{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:37:04Z","timestamp":1762004224819,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656183","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"1401-1405","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["A secure cryptosystem from palm vein biometrics"],"prefix":"10.1145","author":[{"given":"B.","family":"Prasanalakshmi","sequence":"first","affiliation":[{"name":"King Saud University, Riyadh, Kingdom of Saudi Arabia"}]},{"given":"A.","family":"Kannammal","sequence":"additional","affiliation":[{"name":"Coimbatore Institute of Technology, Coimbatore, Tamilnadu, India"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"e_1_3_2_1_2_1","unstructured":"Vein pattern recognition: www.fujitsu.com  Vein pattern recognition: www.fujitsu.com"},{"key":"e_1_3_2_1_3_1","volume-title":"9th Biennial Conference of Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp:394 -401","author":"Chandran B","year":"2007","unstructured":"Chen. B and Chandran . V, \"Biometric based cryptographic key generation from faces \", 9th Biennial Conference of Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp:394 -401 , 3--5 Dec , 2007 . Chen. B and Chandran. V, \"Biometric based cryptographic key generation from faces\", 9th Biennial Conference of Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp:394 -401, 3--5 Dec, 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"e_1_3_2_1_6_1","volume-title":"18th International Conference on Pattern Recognition, Vol 4, PP:  537--540","author":"Nagar Abishek","year":"2006","unstructured":"Abishek Nagar , Chaudhury. S, \" Biometrics based Asymmetric cryptosystem Design Using Modified fuzzy Vault Scheme\" , 18th International Conference on Pattern Recognition, Vol 4, PP: 537--540 , 2006 . Abishek Nagar, Chaudhury. S, \"Biometrics based Asymmetric cryptosystem Design Using Modified fuzzy Vault Scheme\", 18th International Conference on Pattern Recognition, Vol 4, PP: 537--540, 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"e_1_3_2_1_8_1","volume-title":"Technical results published by University of Cambridge Computer Laboratory","author":"Hao Feng","year":"2005","unstructured":"Feng Hao , Ross Anderson , and John Daugman , \" Combining Cryptography with Biometrics Effectively\" , Technical results published by University of Cambridge Computer Laboratory , 2005 . Feng Hao, Ross Anderson, and John Daugman, \"Combining Cryptography with Biometrics Effectively\", Technical results published by University of Cambridge Computer Laboratory, 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Kluwer Academic Publishers","author":"Jain A.","year":"1999","unstructured":"A. Jain , R. M. Bolle , S. Pankati , \"Biometrics:Personal Identification in Networked Society \" , Kluwer Academic Publishers , Dordrecht , 1999 . A. Jain, R. M. Bolle, S. Pankati, \"Biometrics:Personal Identification in Networked Society\", Kluwer Academic Publishers, Dordrecht, 1999."},{"key":"e_1_3_2_1_10_1","volume-title":"Advanced imaging, Vol6(7)","author":"MacGregor P.","year":"1991","unstructured":"P. MacGregor , R. Welford , \"Veincheck : Imaging for security and personnel identification \", Advanced imaging, Vol6(7) , 1991 , PP : 52--56. P. MacGregor, R. Welford, \"Veincheck: Imaging for security and personnel identification\", Advanced imaging, Vol6(7), 1991, PP:52--56."},{"key":"e_1_3_2_1_11_1","volume-title":"September","author":"Hawkes P. L.","year":"1993","unstructured":"P. L. Hawkes , D. O. Clayden , \" Veincheck research for automatic identification of people\" , Presented at the Hand and Fingerprint Seminar at NPL , September 1993 . P. L. Hawkes, D. O. Clayden, \"Veincheck research for automatic identification of people\", Presented at the Hand and Fingerprint Seminar at NPL, September 1993."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.07.012"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11552499_7"},{"issue":"3","key":"e_1_3_2_1_14_1","first-page":"268","article-title":"A Biometric Identification System by Extracting Hand Vein Patterns","volume":"38","author":"Im S.","year":"2001","unstructured":"S. Im , H. Park , Y. Kim , S. Han , S. Kim , c. Kang, and C. Chung ,\" A Biometric Identification System by Extracting Hand Vein Patterns \", Journal of the Korean Physical Society , Vol: 38 ( 3 ), 2001 , pp. 268 -- 272 . S. Im, H. Park, Y. Kim, S. Han, S. Kim, c. Kang, and C. Chung,\" A Biometric Identification System by Extracting Hand Vein Patterns\", Journal of the Korean Physical Society, Vol: 38(3), 2001, pp. 268--272.","journal-title":"Journal of the Korean Physical Society"},{"key":"e_1_3_2_1_15_1","volume-title":"Vol 2(3)","author":"Shahin Mohamed","year":"2007","unstructured":"Mohamed Shahin , Ahmed Badawi and Mohamed Kamel, \"Biometric Authentication using Fast Correlation of Near Infrared hand Vein Patterns: International Journal of Biomedical sciences , Vol 2(3) , 2007 , ISSN 1306--1216. Mohamed Shahin, Ahmed Badawi and Mohamed Kamel, \"Biometric Authentication using Fast Correlation of Near Infrared hand Vein Patterns: International Journal of Biomedical sciences, Vol 2(3), 2007, ISSN 1306--1216."},{"key":"e_1_3_2_1_16_1","first-page":"125","article-title":"A new and Efficient Algorithm for Detecting the corners in Digital images","volume":"2449","author":"Sojka Eduard","year":"2002","unstructured":"Eduard Sojka ,\" A new and Efficient Algorithm for Detecting the corners in Digital images \". Pattern recognition, Luc van Gool (Editor), LNCS 2449 , pp. 125 - 132 , Springer verlag, 2002 . Eduard Sojka,\" A new and Efficient Algorithm for Detecting the corners in Digital images\". Pattern recognition, Luc van Gool (Editor), LNCS 2449, pp.125 -132, Springer verlag, 2002.","journal-title":"Pattern recognition, Luc van Gool (Editor), LNCS"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656183","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:17Z","timestamp":1750250477000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":16,"alternative-id":["10.1145\/1655925.1656183","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656183","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}