{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:24:15Z","timestamp":1726849455175},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100008812","name":"Defence Science and Technology Group","doi-asserted-by":"publisher","award":["CERA 221"],"id":[{"id":"10.13039\/501100008812","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1016\/j.patcog.2018.01.026","type":"journal-article","created":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T11:33:44Z","timestamp":1517398424000},"page":"242-251","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":165,"special_numbering":"C","title":["A fingerprint and finger-vein based cancelable multi-biometric system"],"prefix":"10.1016","volume":"78","author":[{"given":"Wencheng","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0239-7991","authenticated-orcid":false,"given":"Song","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2307-9562","authenticated-orcid":false,"given":"Guanglou","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Craig","family":"Valli","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.patcog.2018.01.026_bib0001","first-page":"028","article-title":"Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris","volume":"7","author":"Jagadeesan","year":"2010","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"10.1016\/j.patcog.2018.01.026_bib0002","first-page":"173","article-title":"Multi-biometric template protection: issues and challenges","author":"Rathgeb","year":"2012","journal-title":"New Trends Dev. Biom."},{"key":"10.1016\/j.patcog.2018.01.026_bib0003","series-title":"Proceedings of the 2004 Biometric Consortium Conference","first-page":"2","article-title":"Feature level fusion in biometric systems","author":"Ross","year":"2004"},{"key":"10.1016\/j.patcog.2018.01.026_bib0004","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1016\/j.patrec.2011.11.002","article-title":"Feature-level fusion of fingerprint and finger-vein for personal identification","volume":"33","author":"Yang","year":"2012","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.patcog.2018.01.026_bib0005","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/978-3-642-21524-7_42","article-title":"Feature level fusion of fingerprint and finger vein biometrics","volume":"6729","author":"Lin","year":"2011","journal-title":"Adv. Swarm Intell."},{"key":"10.1016\/j.patcog.2018.01.026_bib0006","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.patrec.2007.09.010","article-title":"Advanced methods for two-class pattern recognition problem formulation for minutiae-based fingerprint verification","volume":"29","author":"Lumini","year":"2008","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.patcog.2018.01.026_bib0007","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/s12539-009-0046-5","article-title":"Finger-vein image recognition combining modified hausdorff distance with minutiae feature matching","volume":"1","author":"Yu","year":"2009","journal-title":"Interdiscip. Sci. Comput. Life Sci."},{"key":"10.1016\/j.patcog.2018.01.026_bib0008","series-title":"Proceedings of the Second IEEE International Conference on Biometrics: Theory, Applications and Systems","first-page":"1","article-title":"Multibiometric template security using fuzzy vault","author":"Nandakumar","year":"2008"},{"key":"10.1016\/j.patcog.2018.01.026_bib0009","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","article-title":"Generating cancelable fingerprint templates","volume":"29","author":"Ratha","year":"2007","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.patcog.2018.01.026_bib0010","series-title":"Proceedings of the Second IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS","first-page":"1","article-title":"Generating registration-free cancelable fingerprint templates","author":"Chikkerur","year":"2008"},{"key":"10.1016\/j.patcog.2018.01.026_bib0011","doi-asserted-by":"crossref","first-page":"2034","DOI":"10.1016\/j.patcog.2007.12.002","article-title":"Cancellable biometrics and annotations on BioHash","volume":"41","author":"Teoh","year":"2008","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2018.01.026_bib0012","first-page":"1327","article-title":"A revocable fingerprint template for security and privacy preserving","volume":"4","author":"Jin","year":"2010","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"10.1016\/j.patcog.2018.01.026_bib0013","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.jnca.2009.12.011","article-title":"Cancelable fingerprint templates using minutiae-based bit-strings","volume":"33","author":"Lee","year":"2010","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.patcog.2018.01.026_bib0014","doi-asserted-by":"crossref","first-page":"4129","DOI":"10.1016\/j.patcog.2012.05.004","article-title":"Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach","volume":"45","author":"Wang","year":"2012","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2018.01.026_bib0015","series-title":"Cyberspace Safety and Security","first-page":"81","article-title":"Cancelable fingerprint templates with delaunay triangle-based local structures","author":"Yang","year":"2013"},{"key":"10.1016\/j.patcog.2018.01.026_bib0016","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1016\/j.patcog.2013.10.003","article-title":"Design of alignment-free cancelable fingerprint templates via curtailed circular convolution","volume":"47","author":"Wang","year":"2014","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2018.01.026_bib0017","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.patcog.2016.01.001","article-title":"A blind system identification approach to cancelable fingerprint templates","volume":"54","author":"Wang","year":"2016","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2018.01.026_bib0018","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.patcog.2017.01.019","article-title":"Design of alignment-free cancelable fingerprint templates with zoned minutia pairs","volume":"66","author":"Wang","year":"2017","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2018.01.026_bib0019","article-title":"Investigating fusion approaches in multi-biometric cancellable recognition","author":"Canuto","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.patcog.2018.01.026_bib0020","series-title":"Proceedings of the Eleventh IEEE International Conference on Cognitive Informatics and Cognitive Computing (ICCI*CC)","first-page":"43","article-title":"Multimodal cancelable biometrics, cognitive informatics & cognitive computing","author":"Paul","year":"2012"},{"key":"10.1016\/j.patcog.2018.01.026_bib0021","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.inffus.2013.09.001","article-title":"Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion","volume":"18","author":"Chin","year":"2014","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.patcog.2018.01.026_bib0022","series-title":"Proceedings of the 2015 International Workshop on Biometrics and Forensics (IWBF)","first-page":"1","article-title":"Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris","author":"Rathgeb","year":"2015"},{"key":"10.1016\/j.patcog.2018.01.026_bib0023","series-title":"Proceedings of the 2008 International Symposium on Biometrics and Security Technologies","first-page":"1","article-title":"A study of finger vein biometric for personal identification","author":"Mulyono","year":"2008"},{"key":"10.1016\/j.patcog.2018.01.026_bib0024","series-title":"Network and System Security","first-page":"784","article-title":"A finger-vein based cancellable bio-cryptosystem","author":"Yang","year":"2013"},{"key":"10.1016\/j.patcog.2018.01.026_bib0025","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/s00138-004-0149-2","article-title":"Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification","volume":"15","author":"Miura","year":"2004","journal-title":"Mach. Vis. Appl."},{"key":"10.1016\/j.patcog.2018.01.026_bib0026","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/s12559-014-9254-3","article-title":"Feature component-based extreme learning machines for finger vein recognition","volume":"6","author":"Xie","year":"2014","journal-title":"Cognit. Comput."},{"key":"10.1016\/j.patcog.2018.01.026_bib0027","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1155\/2010\/847680","article-title":"The complete Gabor-Fisher classifier for robust face recognition","volume":"2010","author":"\u0160truc","year":"2010","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"10.1016\/j.patcog.2018.01.026_bib0028","doi-asserted-by":"crossref","first-page":"3152","DOI":"10.1016\/j.patcog.2007.03.005","article-title":"Personal recognition based on an image of the palmar surface of the hand","volume":"40","author":"Savi\u010d","year":"2007","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2018.01.026_bib0029","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","article-title":"Biohashing: two factor authentication featuring fingerprint data and tokenised random number","volume":"37","author":"Jin","year":"2004","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2018.01.026_bib0030","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.patcog.2017.01.024","article-title":"Multi-biometric template protection based on homomorphic encryption","volume":"67","author":"Gomez-Barrero","year":"2017","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2018.01.026_bib0033","unstructured":"VeriFinger, S.D.K. Neuro Technology (2010), VeriFinger, S. D. K. Neuro Technology."},{"key":"10.1016\/j.patcog.2018.01.026_bib0034","series-title":"Chinese Conference on Biometric Recognition, Springer","first-page":"260","article-title":"SDUMLA-HMT: a multimodal biometric database","author":"Yin","year":"2011"},{"key":"10.1016\/j.patcog.2018.01.026_bib0035","series-title":"Biometric Authentication","first-page":"1","article-title":"FVC2004: third fingerprint verification competition","author":"Maio","year":"2004"},{"key":"10.1016\/j.patcog.2018.01.026_bib0036","series-title":"Advanced Engineering Mathematics","author":"Kreyszig","year":"2010"},{"key":"10.1016\/j.patcog.2018.01.026_bib0037","series-title":"Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, ISCSCT'08","first-page":"572","article-title":"Cracking cancelable fingerprint template of Ratha","author":"Quan","year":"2008"},{"key":"10.1016\/j.patcog.2018.01.026_bib0038","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1002\/cpe.3042","article-title":"Attacks via record multiplicity on cancelable biometrics templates","volume":"26","author":"Li","year":"2013","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"10.1016\/j.patcog.2018.01.026_bib0039","doi-asserted-by":"crossref","first-page":"1419","DOI":"10.1364\/OL.33.001419","article-title":"Ultrafast all-optical three-input Boolean XOR operation for differential phase-shift keying signals using periodically poled lithium niobate","volume":"33","author":"Wang","year":"2008","journal-title":"Opt. Lett."},{"key":"10.1016\/j.patcog.2018.01.026_bib0040","series-title":"Proceedings of the Second Workshop on Security in Ubiquitous Computing \u2013 Ubicomp","article-title":"Lightweight authentication protocols for low-cost RFID tags","author":"Vajda","year":"2003"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320318300384?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320318300384?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T08:45:17Z","timestamp":1565340317000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0031320318300384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":38,"alternative-id":["S0031320318300384"],"URL":"https:\/\/doi.org\/10.1016\/j.patcog.2018.01.026","relation":{},"ISSN":["0031-3203"],"issn-type":[{"value":"0031-3203","type":"print"}],"subject":[],"published":{"date-parts":[[2018,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A fingerprint and finger-vein based cancelable multi-biometric system","name":"articletitle","label":"Article Title"},{"value":"Pattern Recognition","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.patcog.2018.01.026","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}