{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:24Z","timestamp":1750221084004,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":26,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3287921.3287960","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"273-280","source":"Crossref","is-referenced-by-count":0,"title":["A Binarization Method for Extracting High Entropy String in Gait Biometric Cryptosystem"],"prefix":"10.1145","author":[{"given":"Lam","family":"Tran","sequence":"first","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]},{"given":"Thao","family":"Dang","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]},{"given":"Deokjai","family":"Choi","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]}],"member":"320","reference":[{"key":"key-10.1145\/3287921.3287960-1","doi-asserted-by":"crossref","unstructured":"Bose, R. C., and Ray-Chaudhuri, D. K. On a class of error correcting binary group codes. Information and control 3, 1 (1960), 68--79.","DOI":"10.1016\/S0019-9958(60)90287-4"},{"key":"key-10.1145\/3287921.3287960-2","unstructured":"Breitinger, F., and Nickel, C. User survey on phone security and usage. In BIOSIG (2010), pp. 139--144."},{"key":"key-10.1145\/3287921.3287960-3","doi-asserted-by":"crossref","unstructured":"Daubechies, I. Ten lectures on wavelets, vol. 61. Siam, 1992.","DOI":"10.1137\/1.9781611970104"},{"key":"key-10.1145\/3287921.3287960-4","unstructured":"Doran, R. W. The gray code. J. UCS 13, 11 (2007), 1573--1597."},{"key":"key-10.1145\/3287921.3287960-5","unstructured":"Extractors, F. How to generate strong keys from biometrics and other noisy data. Yevgeni Dodis, Leonid Reyzin, Adam Smith (2004)."},{"key":"key-10.1145\/3287921.3287960-6","doi-asserted-by":"crossref","unstructured":"Fisher, R. A. The use of multiple measurements in taxonomic problems. Annals of eugenics 7, 2 (1936), 179--188.","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"key-10.1145\/3287921.3287960-7","doi-asserted-by":"crossref","unstructured":"Forbes, C., Evans, M., Hastings, N., and Peacock, B. Statistical distributions. John Wiley & Sons, 2011.","DOI":"10.1002\/9780470627242"},{"key":"key-10.1145\/3287921.3287960-8","doi-asserted-by":"crossref","unstructured":"Gadaleta, M., and Rossi, M. Idnet: Smartphone-based gait recognition with convolutional neural networks. Pattern Recognition 74 (2018), 25--37.","DOI":"10.1016\/j.patcog.2017.09.005"},{"key":"key-10.1145\/3287921.3287960-9","doi-asserted-by":"crossref","unstructured":"Giles, M. Approximating the erfinv function. In GPU Computing Gems Jade Edition. Elsevier, 2011, pp. 109--116.","DOI":"10.1016\/B978-0-12-385963-1.00010-1"},{"key":"key-10.1145\/3287921.3287960-10","doi-asserted-by":"crossref","unstructured":"Gray, R. M. Entropy and information theory. Springer Science & Business Media, 2011.","DOI":"10.1007\/978-1-4419-7970-4"},{"key":"key-10.1145\/3287921.3287960-11","doi-asserted-by":"crossref","unstructured":"Hao, F., Anderson, R., and Daugman, J. Combining crypto with biometrics effectively. IEEE transactions on computers 55, 9 (2006), 1081--1088.","DOI":"10.1109\/TC.2006.138"},{"key":"key-10.1145\/3287921.3287960-12","doi-asserted-by":"crossref","unstructured":"Hoang, T., Choi, D., and Nguyen, T. Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. International Journal of Information Security 14, 6 (2015), 549--560.","DOI":"10.1007\/s10207-015-0273-1"},{"key":"key-10.1145\/3287921.3287960-13","doi-asserted-by":"crossref","unstructured":"Hoang, T., Choi, D., and Nguyen, T. On the instability of sensor orientation in gait verification on mobile phone. In e-Business and Telecommunications (ICETE), 2015 12th International Joint Conference on (2015), vol. 4, IEEE, pp. 148--159.","DOI":"10.5220\/0005572001480159"},{"key":"key-10.1145\/3287921.3287960-14","doi-asserted-by":"crossref","unstructured":"Imamverdiyev, Y., Teoh, A. B. J., and Kim, J. Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Systems with Applications 40, 5 (2013), 1888--1901.","DOI":"10.1016\/j.eswa.2012.10.009"},{"key":"key-10.1145\/3287921.3287960-15","doi-asserted-by":"crossref","unstructured":"Juels, A., and Sudan, M. A fuzzy vault scheme. Designs, Codes and Cryptography 38, 2 (2006), 237--257.","DOI":"10.1007\/s10623-005-6343-z"},{"key":"key-10.1145\/3287921.3287960-16","doi-asserted-by":"crossref","unstructured":"Juels, A., and Wattenberg, M. A fuzzy commitment scheme. In Proceedings of the 6th ACM conference on Computer and communications security (1999), ACM, pp. 28--36.","DOI":"10.1145\/319709.319714"},{"key":"key-10.1145\/3287921.3287960-17","doi-asserted-by":"crossref","unstructured":"Kelkboom, E. J., Breebaart, J., Buhan, I., and Veldhuis, R. N. Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources. IEEE Transactions on information forensics and security 7, 4 (2012), 1225--1241.","DOI":"10.1109\/TIFS.2012.2191961"},{"key":"key-10.1145\/3287921.3287960-18","doi-asserted-by":"crossref","unstructured":"Kikkert, L. H., Vuillerme, N., van Campen, J. P., Appels, B. A., Hortob&#225;gyi, T., and Lamoth, C.J. Gait characteristics and their discriminative power in geriatric patients with and without cognitive impairment. Journal of neuroengineering and rehabilitation 14, 1 (2017), 84.","DOI":"10.1186\/s12984-017-0304-4"},{"key":"key-10.1145\/3287921.3287960-19","doi-asserted-by":"crossref","unstructured":"Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., and Tian, J. An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39, 7 (2012), 6562--6574.","DOI":"10.1016\/j.eswa.2011.12.048"},{"key":"key-10.1145\/3287921.3287960-20","unstructured":"MacKay, D. J., and Mac Kay, D. J. Information theory, inference and learning algorithms. Cambridge university press, 2003."},{"key":"key-10.1145\/3287921.3287960-21","doi-asserted-by":"crossref","unstructured":"Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., and Yearwood, J. Protection of privacy in biometric data. IEEE access 4 (2016), 880--892.","DOI":"10.1109\/ACCESS.2016.2535120"},{"key":"key-10.1145\/3287921.3287960-22","doi-asserted-by":"crossref","unstructured":"Patel, V. M., Ratha, N. K., and Chellappa, R. Cancelable biometrics: A review. IEEE Signal Processing Magazine 32, 5 (2015), 54--65.","DOI":"10.1109\/MSP.2015.2434151"},{"key":"key-10.1145\/3287921.3287960-23","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., and Uhl, A. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security 2011, 1 (2011), 3.","DOI":"10.1186\/1687-417X-2011-3"},{"key":"key-10.1145\/3287921.3287960-24","doi-asserted-by":"crossref","unstructured":"Sheng, W., Chen, S., Xiao, G., Mao, J., and Zheng, Y. A biometric key generation method based on semisupervised data clustering. IEEE Transactions on Systems, Man, and Cybernetics: Systems 45, 9 (2015), 1205--1217.","DOI":"10.1109\/TSMC.2015.2389768"},{"key":"key-10.1145\/3287921.3287960-25","doi-asserted-by":"crossref","unstructured":"Sprager, S., and Juric, M. B. Inertial sensor-based gait recognition: A review. Sensors 15, 9 (2015), 22089--22127.","DOI":"10.3390\/s150922089"},{"key":"key-10.1145\/3287921.3287960-26","doi-asserted-by":"crossref","unstructured":"Tran, L., Hoang, T., Nguyen, T., and Choi, D. Improving gait cryptosystem security using gray code quantization and linear discriminant analysis. In International Conference on Information Security (2017), Springer, pp. 214--229.","DOI":"10.1007\/978-3-319-69659-1_12"}],"event":{"number":"9","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2018","name":"the Ninth International Symposium","start":{"date-parts":[[2018,12,6]]},"location":"Danang City, Viet Nam","end":{"date-parts":[[2018,12,7]]}},"container-title":["Proceedings of the Ninth International Symposium on Information and Communication Technology - SoICT 2018"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287921.3287960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3287960&ftid=2025984&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:45Z","timestamp":1750208265000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3287921.3287960"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1145\/3287921.3287960","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}