{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:05:47Z","timestamp":1778789147992,"version":"3.51.4"},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/tifs.2010.2091637","type":"journal-article","created":{"date-parts":[[2010,11,18]],"date-time":"2010-11-18T21:12:41Z","timestamp":1290114761000},"page":"107-121","source":"Crossref","is-referenced-by-count":106,"title":["Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme"],"prefix":"10.1109","volume":"6","author":[{"given":"Emile J. C.","family":"Kelkboom","sequence":"first","affiliation":[]},{"given":"Jeroen","family":"Breebaart","sequence":"additional","affiliation":[]},{"given":"Tom. A. M.","family":"Kevenaar","sequence":"additional","affiliation":[]},{"given":"Ileana","family":"Buhan","sequence":"additional","affiliation":[]},{"given":"Raymond N. J.","family":"Veldhuis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"ref12","first-page":"927","article-title":"hardening fingerprint fuzzy vault using password","author":"nandakumar","year":"2007","journal-title":"Proc 2nd Int Conf Biometrics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.016"},{"key":"ref14","article-title":"implications of biometric encryption on wide spread use of biometrics","author":"carter","year":"2008","journal-title":"Proc EBF Biometric Encryption Seminar"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"key":"ref16","article-title":"practical biometric authentication with template protection","author":"tuyls","year":"2005","journal-title":"Proc 5th Int Conf (AVBPA)"},{"key":"ref17","article-title":"a reference architecture for biometric template protection based on pseudo identities","author":"breebaart","year":"2008","journal-title":"Proc BIOSIGNAL"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00030-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20031078"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.24"},{"key":"ref3","first-page":"566","article-title":"3D face: Biometric template protection for 3D face recognition","author":"kelkboom","year":"2007","journal-title":"Proc Int Conf Biometrics"},{"key":"ref6","first-page":"750","article-title":"robust extraction of secret bits from minutiae","author":"chang","year":"2007","journal-title":"Proc Int Conf Biometrics"},{"key":"ref5","first-page":"393","article-title":"new shielding functions to enhance privacy and prevent misuse of biometric templates","author":"linnartz","year":"2003","journal-title":"Proc 4th Int Conf AVBPA"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref7","first-page":"532","article-title":"fuzzy extractors: how to generate strong secret keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Proc Advances in Cryptology (Eurocrypt 2004 LNCS 3027)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref1","year":"2010","journal-title":"Information TechnologySecurity TechniquesBiometric Template Protection"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"ref20","first-page":"60720g.1","article-title":"Reference point detection for improved fingerprint matching","author":"van der veen","year":"2006","journal-title":"Proc SPIE"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818356"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/5712892\/05634099.pdf?arnumber=5634099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:47:45Z","timestamp":1633909665000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634099\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":21,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2010.2091637","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3]]}}}