{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:23:47Z","timestamp":1761675827015},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/wifs.2010.5711456","type":"proceedings-article","created":{"date-parts":[[2011,2,11]],"date-time":"2011-02-11T18:09:17Z","timestamp":1297447757000},"page":"1-6","source":"Crossref","is-referenced-by-count":77,"title":["A fingerprint cryptosystem based on minutiae phase spectrum"],"prefix":"10.1109","author":[{"given":"Karthik","family":"Nandakumar","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128845"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"ref14","article-title":"Biometric Encrpytion","author":"soutar","year":"1999","journal-title":"ICSA Guide to Cryptography"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_79"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495392"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2021692"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1364\/AO.24.000609"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1364\/AO.28.004840"},{"key":"ref4","article-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data","author":"dodis","year":"2006","journal-title":"Cryptology ePrint Archive"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2002937"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1087"},{"journal-title":"Handbook of Fingerprint Recognition","year":"2003","author":"maltoni","key":"ref9"},{"journal-title":"International Standards Organization","article-title":"Security Evaluation of Biometrics","year":"2008","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_93"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2009.5386479"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2046984"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.07.003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00030-4"}],"event":{"name":"2010 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2010,12,12]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2010,12,15]]}},"container-title":["2010 IEEE International Workshop on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5707112\/5711434\/05711456.pdf?arnumber=5711456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T03:27:15Z","timestamp":1490066835000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5711456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wifs.2010.5711456","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}