{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T16:11:35Z","timestamp":1726503095893},"reference-count":56,"publisher":"Elsevier BV","issue":"10-11","license":[{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP0985838","LP100100404","LP100200538","LP110100602"],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1016\/j.patcog.2011.03.015","type":"journal-article","created":{"date-parts":[[2011,4,14]],"date-time":"2011-04-14T14:57:23Z","timestamp":1302793043000},"page":"2555-2564","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":120,"title":["Pair-polar coordinate-based cancelable fingerprint templates"],"prefix":"10.1016","volume":"44","author":[{"given":"Tohari","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Song","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.patcog.2011.03.015_bib1","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/TPAMI.2007.1018","article-title":"From template to image: reconstructing fingerprints from minutiae points","volume":"29","author":"Ross","year":"2007","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"2","key":"10.1016\/j.patcog.2011.03.015_bib2","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/TPAMI.2010.77","article-title":"Fingerprint reconstruction: from minutiae to phase","volume":"33","author":"Feng","year":"2011","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"9","key":"10.1016\/j.patcog.2011.03.015_bib3","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1109\/TPAMI.2007.1087","article-title":"Fingerprint image reconstruction from standard templates","volume":"29","author":"Cappelli","year":"2007","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"10","key":"10.1016\/j.patcog.2011.03.015_bib4","doi-asserted-by":"crossref","first-page":"12414","DOI":"10.1016\/j.eswa.2009.04.041","article-title":"Descriptors for image-based fingerprint matchers","volume":"39","author":"Nanni","year":"2009","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.patcog.2011.03.015_bib5","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TPAMI.2010.73","article-title":"Global ridge orientation modeling for partial fingerprint identification","volume":"33","author":"Wang","year":"2011","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.patcog.2011.03.015_bib6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2008\/579416","article-title":"Biometric template security","volume":"2008","author":"Jain","year":"2008","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"10.1016\/j.patcog.2011.03.015_bib7","series-title":"6th ACM Conference on Computer and Communications Security","first-page":"28","article-title":"A fuzzy commitment scheme","author":"Juels","year":"1999"},{"issue":"3","key":"10.1016\/j.patcog.2011.03.015_bib8","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TIFS.2009.2021692","article-title":"Fingerprint verification using spectral minutiae representations","volume":"4","author":"Xu","year":"2009","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"10.1016\/j.patcog.2011.03.015_bib9","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TC.2006.138","article-title":"Combining crypto with biometrics effectively","volume":"55","author":"Hao","year":"2006","journal-title":"IEEE Transaction on Computers"},{"key":"10.1016\/j.patcog.2011.03.015_bib10","first-page":"393","article-title":"New shielding functions to enhance privacy and prevent misuse of biometric template","volume":"vol. 2688","author":"Linnartz","year":"2003"},{"issue":"2","key":"10.1016\/j.patcog.2011.03.015_bib11","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","article-title":"A fuzzy vault scheme","volume":"38","author":"Juels","year":"2006","journal-title":"Designs, Codes and Cryptography"},{"key":"10.1016\/j.patcog.2011.03.015_bib12","series-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshop","first-page":"29","article-title":"Protecting face biometric data on smartcard with Reed\u2013Solomon code","author":"Feng","year":"2006"},{"key":"10.1016\/j.patcog.2011.03.015_bib13","first-page":"800","article-title":"Biometric key binding: fuzzy vault based on iris images","volume":"vol. 4642","author":"Lee","year":"2007"},{"key":"10.1016\/j.patcog.2011.03.015_bib14","series-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshop","first-page":"163","article-title":"Securing fingerprint template: fuzzy vault with helper data","author":"Uludag","year":"2006"},{"issue":"4","key":"10.1016\/j.patcog.2011.03.015_bib15","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","article-title":"Fingerprint-based fuzzy vault: implementation and performance","volume":"2","author":"Nandakumar","year":"2007","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.patcog.2011.03.015_bib16","series-title":"IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"Biometric mobile template protection: a composite feature based fingerprint fuzzy vault","author":"Xi","year":"2009"},{"key":"10.1016\/j.patcog.2011.03.015_bib17","first-page":"523","article-title":"Fuzzy extractors: how to generate strong keys from biometrics and other noisy data","volume":"vol. 3027","author":"Dodis","year":"2004"},{"key":"10.1016\/j.patcog.2011.03.015_bib18","doi-asserted-by":"crossref","unstructured":"Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, Technical Report 235, Cryptology ePrint Archive, 2006.","DOI":"10.1007\/978-1-84628-984-2_5"},{"key":"10.1016\/j.patcog.2011.03.015_bib19","first-page":"760","article-title":"Fuzzy extractors for minutiae-based fingerprint authentication","volume":"vol. 4642","author":"Arakala","year":"2007"},{"issue":"3 part 2","key":"10.1016\/j.patcog.2011.03.015_bib20","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/TIFS.2007.902022","article-title":"Protecting biometric templates with sketch: theory and practice","volume":"2","author":"Sutcu","year":"2007","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"10.1016\/j.patcog.2011.03.015_bib21","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1147\/sj.403.0614","article-title":"Enhancing security and privacy in biometrics-based authentication systems","volume":"40","author":"Ratha","year":"2001","journal-title":"IBM Systems Journal"},{"issue":"12","key":"10.1016\/j.patcog.2011.03.015_bib22","doi-asserted-by":"crossref","first-page":"2727","DOI":"10.1016\/S0031-3203(01)00247-3","article-title":"Biometric perils and patches","volume":"35","author":"Bolle","year":"2002","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.patcog.2011.03.015_bib23","first-page":"370","article-title":"Cancelable biometrics: a case study in fingerprints","volume":"vol. 4","author":"Ratha","year":"2006"},{"issue":"4","key":"10.1016\/j.patcog.2011.03.015_bib24","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","article-title":"Generating cancelable fingerprint templates","volume":"29","author":"Ratha","year":"2007","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.patcog.2011.03.015_bib25","first-page":"242","article-title":"Cancelable key-based fingerprint templates","volume":"vol. 3574","author":"Ang","year":"2005"},{"key":"10.1016\/j.patcog.2011.03.015_bib26","first-page":"1038","article-title":"Fingerprint minutiae matching based on the local and global structures","volume":"vol. 2","author":"Jiang","year":"2000"},{"issue":"11","key":"10.1016\/j.patcog.2011.03.015_bib27","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","article-title":"Biohashing: two factor authentication featuring fingerprint data and tokenised random number","volume":"37","author":"Teoh","year":"2004","journal-title":"Pattern Recognition"},{"issue":"12","key":"10.1016\/j.patcog.2011.03.015_bib28","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","article-title":"Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs","volume":"28","author":"Teoh","year":"2006","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"10.1016\/j.patcog.2011.03.015_bib29","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","article-title":"Eigenfaces for recognition","volume":"3","author":"Turk","year":"1991","journal-title":"Journal of Cognitive Neuro-science"},{"issue":"7","key":"10.1016\/j.patcog.2011.03.015_bib30","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/34.598228","article-title":"Eigenfaces versus Fisherfaces: recognition using class specific linear projection","volume":"19","author":"Belhumeur","year":"1997","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"3","key":"10.1016\/j.patcog.2011.03.015_bib31","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.jnca.2009.12.011","article-title":"Cancelable fingerprint templates using minutiae-based bit-strings","volume":"33","author":"Lee","year":"2010","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"10.1016\/j.patcog.2011.03.015_bib32","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1016\/j.patcog.2005.10.025","article-title":"An analyzing of biohashing and its variants","volume":"39","author":"Kong","year":"2006","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.patcog.2011.03.015_bib33","first-page":"106","article-title":"Revealing the secret of facehashing","volume":"vol. 3822","author":"Cheung","year":"2005"},{"issue":"3","key":"10.1016\/j.patcog.2011.03.015_bib34","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.patrec.2007.10.005","article-title":"Random subspace for an improved biohashing for face authentication","volume":"29","author":"Nanni","year":"2008","journal-title":"Pattern Recognition Letters"},{"issue":"16\u201318","key":"10.1016\/j.patcog.2011.03.015_bib35","doi-asserted-by":"crossref","first-page":"2336","DOI":"10.1016\/j.neucom.2006.05.004","article-title":"A deformation-invariant image-based fingerprint verification system","volume":"69","author":"Nanni","year":"2006","journal-title":"Neurocomputing"},{"key":"10.1016\/j.patcog.2011.03.015_bib36","series-title":"2nd IEEE International Conference on Computer Science and Information Technology","first-page":"645","article-title":"Generating secure cancelable fingerprint templates using local and global features","author":"Yang","year":"2009"},{"key":"10.1016\/j.patcog.2011.03.015_bib37","series-title":"2nd IEEE International Conference on Biometrics: Theory, Applications and Systems","first-page":"1","article-title":"Generating registration-free cancelable fingerprint templates","author":"Chikkerur","year":"2008"},{"issue":"4","key":"10.1016\/j.patcog.2011.03.015_bib38","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TSMCB.2007.896999","article-title":"Alignment-free cancelable fingerprint templates based on local minutiae information","volume":"37","author":"Lee","year":"2007","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B"},{"key":"10.1016\/j.patcog.2011.03.015_bib39","series-title":"IEEE International Conference on Acoustics, Speech, and Signal Processing","first-page":"v\/609","article-title":"Automatic secure fingerprint verification system based on fuzzy vault scheme","author":"Yang","year":"2005"},{"key":"10.1016\/j.patcog.2011.03.015_bib40","series-title":"International Conference on Pattern Recognition","first-page":"803","article-title":"A robust fingerprint matching algorithm using local alignment","author":"Lee","year":"2002"},{"key":"10.1016\/j.patcog.2011.03.015_bib41","first-page":"521","article-title":"Secure minutiae-based fingerprint templates using random triangle hashing","volume":"vol. 5857","author":"Jin","year":"2009"},{"key":"10.1016\/j.patcog.2011.03.015_bib42","series-title":"The 2nd International Conference on Education Technology and Computer (ICETC)","first-page":"V\/5251","article-title":"Generating revocable fingerprint template using minutiae pair representation","author":"Jin","year":"2010"},{"issue":"3","key":"10.1016\/j.patcog.2011.03.015_bib43","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/TSMCA.2010.2041653","article-title":"Cancelable templates for sequence-based biometrics with application to on-line signature recognition","volume":"40","author":"Maiorana","year":"2010","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans"},{"key":"10.1016\/j.patcog.2011.03.015_bib44","series-title":"Ist IEEE International Conference on Biometrics: Theory, Applications and Systems","first-page":"1","article-title":"Security and accuracy trade-off in anonymous fingerprint recognition","author":"Farooq","year":"2007"},{"key":"10.1016\/j.patcog.2011.03.015_bib45","series-title":"19th International Conference on Pattern Recognition","first-page":"1","article-title":"Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics","author":"Thomas","year":"2008"},{"year":"2003","series-title":"Handbook of Fingerprint Recognition","author":"Maltoni","key":"10.1016\/j.patcog.2011.03.015_bib46"},{"key":"10.1016\/j.patcog.2011.03.015_bib47","doi-asserted-by":"crossref","unstructured":"T. Kevenaar, Protection of biometric information, in: Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, 2007, pp. 169\u2013193.","DOI":"10.1007\/978-1-84628-984-2_11"},{"issue":"4","key":"10.1016\/j.patcog.2011.03.015_bib48","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/TPAMI.2007.1003","article-title":"A fingerprint orientation model based on 2D fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing","volume":"29","author":"Wang","year":"2007","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.patcog.2011.03.015_bib49","unstructured":"FVC2002, Fingerprint verification competition, 2002."},{"key":"10.1016\/j.patcog.2011.03.015_bib50","unstructured":"Neurotechnology, Verifinger, version 5.0."},{"key":"10.1016\/j.patcog.2011.03.015_bib51","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1","article-title":"Anonymous and revocable fingerprint recognition","author":"Farooq","year":"2007"},{"issue":"5","key":"10.1016\/j.patcog.2011.03.015_bib52","doi-asserted-by":"crossref","first-page":"628","DOI":"10.4218\/etrij.09.0209.0137","article-title":"Dictionary attack on functional transform-based cancelable fingerprint templates","volume":"31","author":"Shin","year":"2009","journal-title":"ETRI Journal"},{"key":"10.1016\/j.patcog.2011.03.015_bib53","series-title":"International Symposium on Computer Science and Computational Technology","first-page":"572","article-title":"Cracking cancelable fingerprint template of Ratha","author":"Quan","year":"2008"},{"key":"10.1016\/j.patcog.2011.03.015_bib54","doi-asserted-by":"crossref","unstructured":"J. Hu, Mobile fingerprint template protection: progress and open issues, in: Proceedings of the Third IEEE Conference on Industrial Electronics and Applications, 2008, pp. 2133\u20132138.","DOI":"10.1109\/ICIEA.2008.4582896"},{"key":"10.1016\/j.patcog.2011.03.015_bib55","doi-asserted-by":"crossref","unstructured":"P. Zhang, J. Hu, C. Li, M. Bennamoun, V. Bhagavatula, A pitfall in fingerprint bio-cryptographic key generation, Computers & Security, Elsevier, 2011, doi:10.1016\/j.cose.2011.02.003.","DOI":"10.1016\/j.cose.2011.02.003"},{"key":"10.1016\/j.patcog.2011.03.015_bib56","doi-asserted-by":"crossref","unstructured":"P. Zhang, C. Li, J. Hu, A pitfall in fingerprint features extraction, in: Proceedings of the 11th International Conference on Control Automation Robotics & Vision (ICARCV), 2010, pp. 13\u201318.","DOI":"10.1109\/ICARCV.2010.5707953"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320311001002?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320311001002?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T09:51:31Z","timestamp":1710496291000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0031320311001002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":56,"journal-issue":{"issue":"10-11","published-print":{"date-parts":[[2011,10]]}},"alternative-id":["S0031320311001002"],"URL":"https:\/\/doi.org\/10.1016\/j.patcog.2011.03.015","relation":{},"ISSN":["0031-3203"],"issn-type":[{"type":"print","value":"0031-3203"}],"subject":[],"published":{"date-parts":[[2011,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Pair-polar coordinate-based cancelable fingerprint templates","name":"articletitle","label":"Article Title"},{"value":"Pattern Recognition","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.patcog.2011.03.015","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2011 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}