{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:15:21Z","timestamp":1769732121545,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905118","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment"],"prefix":"10.1145","author":[{"given":"Shubhangi","family":"Sapkal","sequence":"first","affiliation":[{"name":"Government college of Engineering, Aurangabad"}]},{"given":"R. R.","family":"Deshmukh","sequence":"additional","affiliation":[{"name":"Dr. Babasaheb Ambedkar Marathwada University, Aurangabad"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2184092"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.048"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2012.6359343"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"e_1_3_2_1_6_1","volume-title":"ISIT 2002","author":"Juels Ari","year":"2002","unstructured":"Ari Juels , Madhu Sudan , \" A Fuzzy Vault Scheme\" , ISIT 2002 , Lausanne, Switzerland , 2002 . Ari Juels, Madhu Sudan, \"A Fuzzy Vault Scheme\", ISIT 2002, Lausanne, Switzerland, 2002."},{"key":"e_1_3_2_1_7_1","unstructured":"Anil K. Jain \"Encyclopedia of Biometrics\" Springer 2009.   Anil K. Jain \"Encyclopedia of Biometrics\" Springer 2009."},{"key":"e_1_3_2_1_8_1","volume-title":"Algorithms and Systems","author":"Ratha Nalini K.","year":"2008","unstructured":"Nalini K. Ratha , Venu Govindaraju , \" Advances in Biometrics -- Sensors , Algorithms and Systems \", Springer , 2008 . Nalini K. Ratha, Venu Govindaraju, \"Advances in Biometrics -- Sensors, Algorithms and Systems\", Springer, 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"Davide Maltoni and Dario Maio, \"Biometric Systems: technology, design and performance evaluation","author":"Wayman James","year":"2005","unstructured":"James Wayman , Anil Jain , Davide Maltoni and Dario Maio, \"Biometric Systems: technology, design and performance evaluation \", Springer , 2005 . James Wayman, Anil Jain, Davide Maltoni and Dario Maio, \"Biometric Systems: technology, design and performance evaluation\", Springer, 2005."},{"key":"e_1_3_2_1_10_1","first-page":"2","article-title":"A Survey on Biometric Cryptosystems and Cancelable Biometrics","author":"Rathgeb Christian","year":"2011","unstructured":"Christian Rathgeb and Andreas Uhl , \" A Survey on Biometric Cryptosystems and Cancelable Biometrics \", EURASIP Journal on Information Security, Springer , pp. 2 -- 25 , 2011 . Christian Rathgeb and Andreas Uhl, \"A Survey on Biometric Cryptosystems and Cancelable Biometrics\", EURASIP Journal on Information Security, Springer, pp. 2--25, 2011.","journal-title":"EURASIP Journal on Information Security, Springer"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.47"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.896999"},{"key":"e_1_3_2_1_13_1","unstructured":"Benjamin Tams \"Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems\".  Benjamin Tams \"Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems\"."},{"key":"e_1_3_2_1_14_1","volume-title":"Tsai-Yang Jea and Nalini Ratha, \"Anonymous and Revocable Fingerprint Recognition","author":"Farooq Faisal","year":"2007","unstructured":"Faisal Farooq , Ruud M. Bolle , Tsai-Yang Jea and Nalini Ratha, \"Anonymous and Revocable Fingerprint Recognition \", 2007 IEEE. Faisal Farooq, Ruud M. Bolle, Tsai-Yang Jea and Nalini Ratha, \"Anonymous and Revocable Fingerprint Recognition\", 2007 IEEE."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE","author":"Oudaa Osama","year":"2011","unstructured":"Osama Oudaa , Norimichi Tusmuraband , Toshiya Nakaguchi , \" Securing Bio-Encoded Iris Codes Against Correlation Attacks\" , IEEE 2011 . Osama Oudaa, Norimichi Tusmuraband, Toshiya Nakaguchi, \"Securing Bio-Encoded Iris Codes Against Correlation Attacks\", IEEE 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166545"},{"key":"e_1_3_2_1_18_1","volume-title":"2012 International Conference of the Biometrics Special Interest Group (BIOSIG).","author":"Hidan Seira","unstructured":"Seira Hidan , Tetsushi Ohki and Kenta Takahashi , \" Evaluation of Security for Biometric Guessing Attacks in Biometric Cryptosystem using Fuzzy Commitment Scheme\" , 2012 International Conference of the Biometrics Special Interest Group (BIOSIG). Seira Hidan, Tetsushi Ohki and Kenta Takahashi, \"Evaluation of Security for Biometric Guessing Attacks in Biometric Cryptosystem using Fuzzy Commitment Scheme\", 2012 International Conference of the Biometrics Special Interest Group (BIOSIG)."},{"key":"e_1_3_2_1_19_1","first-page":"950","volume-title":"10th Intl. Conf. on Control, Automation, Robotics and Vision","author":"Hidano Seira","year":"2008","unstructured":"Seira Hidano , Tetsushi Ohki , Naohisa Komatsu and Masao Kasahara , \" On Biometric Encryption using Fingerprint and It's Security Evaluation\" , 10th Intl. Conf. on Control, Automation, Robotics and Vision , Hanoi, Vietnam , pp. 950 -- 956 , December 2008 . Seira Hidano, Tetsushi Ohki, Naohisa Komatsu and Masao Kasahara, \"On Biometric Encryption using Fingerprint and It's Security Evaluation\", 10th Intl. Conf. on Control, Automation, Robotics and Vision, Hanoi, Vietnam, pp. 950--956, December 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2011.54"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Liu Hong-wei Wang Yao \"A New Fuzzy Fingerprint Vault Using Multivariable Linear Function Based on Lorenz Chaotic System\" pp. 531--534 2012 IEEE.  Liu Hong-wei Wang Yao \"A New Fuzzy Fingerprint Vault Using Multivariable Linear Function Based on Lorenz Chaotic System\" pp. 531--534 2012 IEEE.","DOI":"10.1109\/CSAE.2012.6272653"},{"key":"e_1_3_2_1_22_1","unstructured":"Alawi A. Al-Saggaf and Lahouari Ghouti Haridas S. Acharya \"Biometric Cryptosystem with Renewable Templates\" WIAR Germany 2012.  Alawi A. Al-Saggaf and Lahouari Ghouti Haridas S. Acharya \"Biometric Cryptosystem with Renewable Templates\" WIAR Germany 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.248"},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference of the Biometrics Special Interest Group (BIOSIG)","author":"Merkle Johannes","year":"2012","unstructured":"Johannes Merkle , Tom Kevenaar , Ulrike Korte , \" Multi-Modal and Multi-Instance Fusion for Biometric Cryptosystems\" , International Conference of the Biometrics Special Interest Group (BIOSIG) , 2012 . Johannes Merkle, Tom Kevenaar, Ulrike Korte, \"Multi-Modal and Multi-Instance Fusion for Biometric Cryptosystems\", International Conference of the Biometrics Special Interest Group (BIOSIG), 2012."},{"key":"e_1_3_2_1_25_1","first-page":"943","volume-title":"Sanjay Kumar Singh, \"Improved and Innovative Key Generation Algorithms for Biometric Cryptosystems","author":"Ranjan","year":"2012","unstructured":"Ranjan , Sanjay Kumar Singh, \"Improved and Innovative Key Generation Algorithms for Biometric Cryptosystems \", pp. 943 -- 946 , 2012 IEEE. Ranjan, Sanjay Kumar Singh, \"Improved and Innovative Key Generation Algorithms for Biometric Cryptosystems\", pp. 943--946, 2012 IEEE."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.167"},{"key":"e_1_3_2_1_27_1","first-page":"43","volume-title":"Proc. 11th IEEE Int. Conf. on Cognitive Informatics & Cognitive Computing","author":"Paul Padma Polash","unstructured":"Padma Polash Paul , Marina Gavrilova , \" Multimodal Cancelable Biometrics\" , Proc. 11th IEEE Int. Conf. on Cognitive Informatics & Cognitive Computing , pp. 43 -- 49 . Padma Polash Paul, Marina Gavrilova, \"Multimodal Cancelable Biometrics\", Proc. 11th IEEE Int. Conf. on Cognitive Informatics & Cognitive Computing, pp. 43--49."},{"key":"e_1_3_2_1_28_1","first-page":"53","article-title":"Secure Biometrics","author":"Rane Shantanu","year":"2013","unstructured":"Shantanu Rane , Ye Wang , Stark C. Draper , and Prakash Ishwar , \" Secure Biometrics \", IEEE Signal Processing Magazine , pp. 53 -- 64 , September 2013 . Shantanu Rane, Ye Wang, Stark C. Draper, and Prakash Ishwar, \"Secure Biometrics\", IEEE Signal Processing Magazine, pp. 53--64, September 2013.","journal-title":"IEEE Signal Processing Magazine"},{"key":"e_1_3_2_1_29_1","unstructured":"Abhishek Nagar Karthik Nandakumar Anil K. Jain \"Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors\".  Abhishek Nagar Karthik Nandakumar Anil K. Jain \"Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors\"."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879289"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Zahid Akhtar Battista Biggio Giorgio Fumera and Gian Luca Marcialis \"Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits\" 2011 IEEE.  Zahid Akhtar Battista Biggio Giorgio Fumera and Gian Luca Marcialis \"Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits\" 2011 IEEE.","DOI":"10.1109\/BIOMS.2011.6053682"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033227"},{"key":"e_1_3_2_1_33_1","volume-title":"Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, \"Handbook of Fingerprint recognition\"","year":"2009","unstructured":"Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, \"Handbook of Fingerprint recognition\" , Second Edition, Springer , 2009 . Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, \"Handbook of Fingerprint recognition\", Second Edition, Springer, 2009."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.185"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2012.28"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India","acronym":"ICTCS '16"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905118","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:03Z","timestamp":1750222443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":35,"alternative-id":["10.1145\/2905055.2905118","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905118","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}