-parts":[[2018,3,17]]}},"container-title":["2018 4th International Conference on Recent Advances in Information Technology (RAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376941\/8388962\/08389007.pdf?arnumber=8389007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T18:35:21Z","timestamp":1532975721000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8389007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/rait.2018.8389007","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}