{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:09:47Z","timestamp":1729624187264,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/wifs.2009.5386479","type":"proceedings-article","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T21:14:24Z","timestamp":1264194864000},"page":"71-75","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging reliable bits: ECC design considerations for practical secure biometric systems"],"prefix":"10.1109","author":[{"given":"Yige","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shantanu","family":"Rane","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Vetro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1109\/18.910578","article-title":"Design of capacity-approaching irregular low-density parity check codes","volume":"47","author":"shokrollahi","year":"2001","journal-title":"IEEE Trans Inform Theory"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/18.910576","article-title":"Improved low-density parity-check codes using irregular graphs","volume":"47","author":"shokrollahi","year":"2001","journal-title":"IEEE Trans Information Theory"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2004.841982"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2003.08.015"},{"journal-title":"Information Processing Group EPFL Lausanne","article-title":"LdpcOpt Website","year":"0","key":"ref14"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1145\/982507.982516","article-title":"Secure Smartcard-based Fingerprint Authentication","author":"charles clancy","year":"2003","journal-title":"ACM SIGMM Workshop on Biometrics Methods and Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"},{"key":"ref6","first-page":"13","article-title":"Fuzzy Fingerprint Vault","author":"uludag","year":"2004","journal-title":"Workshop on Biometrics Challenges Arising from Theory to Practice"},{"key":"ref5","first-page":"609","article-title":"Automatic Secure Fingerprint Verification System based on Fuzzy Vault Scheme","author":"yang","year":"2005","journal-title":"IEEE Intl Conf on Acoustics Speech and Signal Processing"},{"key":"ref8","article-title":"Practical biometric authentication with template protection","author":"tuyls","year":"0","journal-title":"Int Conf Audio and Video based Biometric Person Authentication"},{"key":"ref7","first-page":"2297","article-title":"Feature extraction for a slepian-wolf biometric system using ldpc codes","author":"yedidia","year":"2008","journal-title":"IEEE Int Symp Inform Theory"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"ref9","first-page":"293","article-title":"Securing biometric data","volume":"47","author":"rane","year":"2009","journal-title":"Distributed Source Coding"}],"event":{"name":"2009 First IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2009,12,6]]},"location":"London, United Kingdom","end":{"date-parts":[[2009,12,9]]}},"container-title":["2009 First IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5377995\/5386439\/05386479.pdf?arnumber=5386479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T18:01:47Z","timestamp":1634752907000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5386479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wifs.2009.5386479","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}