{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:32:13Z","timestamp":1761647533291,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314276.1314293","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"90-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Randomized radon transforms for biometric authentication via fingerprint hashing"],"prefix":"10.1145","author":[{"given":"Mariusz H.","family":"Jakubowski","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Ramarathnam","family":"Venkatesan","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_32"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793256673"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Leon Ehrenpreis. The Universality of the Radon Transform Oxford University Press USA 2003.  Leon Ehrenpreis. The Universality of the Radon Transform Oxford University Press USA 2003.","DOI":"10.1093\/acprof:oso\/9780198509783.001.0001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography Cambridge University Press","author":"Goldreich Oded","year":"2001","unstructured":"Oded Goldreich . Foundations of Cryptography Cambridge University Press , 2001 . Oded Goldreich. Foundations of Cryptography Cambridge University Press, 2001."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00057-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_99"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958106"},{"key":"e_1_3_2_1_10_1","volume-title":"Jain and David Maltoni","author":"Anil","year":"2003","unstructured":"Anil K. Jain and David Maltoni . Handbook of Fingerprint Recognition Springer-Verlag New York, Inc. , Secaucus, NJ, USA , 2003 . Anil K. Jain and David Maltoni. Handbook of Fingerprint Recognition Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2003."},{"key":"e_1_3_2_1_11_1","volume-title":"Allerton Conference on Communication, Control and Computing Urbana-Champaign, IL","author":"Malkin Michael","year":"2004","unstructured":"Michael Malkin and Ramarathnam Venkatesan . The randlet transform . In Allerton Conference on Communication, Control and Computing Urbana-Champaign, IL , 2004 . Michael Malkin and Ramarathnam Venkatesan. The randlet transform. In Allerton Conference on Communication, Control and Computing Urbana-Champaign, IL, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647802.737155"},{"key":"e_1_3_2_1_13_1","volume-title":"Van Oorschot","author":"Menezes Alfred J.","year":"1996","unstructured":"Alfred J. Menezes , Scott A. Vanstone , and Paul C . Van Oorschot . Handbook of Applied Cryptography CRC Press, Inc. , Boca Raton, FL, USA , 1996 . Alfred J. Menezes, Scott A. Vanstone, and Paul C. Van Oorschot. Handbook of Applied Cryptography CRC Press, Inc., Boca Raton, FL, USA, 1996."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/647777.734762"},{"key":"e_1_3_2_1_15_1","unstructured":"Neurotechnologija Inc. VeriFinger (http:\/\/www.neurotechnologija.com\/verifinger.html).2006.  Neurotechnologija Inc. VeriFinger (http:\/\/www.neurotechnologija.com\/verifinger.html).2006."},{"key":"e_1_3_2_1_16_1","volume-title":"StirMark software (available on the Web)","author":"Petitcolas F. A. P.","year":"2003","unstructured":"F. A. P. Petitcolas and M. G. Kuhn . StirMark software (available on the Web) . 2003 . F. A. P. Petitcolas and M. G. Kuhn. StirMark software (available on the Web). 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"e_1_3_2_1_18_1","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C John Wiley &amp","author":"Schneier Bruce","year":"1993","unstructured":"Bruce Schneier . Applied Cryptography: Protocols, Algorithms, and Source Code in C John Wiley &amp ; Sons, Inc. , New York, NY, USA , 1993 . Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C John Wiley &amp; Sons, Inc., New York, NY, USA, 1993."},{"key":"e_1_3_2_1_19_1","unstructured":"Bruce Schneier. Password Safe (http:\/\/www.schneier.com\/passsafe.html). 2006.  Bruce Schneier. Password Safe (http:\/\/www.schneier.com\/passsafe.html). 2006."},{"key":"e_1_3_2_1_20_1","volume-title":"International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings","volume":"2359","author":"Tistarelli Massimo","year":"2002","unstructured":"Massimo Tistarelli , Josef Big\u00fcn , and Anil K . Jain, editors. Biometric Authentication , International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings volume 2359 of Lecture Notes in Computer Science Springer , 2002 . Massimo Tistarelli, Josef Big\u00fcn, and Anil K. Jain, editors. Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings volume 2359 of Lecture Notes in Computer Science Springer, 2002."},{"key":"e_1_3_2_1_21_1","volume-title":"DIMACS Conf. on Intellectual Property Protection Piscataway, NJ (USA)","author":"Venkatesan R.","year":"2000","unstructured":"R. Venkatesan and M. H. Jakubowski . Image hashing . In DIMACS Conf. on Intellectual Property Protection Piscataway, NJ (USA) , April 2000 . R. Venkatesan and M. H. Jakubowski. Image hashing. In DIMACS Conf. on Intellectual Property Protection Piscataway, NJ (USA), April 2000."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Digital Rights Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314293","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314276.1314293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:14:06Z","timestamp":1750259646000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":20,"alternative-id":["10.1145\/1314276.1314293","10.1145\/1314276"],"URL":"https:\/\/doi.org\/10.1145\/1314276.1314293","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}