{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:43:44Z","timestamp":1725615824672},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2006,12]]},"DOI":"10.1155\/2007\/59125","type":"journal-article","created":{"date-parts":[[2006,12,27]],"date-time":"2006-12-27T08:04:15Z","timestamp":1167206655000},"source":"Crossref","is-referenced-by-count":21,"title":["Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization"],"prefix":"10.1186","volume":"2007","author":[{"given":"Yip","family":"Wai Kuan","sequence":"first","affiliation":[]},{"given":"Andrew B. J.","family":"Teoh","sequence":"additional","affiliation":[]},{"given":"David C. L.","family":"Ngo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,12,17]]},"reference":[{"key":"2024_CR1","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/ICPR.2002.1044628","volume":"1","author":"C Vielhauer","year":"2002","unstructured":"Vielhauer C, Steinmetz R, Mayerhorf A: Biometric hash based on statistical features of online signatures. Proceedings of 16th International Conference on Pattern Recognition (ICPR '02), August 2002, Quebec, Canada 1: 123-126.","journal-title":"Proceedings of 16th International Conference on Pattern Recognition (ICPR '02)"},{"issue":"4","key":"2024_CR2","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1155\/S1110865704309248","volume":"2004","author":"C Vielhauer","year":"2004","unstructured":"Vielhauer C, Steinmetz R: Handwriting: feature correlation analysis for biometric hashes. EURASIP Journal on Applied Signal Processing 2004,2004(4):542-558. special issue on Biometric Signal Processing 10.1155\/S1110865704309248","journal-title":"EURASIP Journal on Applied Signal Processing"},{"issue":"4","key":"2024_CR3","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1108\/09685220210436949","volume":"10","author":"H Feng","year":"2002","unstructured":"Feng H, Chan CW: Private key generation from on-line handwritten signatures. Information Management & Computer Security 2002,10(4):159-164. 10.1108\/09685220210436949","journal-title":"Information Management & Computer Security"},{"key":"2024_CR4","first-page":"2203","volume":"3","author":"Y-J Chang","year":"2004","unstructured":"Chang Y-J, Zhang W, Chen T: Biometrics-based cryptographic key generation. Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '04), June 2004, Taipei, Taiwan 3: 2203-2206.","journal-title":"Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '04)"},{"key":"2024_CR5","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1117\/12.304705","volume":"3314","author":"C Soutar","year":"1998","unstructured":"Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV: Biometric encryption using image processing. Optical Security and Counterfeit Deterrence Techniques II, January 1998, San Jose, Calif, USA, Proceedings of SPIE 3314: 178-188.","journal-title":"Optical Security and Counterfeit Deterrence Techniques II"},{"key":"2024_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/319709.319714","volume-title":"Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS '99)","author":"A Juels","year":"1999","unstructured":"Juels A, Wattenberg M: A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS '99), November 1999, Singapore Edited by: Tsudik G. 28-36."},{"key":"2024_CR7","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/ISIT.2002.1023680","volume-title":"Proceedings of IEEE International Symposium on Information Theory (ISIT '02), June-","author":"A Juels","year":"2002","unstructured":"Juels A, Sudan M: A fuzzy vault scheme. In Proceedings of IEEE International Symposium on Information Theory (ISIT '02), June-July 2002, Lausanne, Switzerland Edited by: Lapidoth A, Teletar E. 408."},{"key":"2024_CR8","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/982507.982516","volume-title":"Proceedings of the ACM SIGMM Workshop on Multimedia Biometrics Methods and Applications (WBMA '03)","author":"TC Clancy","year":"2003","unstructured":"Clancy TC, Kiyavash N, Lin DJ: Secure smartcard-based fingerprint authentication. Proceedings of the ACM SIGMM Workshop on Multimedia Biometrics Methods and Applications (WBMA '03), November 2003, Berkley, Calif, USA 45-52."},{"key":"2024_CR9","first-page":"1","volume":"2828","author":"A Goh","year":"2003","unstructured":"Goh A, Ngo D-CL: Computation of cryptographic keys from face biometrics. Proceedings of 7th IFIP International Conference on Communications and Multimedia Security (CMS '03), October 2003, Torino, Italy, Lecture Notes in Computer Science 2828: 1-13.","journal-title":"Proceedings of 7th IFIP International Conference on Communications and Multimedia Security (CMS '03)"},{"key":"2024_CR10","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/11608288_68","volume":"3832","author":"W-K Yip","year":"2006","unstructured":"Yip W-K, Goh A, Ngo D-CL, Teoh A-BJ: Generation of replaceable cryptographic keys from dynamic handwritten signatures. Proceedings of International Conference on Advances in Biometrics (ICB '06), 2006, Hong Kong, Lecture Notes in Computer Science 3832: 509-515.","journal-title":"Proceedings of International Conference on Advances in Biometrics (ICB '06)"},{"key":"2024_CR11","first-page":"27","volume-title":"Proceedings of the 4th IEEE on Automatic Identification Advanced Technologies (AutoID '05)","author":"W-K Yip","year":"2005","unstructured":"Yip W-K, Goh A, Ngo D-CL, Teoh A-BJ: Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability. Proceedings of the 4th IEEE on Automatic Identification Advanced Technologies (AutoID '05), October 2005, Buffalo, NY, USA 27-32."},{"issue":"1","key":"2024_CR12","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K Liu","year":"2006","unstructured":"Liu K, Kargupta H, Ryan J: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering 2006,18(1):92-106.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2024_CR13","first-page":"373","volume":"3280","author":"A Kholmatov","year":"2004","unstructured":"Kholmatov A, Yanikoglu B: Biometric authentication using online signatures. Proceedings of the 19th International Symposium on Computer and Information Sciences (ISCIS '04), October 2004, Kemer-Antalya, Turkey, Lecture Notes in Computer Science 3280: 373-380.","journal-title":"Proceedings of the 19th International Symposium on Computer and Information Sciences (ISCIS '04)"},{"issue":"16","key":"2024_CR14","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/S0167-8655(03)00155-7","volume":"24","author":"H Feng","year":"2003","unstructured":"Feng H, Chan CW: Online signature verification using a new extreme points warping technique. Pattern Recognition Letters 2003,24(16):2943-2951. 10.1016\/S0167-8655(03)00155-7","journal-title":"Pattern Recognition Letters"},{"key":"2024_CR15","volume-title":"Proceedings of International Congress on Research in Electrical and Electronics Engineering (ELECTRO '02)","author":"JCR Martinez","year":"2002","unstructured":"Martinez JCR, Lopez JJV, Rosas FJL: A low-cost system for signature recognition. Proceedings of International Congress on Research in Electrical and Electronics Engineering (ELECTRO '02), 2002"},{"key":"2024_CR16","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1109\/ICSMC.1991.169683","volume":"1","author":"T Hastie","year":"1991","unstructured":"Hastie T, Kishon E, Clark M, Fan J: A model for signature verification. Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, October 1991, Charlottesville, VA, USA 1: 191-196.","journal-title":"Proceedings of IEEE International Conference on Systems, Man, and Cybernetics"},{"key":"2024_CR17","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1109\/SIBGRA.2002.1167146","volume-title":"Proceedings of the 15th Brazilian Symposium on Computer Diagramics and Image Processing (SIBGRAPI '02)","author":"A Vergara da Silva","year":"2002","unstructured":"Vergara da Silva A, Santana de Freitas D: Wavelet-based compared to function-based on-line signature verification. Proceedings of the 15th Brazilian Symposium on Computer Diagramics and Image Processing (SIBGRAPI '02), October 2002, Fortaleza-CE, Brazil 218-225."},{"issue":"3","key":"2024_CR18","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1006\/cviu.1999.0799","volume":"76","author":"PS Deng","year":"1999","unstructured":"Deng PS, Liao H-YM, Ho CW, Tyan H-R: Wavelet-based off-line handwritten signature verification. Computer Vision and Image Understanding 1999,76(3):173-190. 10.1006\/cviu.1999.0799","journal-title":"Computer Vision and Image Understanding"},{"key":"2024_CR19","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1109\/ICDAR.2001.953934","volume-title":"Proceedings of 6th International Conference on Document Analysis and Recognition (ICDAR '01)","author":"DZ Lejtman","year":"2001","unstructured":"Lejtman DZ, George SE: On-line handwritten signature verification using wavelets and back-propagation neural networks. Proceedings of 6th International Conference on Document Analysis and Recognition (ICDAR '01), September 2001, Seattle, Wash, USA 992-996."},{"key":"2024_CR20","first-page":"IV-73","volume":"4","author":"I Nakanishi","year":"2003","unstructured":"Nakanishi I, Nishiguchi N, Itoh Y, Fukui Y: On-line signature verification method utilizing feature extraction based on DWT. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '03), May 2003, Bangkok, Thailand 4: IV-73-IV-76.","journal-title":"Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '03)"},{"issue":"1","key":"2024_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0031-3203(89)90036-8","volume":"22","author":"CF Lam","year":"1989","unstructured":"Lam CF, Kamins D: Signature recognition through spectral analysis. Pattern Recognition 1989,22(1):39-44. 10.1016\/0031-3203(89)90036-8","journal-title":"Pattern Recognition"},{"key":"2024_CR22","unstructured":"SVC First International Signature Verification Competition, 2004, http:\/\/www.cs.ust.hk\/svc2004\/"},{"key":"2024_CR23","volume-title":"Proceedings of 9th IEEE International Conference on Control, Automation, Robotics and Vision (ICARCV '06)","author":"A-BJ Teoh","year":"2006","unstructured":"Teoh A-BJ, Ngo D-CL: Cancellable biometrics realization through biophasoring. Proceedings of 9th IEEE International Conference on Control, Automation, Robotics and Vision (ICARCV '06), December 2006, Singapore"},{"key":"2024_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"TM Cover","year":"1991","unstructured":"Cover TM, Thomas JA: Elements of Information Theory. 2nd edition. John Wiley & Sons, New York, NY, USA; 1991.","edition":"2"},{"key":"2024_CR25","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE: Communication Theory of Secrecy Systems. Bell Systems Technical Journal 1949, 28: 656-715.","journal-title":"Bell Systems Technical Journal"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2007\/59125.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,7]],"date-time":"2021-08-07T03:00:58Z","timestamp":1628305258000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1155\/2007\/59125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["2024"],"URL":"https:\/\/doi.org\/10.1155\/2007\/59125","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,12]]},"article-number":"059125"}}