{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:40:53Z","timestamp":1725738053313},"publisher-location":"London","reference-count":33,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447152293"},{"type":"electronic","value":"9781447152309"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4471-5230-9_11","type":"book-chapter","created":{"date-parts":[[2013,6,28]],"date-time":"2013-06-28T03:33:14Z","timestamp":1372390394000},"page":"275-295","source":"Crossref","is-referenced-by-count":2,"title":["Two Efficient Architectures for Handling Biometric Data While Taking Care of Their Privacy"],"prefix":"10.1007","author":[{"given":"Julien","family":"Bringer","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-642-10772-6_8","volume-title":"ICISS","author":"M Adjedj","year":"2009","unstructured":"Adjedj M, Bringer J, Chabanne H, Kindarji B (2009) Biometric identification over encrypted data made feasible. In: Prakash A, Gupta I (eds) ICISS. Lecture Notes in Computer Science, vol 5905. Springer, Berlin, pp 86\u2013100"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-540-70500-0_3","volume-title":"ACISP","author":"M Barbosa","year":"2008","unstructured":"Barbosa M, Brouard T, Cauchie S, de Sousa SM (2008) Secure biometric authentication with improved accuracy. In: Mu Y, Susilo W, Seberry J (eds) ACISP. Lecture Notes in Computer Science, vol 5107. Springer, Berlin, pp 21\u201336"},{"key":"11_CR3","first-page":"168","volume-title":"ACM Conference on Computer and Communications Security","author":"D Boneh","year":"2004","unstructured":"Boneh D, Shacham H (2004) Group signatures with verifier-local revocation. In: Atluri V, Pfitzmann B, McDaniel PD (eds) ACM Conference on Computer and Communications Security. ACM, New York, pp 168\u2013177"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-540-68164-9_8","volume-title":"AFRICACRYPT","author":"J Bringer","year":"2008","unstructured":"Bringer J, Chabanne H (2008) An authentication protocol with encrypted biometric data. In: Vaudenay S (ed) AFRICACRYPT. Lecture Notes in Computer Science, vol 5023. Springer, Berlin, pp 109\u2013124"},{"key":"11_CR5","volume-title":"Biometrics: Theory, Applications, and Issues","author":"J Bringer","year":"2011","unstructured":"Bringer J, Chabanne H (2011) Biometric identification paradigm: towards privacy and confidentiality protection. In: Nichols ER (ed) Biometrics: Theory, Applications, and Issues. Nova Science Publishers, New York"},{"key":"11_CR6","volume-title":"IEEE 4th International Conference on Biometrics: Theory, Applications, and Systems, BTAS\u201910","author":"J Bringer","year":"2010","unstructured":"Bringer J, Despiegel V (2010) Binary feature vector fingerprint representation from minutiae vicinities. In: IEEE 4th International Conference on Biometrics: Theory, Applications, and Systems, BTAS\u201910"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/978-3-540-73458-1_8","volume-title":"ACISP","author":"J Bringer","year":"2007","unstructured":"Bringer J, Chabanne H, Izabach\u00e8ne M, Pointcheval D, Tang Q, Zimmer S (2007) An application of the Goldwasser\u2013Micali cryptosystem to biometric authentication. In: Pieprzyk J, Ghodosi H, Dawson E (eds) ACISP. Lecture Notes in Computer Science, vol 4586. Springer, Berlin, pp 96\u2013106"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/978-3-540-76969-9_12","volume-title":"CANS","author":"J Bringer","year":"2007","unstructured":"Bringer J, Chabanne H, Pointcheval D, Tang Q (2007) Extended private information retrieval and its application in biometrics authentications. In: Bao F, Ling S, Okamoto T, Wang H, Xing C (eds) CANS. Lecture Notes in Computer Science, vol 4856. Springer, Berlin, pp 175\u2013193"},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/TIFS.2008.2002937","volume":"3","author":"J Bringer","year":"2008","unstructured":"Bringer J, Chabanne H, Cohen G, Kindarji B, Z\u00e9mor G (2008) Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security 3(4):673\u2013683. doi:\n 10.1109\/TIFS.2008.2002937","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1\u20132","key":"11_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.scico.2008.09.016","volume":"74","author":"J Bringer","year":"2008","unstructured":"Bringer J, Chabanne H, Kindarji B (2008) The best of both worlds: applying secure sketches to cancelable biometrics. Science of Computer Programming 74(1\u20132):43\u201351. doi:\n 10.1016\/j.scico.2008.09.016\n \n . Special issue on security and trust","journal-title":"Science of Computer Programming"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"IWSEC","author":"J Bringer","year":"2008","unstructured":"Bringer J, Chabanne H, Pointcheval D, Zimmer S (2008) An application of the Boneh and Shacham group signature scheme to biometric authentication. In: IWSEC. Lecture Notes in Computer Science. Springer, Berlin"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Biometric ID Management and Multimodal Communication, BioID-Multicomm 2009","author":"J Bringer","year":"2009","unstructured":"Bringer J, Chabanne H, Kevenaar TAM, Kindarji B (2009) Extending match-on-card to local biometric identification. In: Biometric ID Management and Multimodal Communication, BioID-Multicomm 2009. Lecture Notes in Computer Science, vol 5707"},{"key":"11_CR13","volume-title":"International Conference on Communications","author":"J Bringer","year":"2009","unstructured":"Bringer J, Chabanne H, Kindarji B (2009) Error-tolerant searchable encryption. In: International Conference on Communications"},{"key":"11_CR14","volume-title":"IIH-MSP","author":"J Bringer","year":"2010","unstructured":"Bringer J, Chabanne H, Simoens K (2010) Blackbox security of biometrics. In: IIH-MSP"},{"issue":"5","key":"11_CR15","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1002\/sec.206","volume":"4","author":"J Bringer","year":"2011","unstructured":"Bringer J, Chabanne H, Kindarji B (2011) Identification with encrypted biometric data. Journal Security and Communication Networks 4(5):548\u2013562","journal-title":"Journal Security and Communication Networks"},{"key":"11_CR16","first-page":"727","volume-title":"SocialCom\/PASSAT","author":"L Chen","year":"2010","unstructured":"Chen L, Li J (2010) Vlr group signatures with indisputable exculpability and efficient revocation. In: Elmagarmid AK, Agrawal D (eds) SocialCom\/PASSAT. IEEE Computer Society, Los Alamitos, pp 727\u2013734"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-642-01793-3_8","volume-title":"ICB","author":"C Chen","year":"2009","unstructured":"Chen C, Veldhuis RNJ (2009) Binary biometric representation through pairwise polar quantization. In: Tistarelli M, Nixon MS (eds) ICB. Lecture Notes in Computer Science, vol 5558. Springer, Berlin, pp 72\u201381"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/IIH-MSP.2008.327","volume-title":"International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP\u201908","author":"N Delvaux","year":"2008","unstructured":"Delvaux N, Chabanne H, Bringer J, Kindarji B, Lindeberg P, Midgren J, Breebaart J, Akkermans T, van der Veen M, Veldhuis R, Kindt E, Simoens K, Busch C, Bours P, Gafurov D, Yang B, Stern J, Rust C, Cucinelli B, Skepastianos D (2008) Pseudo identities based on fingerprint characteristics. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP\u201908, pp 1063\u20131068. \n http:\/\/doi.ieeecomputersociety.org\/10.1109\/IIH-MSP.2008.327"},{"key":"11_CR19","first-page":"129","volume-title":"Int Conf Acoustics Speech Signal Proc","author":"S Draper","year":"2007","unstructured":"Draper S, Yedidia J, Draper SC, Khisti A, Khisti A, Martinian E, Martinian E, Vetro A, Vetro A, Yedidia JS (2007) Using distributed source coding to secure fingerprint biometrics. In: Int Conf Acoustics Speech Signal Proc, pp 129\u2013132"},{"key":"11_CR20","volume-title":"ACM MMSec\u201910","author":"P Failla","year":"2010","unstructured":"Failla P, Sutcu Y, Barni M (2010) Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: ACM MMSec\u201910,"},{"key":"11_CR21","volume-title":"CVPR","author":"F Farooq","year":"2007","unstructured":"Farooq F, Bolle RM, Jea TY, Ratha NK (2007) Anonymous and revocable fingerprint recognition. In: CVPR. IEEE Computer Society, Los Alamitos"},{"key":"11_CR22","unstructured":"ISO\/IEC 19794-2:2005 (2005) Information technology, biometric data interchange formats, part 2: finger minutiae data. Tech rep, ISO\/IEC"},{"key":"11_CR23","first-page":"2187","volume-title":"CVPR","author":"AK Jain","year":"1999","unstructured":"Jain AK, Prabhakar S, Hong L, Pankanti S (1999) Fingercode: a filterbank for fingerprint representation and matching. In: CVPR. IEEE Computer Society, Los Alamitos, p 2187"},{"issue":"3","key":"11_CR24","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/34.990140","volume":"24","author":"D Maio","year":"2002","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) FVC2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3):402\u2013412","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"30811","DOI":"10.1109\/ICPR.2002.1048144","volume":"3","author":"D Maio","year":"2002","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) FVC2002: second fingerprint verification competition. International Conference on Pattern Recognition 3:30811. doi:\n 10.1109\/ICPR.2002.1048144","journal-title":"International Conference on Pattern Recognition"},{"key":"11_CR26","volume-title":"SPIE Conference on Electronic Imaging 2010","author":"A Nagar","year":"2010","unstructured":"Nagar A, Rane S, Vetro A (2010) Alignment and bit extraction for secure fingerprint biometrics. In: SPIE Conference on Electronic Imaging 2010"},{"key":"11_CR27","unstructured":"National Institute of Standards and Technology (NIST): MINEX II\u2014an assessment of match-on-card technology. \n http:\/\/fingerprint.nist.gov\/minex\/"},{"key":"11_CR28","volume-title":"ACM MMSec\u201910","author":"MD Raimondo","year":"2010","unstructured":"Raimondo MD, Barni M, Catalano D, Labati RD, Failla P, Bianchi T, Fiore D, Lazzeretti R, Piuri V, Scotti F, Piva A (2010) Privacy-preserving fingercode authentication. In: ACM MMSec\u201910"},{"key":"11_CR29","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/SP.2009.24","volume-title":"2009 30th IEEE Symposium on Security and Privacy","author":"K Simoens","year":"2009","unstructured":"Simoens K, Tuyls P, Preneel B (2009) Privacy weaknesses in biometric sketches. In: 2009 30th IEEE Symposium on Security and Privacy, pp 188\u2013203. doi:\n 10.1109\/SP.2009.24"},{"key":"11_CR30","series-title":"SPIE Biometric Technology for Human Identification VII","volume-title":"Cryptographically Secure Biometric","author":"A Stoianov","year":"2010","unstructured":"Stoianov A (2010) Cryptographically Secure Biometric. SPIE Biometric Technology for Human Identification VII, vol 7667"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/11527923_45","volume-title":"AVBPA","author":"P Tuyls","year":"2005","unstructured":"Tuyls P, Akkermans AHM, Kevenaar TAM, Schrijen GJ, Bazen AM, Veldhuis RNJ (2005) Practical biometric authentication with template protection. In: Kanade T, Jain AK, Ratha NK (eds) AVBPA. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, pp 436\u2013446"},{"key":"11_CR32","first-page":"1","volume-title":"Computer Vision and Pattern Recognition Workshop","author":"H Xu","year":"2008","unstructured":"Xu H, Veldhuis RN, Kevenaar TA, Akkermans AH, Bazen AM (2008) Spectral minutiae: a\u00a0fixed-length representation of a minutiae set. In: Computer Vision and Pattern Recognition Workshop, pp 1\u20136. \n http:\/\/doi.ieeecomputersociety.org\/10.1109\/CVPRW.2008.4563120"},{"key":"11_CR33","doi-asserted-by":"publisher","DOI":"10.1117\/12.838998","volume-title":"Robust Minutiae Hash for Fingerprint Template Protection","author":"B Yang","year":"2010","unstructured":"Yang B, Busch C, Bours P, Gafurov D (2010) Robust Minutiae Hash for Fingerprint Template Protection. SPIE, Bellingham. doi:\n 10.1117\/12.838998\n \n . \n http:\/\/link.aip.org\/link\/?PSI\/7541\/75410R\/1"}],"container-title":["Security and Privacy in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-5230-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:56:40Z","timestamp":1557881800000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-5230-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9781447152293","9781447152309"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-5230-9_11","relation":{},"subject":[],"published":{"date-parts":[[2013]]}}}