{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:25:34Z","timestamp":1759638334010},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/tifs.2012.2191961","type":"journal-article","created":{"date-parts":[[2012,4,11]],"date-time":"2012-04-11T15:42:22Z","timestamp":1334158942000},"page":"1225-1241","source":"Crossref","is-referenced-by-count":14,"title":["Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources"],"prefix":"10.1109","volume":"7","author":[{"given":"Emile J. C.","family":"Kelkboom","sequence":"first","affiliation":[]},{"given":"Jeroen","family":"Breebaart","sequence":"additional","affiliation":[]},{"given":"Ileana","family":"Buhan","sequence":"additional","affiliation":[]},{"given":"Raymond N. J.","family":"Veldhuis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017618"},{"key":"ref38","first-page":"60720g.1","article-title":"Reference point detection for improved fingerprint matching","author":"van der veen","year":"2006","journal-title":"Proc SPIE"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00030-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2041657"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2009.5044973"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20031078"},{"key":"ref36","author":"kelkboom","year":"2010","journal-title":"On the Performance of Helper Data Template Protection Schemes"},{"key":"ref35","author":"macwilliams","year":"1977","journal-title":"The Theory of Error-Correcting Codes"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1956.1056798"},{"key":"ref10","year":"0","journal-title":"FCD 24745Information TechnologySecurity TechniquesBiometric Template Protection"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818356"},{"key":"ref11","first-page":"33","article-title":"Cryptographic protection of biometric templates: Chance, challenges and applications","author":"korte","year":"2007","journal-title":"BIOSIG 2007 Biometrics and Electronic Signatures"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1145\/1229285.1229325","article-title":"Fuzzy extractors for continuous distributions","author":"buhan","year":"2007","journal-title":"Proc 2nd ACM Symp Information Computer and Communications Security (ASIACCS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(97)00062-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2008.01.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699349"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2002937"},{"key":"ref17","first-page":"750","article-title":"Robust extraction of secret bits from minutiae","author":"chang","year":"2007","journal-title":"Proc Int Conf Biometrics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595400"},{"key":"ref19","first-page":"566","article-title":"3D face: Biometric template protection for 3D face recognition","author":"kelkboom","year":"2007","journal-title":"Proc Int Conf Biometrics"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797646"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033228"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref29","article-title":"Privacy-security tradeoffs in biometric security systems","author":"lai","year":"2008","journal-title":"Proc 46th Ann Allerton Conf Communication Control and Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1117\/12.838998"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref7","first-page":"393","article-title":"New shielding functions to enhance privacy and prevent misuse of biometric templates","author":"linnartz","year":"2003","journal-title":"Proc 4th Int Conf AVBPA"},{"key":"ref2","year":"0","journal-title":"International Civil Aviation Organization"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref1","year":"0","journal-title":"Identity Cards Act 2006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.24"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1117\/12.719845","article-title":"Template protection and its implementation in 3D face recognition systems","volume":"6539","author":"zhou","year":"2007","journal-title":"Proc SPIE Biometric Technology for Human Identification"},{"key":"ref21","article-title":"Practical biometric authentication with template protection","author":"tuyls","year":"2005","journal-title":"Proc 5th Int Conf AVBPA"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"ref41","author":"de moivre","year":"2000","journal-title":"The Doctrine of Chances or a Method of Calculating the Probabilities of Events in Play"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"ref26","first-page":"760","article-title":"Fuzzy extractors for minutiae-based fingerprint authentication","author":"arakala","year":"2007","journal-title":"Proc Int Conf Biometrics"},{"key":"ref25","first-page":"927","article-title":"Hardening fingerprint fuzzy vault using password","author":"nandakumar","year":"2007","journal-title":"Proc 2nd Int Conf Biometrics"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6236303\/06175120.pdf?arnumber=6175120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T00:47:32Z","timestamp":1561596452000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6175120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":41,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2012.2191961","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8]]}}}