{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:40:02Z","timestamp":1755902402583,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:00:00Z","timestamp":1699488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,9]]},"DOI":"10.1145\/3637732.3637777","type":"proceedings-article","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T11:04:51Z","timestamp":1709118291000},"page":"59-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Advanced Research on High-security-level Error-correction-based Iris Recognition System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1914-1511","authenticated-orcid":false,"given":"Kuo-Chun","family":"Lin","sequence":"first","affiliation":[{"name":"Institute of Communications Engineering, National Sun Yat-sen University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0786-3314","authenticated-orcid":false,"given":"Yen-Ming","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Communications Engineering, National Sun Yat-sen University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,2,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628669"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012365806338"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.08.005"},{"key":"e_1_3_2_1_5_1","first-page":"12","article-title":"Ordinal measures for iris recognition","volume":"31","author":"Sun Z.","year":"2009","unstructured":"[5] Z. Sun and T. Tan, \u201cOrdinal measures for iris recognition,\" IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.\u00a031, no.\u00a012, pp.\u00a02211-2226, Dec. 2009.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.2297709"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2828306"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.27.5.053031"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.10.035"},{"key":"e_1_3_2_1_12_1","first-page":"885","volume-title":"Aug. 2010","author":"Ouda O.","unstructured":"[12] O. Ouda, N. Tsumura, and T. Nakaguchi, \u201cTokenless cancelable biometrics scheme for protecting iris codes,\" in 2010 20th International Conference on Pattern Recognition, Aug. 2010, pp. 882\u2013885."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612976"},{"key":"e_1_3_2_1_14_1","first-page":"4","volume-title":"Dec. 2008","author":"Zuo J.","unstructured":"[14] J. Zuo, N. K. Ratha, and J. H. Connell, \u201cCancelable iris biometric,\" 2008 19th International Conference on Pattern Recognition, Dec. 2008, pp. 1\u20134."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2907014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3121138.3121185"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.005"},{"key":"e_1_3_2_1_18_1","first-page":"50","volume-title":"\u2018Multi-biometric template protection based on bloom filters,\" Information Fusion","author":"Gomez-Barrero M.","year":"2018","unstructured":"[18] M. Gomez-Barrero, C. Rathgeb, G. Li, R. Ramachandra, J. Galbally, and C. Busch, \u2018Multi-biometric template protection based on bloom filters,\" Information Fusion, vol. 42, pp. 37\u201350, Jul. 2018."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2402593"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2686005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2874245"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"e_1_3_2_1_25_1","volume-title":"Securing biometric data,\" Distributed source coding","author":"Vetro A.","year":"2009","unstructured":"[25] A. Vetro, S. Draper, S. Rane, J. S. Yedidia, \u201cSecuring biometric data,\" Distributed source coding, P. L. Dragotti and M. Gastpar, Eds. New York: Academic, 2009, ch. 11."},{"key":"e_1_3_2_1_26_1","first-page":"36","volume-title":"Singapore","author":"Juels A.","year":"1999","unstructured":"[26] A. Juels, M. Wattenberg, \u201cA fuzzy commitment scheme,\" in Proceedings of the 6th ACM conference on Computer and communications security, Singapore, 1999, pp. 28\u201336."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965165"},{"key":"e_1_3_2_1_29_1","first-page":"1","volume-title":"Lisbon","author":"Noto S.","year":"2011","unstructured":"[29] S. Noto, P. L. Correia and L. D. Soares, \u201cAnalysis of error correcting codes for the secure storage of biometric templates,\" 2011 IEEE EUROCON - International Conference on Computer as a Tool, Lisbon, Portugal, 2011, pp. 1-4."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2011.0095"},{"key":"e_1_3_2_1_31_1","first-page":"231","volume-title":"ON","author":"Stoianov A.","year":"2010","unstructured":"[31] A. Stoianov, \u201cSecurity of Error Correcting Code for biometric Encryption,\" 2010 Eighth International Conference on Privacy, Security and Trust, Ottawa, ON, Canada, Aug. 2010, pp.231-235."},{"key":"e_1_3_2_1_32_1","first-page":"279","volume-title":"Aalborg","author":"Santos T. M.","year":"2010","unstructured":"[32] T. M. Santos, L. D. Soares, and P. L. Correia, \u201cIris verification system with secure template storage,\" 010 18th European Signal Processing Conference, Aalborg, Denmark, 2010, pp. 279-283."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"[33] K.-C. Lin and Y.-M. Chen \u201cA high-security-level iris cryptosystem based on fuzzy commitment and soft reliability extraction \" IEEE Transactions on Dependable and Secure Computing doi: 10.1109\/TDSC.2023.3289916. (in early access)","DOI":"10.1109\/TDSC.2023.3289916"},{"volume-title":"Jan., 2012","author":"Galbally J.","key":"e_1_3_2_1_34_1","unstructured":"[34] J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, and J. Ortega-Garcia, \u201cFrom the iriscode to the iris: A new vulnerability of iris recognition systems,\" Black Hat Briefings USA, Jan., 2012"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2013.06.003"},{"key":"e_1_3_2_1_36_1","first-page":"1","volume-title":"Resist: Reconstruction of irises from templates,\" 2020 IEEE International Joint Conference on Biometrics (IJCB)","author":"Ahmad S.","year":"2020","unstructured":"[36] S. Ahmad and B. Fuller, \u201cResist: Reconstruction of irises from templates,\" 2020 IEEE International Joint Conference on Biometrics (IJCB), Houston, TX, USA, pp.\u00a01-10, 2020."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108288"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"},{"key":"e_1_3_2_1_39_1","first-page":"154","volume-title":"Prague","author":"Rincon-Melchor V.","year":"2023","unstructured":"[39] V. Rincon-Melchor, M. Nakano-Miyatake, O. Juarez-Sandoval, J. Olivares-Mercado, J. Moreno-Saenz and G. Benitez-Garcia, \u201cDeep Learning Algorithm for the People Identification Using their ECG Signals as a Biometric Parameter,\" 2023 46th International Conference on Telecommunications and Signal Processing (TSP), Prague, Czech Republic, 2023, pp. 154-159."},{"key":"e_1_3_2_1_40_1","first-page":"1150","volume-title":"Kerkyra","author":"Lowe D. G.","year":"1999","unstructured":"[40] D. G. Lowe, \u201cObject recognition from local scaleinvariant features,\" Proceedings of the Seventh IEEE International Conference on Computer Vision, Kerkyra, Greece, 1999, pp. 1150-1157."},{"key":"e_1_3_2_1_41_1","unstructured":"[41] G. Evgin \u201cIntensity normalization in brain MR images using spatially varying distribution matching \" In: 11th International conference on computer graphics visualization computer vision and image processing (CGVCVIP) 2017 pp. 300\u2013304."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.18466\/cbayarfbe.384729"},{"key":"e_1_3_2_1_43_1","volume-title":"CASIA-IrisV4-Distance. Accessed","author":"Chinese Academy of Science Institute of Automation","year":"2022","unstructured":"[43] Chinese Academy of Science Institute of Automation, CASIA-IrisV4-Distance. Accessed: Oct. 14, 2022. [Online] Available: http:\/\/biometrics.idealtest.org\/dbDetailForUser.do?id=4"},{"key":"e_1_3_2_1_44_1","volume-title":"CASIA-IrisV4-Thousand. Accessed","author":"Chinese Academy of Science Institute of Automation","year":"2022","unstructured":"[44] Chinese Academy of Science Institute of Automation, CASIA-IrisV4-Thousand. Accessed: Oct. 14, 2022. [Online] Available: http:\/\/biometrics.idealtest.org\/dbDetailForUser.do?id=4"}],"event":{"name":"ICBBE 2023: 2023 10th International Conference on Biomedical and Bioinformatics Engineering","acronym":"ICBBE 2023","location":"Kyoto Japan"},"container-title":["Proceedings of the 2023 10th International Conference on Biomedical and Bioinformatics Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637732.3637777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637732.3637777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:00:58Z","timestamp":1755900058000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637732.3637777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,9]]},"references-count":44,"alternative-id":["10.1145\/3637732.3637777","10.1145\/3637732"],"URL":"https:\/\/doi.org\/10.1145\/3637732.3637777","relation":{},"subject":[],"published":{"date-parts":[[2023,11,9]]},"assertion":[{"value":"2024-02-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}