{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:57:05Z","timestamp":1725670625544},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412620","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T19:44:59Z","timestamp":1359143099000},"page":"25-30","source":"Crossref","is-referenced-by-count":8,"title":["Biometric template protection using turbo codes and modulation constellations"],"prefix":"10.1109","author":[{"given":"Emanuele","family":"Maiorana","sequence":"first","affiliation":[]},{"given":"Daniele","family":"Blasi","sequence":"additional","affiliation":[]},{"given":"Patrizio","family":"Campisi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2009.2038111"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117543"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2041653"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054142"},{"key":"18","article-title":"Cryptographic key generation using handwritten signature","author":"freire-santos","year":"0","journal-title":"2006 SPIE Defense & Security Symposium"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.6028\/jres.071B.032"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/26.539767"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711456"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055186"},{"key":"11","article-title":"Fuzzy extractors for asymmetric biometric representation","author":"li","year":"0","journal-title":"IEEE CVPR June 2008"},{"key":"12","article-title":"On information leakage in fuzzy commitment","author":"ignatenko","year":"0","journal-title":"SPIE Media Forensics and Security II USA Jan 2010"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2168213"},{"key":"3","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"0","journal-title":"EUROCRYPT'04 Interlaken Switzerland May 2004"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-984-2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIC-STH.2009.5444478"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366190"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1117\/1.2885239"},{"journal-title":"Digital Communications","year":"2001","author":"proakis","key":"5"},{"key":"4","article-title":"A fuzzy commitment scheme","author":"juels","year":"0","journal-title":"ACM Conf on Computer and Communication Security Singapore Nov 1999"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2091637"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2012,12,2]]},"location":"Costa Adeje - Tenerife, Spain","end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412620.pdf?arnumber=6412620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:02:22Z","timestamp":1490140942000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412620","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}