{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:06:44Z","timestamp":1761646004805},"reference-count":11,"publisher":"Engineering and Technology Publishing","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"DOI":"10.4304\/jcm.6.9.682-690","type":"journal-article","created":{"date-parts":[[2011,12,21]],"date-time":"2011-12-21T06:06:43Z","timestamp":1324447603000},"source":"Crossref","is-referenced-by-count":5,"title":["A Fuzzy Vault Scheme for Ordered Biometrics"],"prefix":"10.12720","volume":"6","author":[{"given":"Lifang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Peng","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Songlong","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Siyuan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Chang Wen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2011,12,1]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/ISIT.2002.1023680","article-title":"A Fuzzy Vault Scheme","volume-title":"IEEE International Symposium on Information Theory","author":"Juels","year":"2002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSCT.2008.226"},{"key":"ref6","first-page":"556","article-title":"Improving Performance and Security of Biometrics Using Efficient and Stabble Random Projection Techniques","volume-title":"Proceedings of the 6th International Symposium on Image and Signal Processing and Analysis","author":"Jassim","year":"2009"},{"key":"ref7","first-page":"927","article-title":"A. ek and A. K. Jain, \u201cHardening Fingerprint Fuzzy Vault Using Password","volume":"2007","author":"Nandakumar","year":"2007","journal-title":"ICB"},{"key":"ref8","first-page":"1","article-title":"Multi-biometric Template Security Using Fuzzy Vault","volume-title":"2nd IEEE International Conference on Digital Object Identifier","author":"Nandakumar","year":"2008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430549"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1117\/12.778652","article-title":"\u201cA Hybrid approach for face template protection,\u201d Biometric Technology for Human Identification V.","volume":"6944","author":"Feng","year":"2008","journal-title":"Proc. SPIE","ISSN":"http:\/\/id.crossref.org\/issn\/0277-786X","issn-type":"print"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227981"}],"container-title":["Journal of Communications"],"original-title":[],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T07:38:12Z","timestamp":1497944292000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=42&id=112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,1]]},"references-count":11,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2011,12,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcm.6.9.682-690","relation":{},"ISSN":["1796-2021"],"issn-type":[{"value":"1796-2021","type":"print"}],"subject":[],"published":{"date-parts":[[2011,12,1]]}}}