{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:27:10Z","timestamp":1772112430146,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst., Man, Cybern. A"],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/tsmca.2010.2041657","type":"journal-article","created":{"date-parts":[[2010,3,26]],"date-time":"2010-03-26T19:26:01Z","timestamp":1269631561000},"page":"555-571","source":"Crossref","is-referenced-by-count":45,"title":["Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption"],"prefix":"10.1109","volume":"40","author":[{"given":"Emile J C","family":"Kelkboom","sequence":"first","affiliation":[]},{"given":"Gary Garcia","family":"Molina","sequence":"additional","affiliation":[]},{"given":"Jeroen","family":"Breebaart","sequence":"additional","affiliation":[]},{"given":"Raymond N J","family":"Veldhuis","sequence":"additional","affiliation":[]},{"given":"Tom A M","family":"Kevenaar","sequence":"additional","affiliation":[]},{"given":"Willem","family":"Jonker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2008.4699349"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/34.824819"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/34.990140"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2004.1394707"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401912"},{"key":"ref16","first-page":"25","article-title":"a reference architecture for biometric template protection based on pseudo identities","author":"breebaart","year":"2008","journal-title":"Proc BIOSIGNAL"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.327"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00030-4"},{"key":"ref19","author":"prudnikov","year":"1990","journal-title":"Integrals and Series"},{"key":"ref4","first-page":"393","article-title":"new shielding functions to enhance privacy and prevent misuse of biometric templates","author":"linnartz","year":"2003","journal-title":"Proc 4th Int Conf AVBPA"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2007.380583"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.24"},{"key":"ref6","first-page":"532","article-title":"fuzzy extractors: how to generate strong secret keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"Proc Adv CryptologyEurocrypt"},{"key":"ref5","first-page":"750","article-title":"robust extraction of secret bits from minutiae","author":"chang","year":"2007","journal-title":"Proc Int Conf Biometrics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref2","first-page":"566","article-title":"3d face: biometric template protection for 3d face recognition","author":"kelkboom","year":"2007","journal-title":"Proc Int Conf Biometrics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.009"},{"key":"ref22","first-page":"436","article-title":"practical biometric authentication with template protection","author":"tuyls","year":"2005","journal-title":"Proc 5th Int Conf AVBPA"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818356"},{"key":"ref24","author":"leon-garcia","year":"1994","journal-title":"Probability and Random Processes for Electrical Engineering"},{"key":"ref23","author":"chatfield","year":"1983","journal-title":"Statistics for Technology A Course in Applied Statistics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/896383"},{"key":"ref25","first-page":"1351","article-title":"a statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation","author":"doddington","year":"1998","journal-title":"Proc ICSLP"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/3468\/5446553\/05438741.pdf?arnumber=5438741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T01:36:33Z","timestamp":1633916193000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5438741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":27,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsmca.2010.2041657","relation":{},"ISSN":["1083-4427","1558-2426"],"issn-type":[{"value":"1083-4427","type":"print"},{"value":"1558-2426","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,5]]}}}