{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:52:09Z","timestamp":1725429129032},"reference-count":132,"publisher":"Institution of Engineering and Technology (IET)","issue":"4","license":[{"start":{"date-parts":[[2016,9,5]],"date-time":"2016-09-05T00:00:00Z","timestamp":1473033600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2016,9,5]],"date-time":"2016-09-05T00:00:00Z","timestamp":1473033600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET biom."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1049\/iet-bmt.2015.0035","type":"journal-article","created":{"date-parts":[[2016,4,25]],"date-time":"2016-04-25T12:04:22Z","timestamp":1461585862000},"page":"263-275","source":"Crossref","is-referenced-by-count":15,"title":["Review of key\u2010binding\u2010based biometric data protection schemes"],"prefix":"10.1049","volume":"5","author":[{"given":"Debanjan","family":"Sadhya","sequence":"first","affiliation":[{"name":"Department of Computer Science and EngineeringIndian Institute of Technology (Banaras Hindu University)VaranasiUPIndia"}]},{"given":"Sanjay Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and EngineeringIndian Institute of Technology (Banaras Hindu University)VaranasiUPIndia"}]},{"given":"Bodhi","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Department of Information TechnologyIndian Institute of Information TechnologyAllahabadUPIndia"}]}],"member":"265","published-online":{"date-parts":[[2016,9,5]]},"reference":[{"key":"e_1_2_10_2_1","unstructured":"Jain A.K. Ross A. Uludag U.: \u2018Biometric template security: challenges and solutions\u2019.Proc. European Signal Processing Conf. (EUSIPCO) 2005"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_2_10_4_1","volume-title":"Handbook of biometrics","author":"Jain A.K.","year":"2007"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"e_1_2_10_6_1","doi-asserted-by":"crossref","unstructured":"Scheirer W. Boult T.: \u2018Cracking fuzzy vaults and biometric encryption\u2019.Biometrics Symp. September2007 pp.1\u20136","DOI":"10.1109\/BCC.2007.4430534"},{"key":"e_1_2_10_7_1","doi-asserted-by":"crossref","unstructured":"Adler A.: \u2018Vulnerabilities in biometric encryption systems\u2019.Proc. Fifth Int. Conf. on Audio\u2010 and Video\u2010Based Biometric Person Authentication ser. AVBPA'05 Berlin Heidelberg 2005 pp.1100\u20131109","DOI":"10.1007\/11527923_114"},{"key":"e_1_2_10_8_1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-0-387-77996-6_6","volume-title":"Policies and research in identity management","author":"Cavoukian A.","year":"2008"},{"key":"e_1_2_10_9_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/1687-417X-2011-3","article-title":"A survey on biometric cryptosystems and cancelable biometrics","volume":"2011","author":"Rathgeb C.","year":"2011","journal-title":"EURASIP J. Information Security"},{"key":"e_1_2_10_10_1","doi-asserted-by":"crossref","unstructured":"Stoianov A. Kevenaar T. van derVeen M.: \u2018Security issues of biometric encryption\u2019.IEEE Toronto Int. Conf. on Science and Technology for Humanity (TIC\u2010STH) September2009 pp.34\u201339","DOI":"10.1109\/TIC-STH.2009.5444478"},{"key":"e_1_2_10_11_1","volume-title":"Multi\u2010biometric template protection: issues and challenges, new trends and developments in biometrics","author":"Rathgeb C.","year":"2012"},{"key":"e_1_2_10_12_1","unstructured":"Juels A. Sudan M.: \u2018A fuzzy vault scheme\u2019.IEEE Int. Symp. on Information Theory 2002 p.408"},{"issue":"3","key":"e_1_2_10_13_1","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1016\/j.future.2012.02.002","article-title":"Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm","volume":"29","author":"Khalil\u2010Hani M.","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054260"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.782097"},{"key":"e_1_2_10_16_1","doi-asserted-by":"crossref","unstructured":"Juels A. Wattenberg M.: \u2018A fuzzy commitment scheme\u2019.Proc. Sixth ACM Conf. on Computer and Communications Security ser. CCS \u201999 New York NY USA 1999 pp.28\u201336","DOI":"10.1145\/319709.319714"},{"key":"e_1_2_10_17_1","unstructured":"Verbitskiy E. Tuyls P. Denteneer D. et al. : \u2018Reliable biometric authentication with privacy protection\u2019.24th Benelux Symp. on Inf. Theory 2003 pp.125\u2013132"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2002937"},{"key":"e_1_2_10_20_1","doi-asserted-by":"crossref","unstructured":"Bringer J. Chabanne H. Cohen G. et al. : \u2018Optimal iris fuzzy sketches\u2019.First IEEE Int. Conf. on Biometrics: Theory Applications and Systems (BTAS 2007) September2007","DOI":"10.1109\/BTAS.2007.4401904"},{"key":"e_1_2_10_21_1","doi-asserted-by":"crossref","unstructured":"Rathgeb C. Uhl A.: \u2018Context\u2010based texture analysis for secure revocable iris\u2010biometric key generation\u2019.Third Int. Conf. on Crime Detection and Prevention (ICDP 2009) December2009 pp.1\u20136","DOI":"10.1049\/ic.2009.0229"},{"key":"e_1_2_10_22_1","doi-asserted-by":"crossref","unstructured":"Rathgeb C. Uhl A.: \u2018Adaptive fuzzy commitment scheme based on iris\u2010code error analysis\u2019.Second European Workshop on Visual Information Processing (EUVIP) July2010 pp.41\u201344","DOI":"10.1109\/EUVIP.2010.5699103"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1587\/elex.4.724"},{"key":"e_1_2_10_24_1","doi-asserted-by":"crossref","unstructured":"Nandakumar K.: \u2018A fingerprint cryptosystem based on minutiae phase spectrum\u2019.IEEE Int. Workshop on Information Forensics and Security (WIFS) December2010 pp.1\u20136","DOI":"10.1109\/WIFS.2010.5711456"},{"key":"e_1_2_10_25_1","unstructured":"Veen M.V.D. Kevenaar T. janSchrijen G. et al. : \u2018Face biometrics with renewable templates\u2019.Proc. of SPIE Volume 6072: Security Steganography and Watermarking of Multimedia Contents VIII 60720J 2006 p.2006"},{"key":"e_1_2_10_26_1","doi-asserted-by":"crossref","unstructured":"Lu H. Martin K. Bui F. et al. : \u2018Face recognition with biometric encryption for privacy\u2010enhancing self\u2010exclusion\u2019.16th Int. Conf. on Digital Signal Processing July2009 pp.1\u20138","DOI":"10.1109\/ICDSP.2009.5201257"},{"issue":"3","key":"e_1_2_10_27_1","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1109\/LSP.2009.2038111","article-title":"Fuzzy commitment for function based signature template protection","volume":"17","author":"Maiorana E.","year":"2010","journal-title":"IEEE Signal Process. Lett."},{"key":"e_1_2_10_28_1","unstructured":"Zheng G. Li W. Zhan C.: \u2018Cryptographic key generation from biometric data using lattice mapping\u2019.ICPR. IEEE Computer Society 2006 pp.513\u2013516"},{"key":"e_1_2_10_29_1","doi-asserted-by":"crossref","unstructured":"Clancy T.C.: \u2018Secure smartcard\u2010based fingerprint authentication\u2019.ACM Workshop on Biometrics: Methods and Applications 2003 pp.45\u201352","DOI":"10.1145\/982507.982516"},{"key":"e_1_2_10_30_1","unstructured":"V. Neurotechnologija ltd: \u2018www.neurotechnologija.com.\u2019 [Online]. Available:www.neurotechnologija.com"},{"key":"e_1_2_10_31_1","doi-asserted-by":"crossref","unstructured":"Chang E.\u2010C. Li Q.: \u2018Hiding secret points amidst chaff\u2019.Proc. 24th Annual Int. Conf. on Theory and Applications of Cryptographic Techniques ser. EUROCRYPT'06 Berlin Heidelberg 2006 pp.59\u201372","DOI":"10.1007\/11761679_5"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7721(02)00099-8"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0060"},{"key":"e_1_2_10_34_1","unstructured":"Orencik C. Pedersen T.B. Savas E. et al. : \u2018Improved fuzzy vault scheme for fingerprint verification\u2019.SECRYPT 2008 pp.37\u201343"},{"key":"e_1_2_10_35_1","first-page":"358","article-title":"Automatic alignment of fingerprint features for fuzzy fingerprint vault","volume":"3822","author":"Chung Y.","year":"2005","journal-title":"CISC"},{"key":"e_1_2_10_36_1","first-page":"v\/609","article-title":"Automatic secure fingerprint verification system based on fuzzy vault scheme","volume":"5","author":"Yang S.","year":"2005","journal-title":"Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP \u201905)"},{"key":"e_1_2_10_37_1","doi-asserted-by":"crossref","unstructured":"Jeffers J. Arakala A.: \u2018Minutiae\u2010based structures for a fuzzy vault\u2019.Biometrics Symp.: Special Session on Research at the Biometric Consortium Conf. September2006 pp.1\u20136","DOI":"10.1109\/BCC.2006.4341622"},{"issue":"3","key":"e_1_2_10_38_1","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.jnca.2009.12.003","article-title":"An alignment\u2010free fingerprint cryptosystem based on fuzzy vault scheme","volume":"33","author":"Li P.","year":"2010","journal-title":"J. Netw. Comput. Appl."},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.016"},{"key":"e_1_2_10_40_1","first-page":"310","article-title":"Fuzzy vault for fingerprints","volume":"3546","author":"Uludag U.","year":"2005","journal-title":"Proc. AVBPA"},{"key":"e_1_2_10_41_1","unstructured":"Uludag U. Jain A.: \u2018Securing fingerprint template: fuzzy vault with helper data\u2019.Conf. on Computer Vision and Pattern Recognition Workshop (CVPRW \u201906) June2006 pp.163\u2013163"},{"key":"e_1_2_10_42_1","doi-asserted-by":"crossref","unstructured":"Nagar A. Nandakumar K. Jain A.: \u2018Securing fingerprint template: fuzzy vault with minutiae descriptors\u2019.19th Int. Conf. on Pattern Recognition (ICPR 2008) December2008 pp.1\u20134","DOI":"10.1109\/ICPR.2008.4761459"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.07.003"},{"key":"e_1_2_10_45_1","unstructured":"Moon K. Moon D. Yoo J.\u2010H. et al. : \u2018Biometrics information protection using fuzzy vault scheme\u2019.SITIS. IEEE 2012 pp.124\u2013128"},{"key":"e_1_2_10_46_1","unstructured":"Merkle J. Ihmor H. Korte U. et al. : \u2018Performance of the fuzzy vault for multiple fingerprints (extended version)\u2019.CoRR 2010 vol. abs\/1008.0807"},{"key":"e_1_2_10_47_1","unstructured":"Hidano S. Ohki T. Komatsu N. et al. : \u2018On biometric encryption using fingerprint and it's security evaluation\u2019.Tenth Int. Conf. on Control Automation Robotics and Vision December2008 pp.950\u2013956"},{"key":"e_1_2_10_48_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2014.0026"},{"key":"e_1_2_10_49_1","doi-asserted-by":"crossref","unstructured":"Nandakumar K. Nagar A. Jain A.K.: \u2018Hardening fingerprint fuzzy vault using password\u2019.Proc. Int. Conf. on Advances in Biometrics ser. ICB'07 Berlin Heidelberg 2007 pp.927\u2013937","DOI":"10.1007\/978-3-540-74549-5_97"},{"key":"e_1_2_10_50_1","doi-asserted-by":"crossref","unstructured":"Nagar A. Chaudhury S.: \u2018Biometrics based asymmetric cryptosystem design using modified fuzzy vault scheme\u2019.ICPR (4) 2006 pp.537\u2013540","DOI":"10.1109\/ICPR.2006.330"},{"key":"e_1_2_10_51_1","doi-asserted-by":"crossref","unstructured":"Frassen T. Zhou X. Busch C.: \u2018Fuzzy vault for 3D face recognition systems\u2019.Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP \u201908) August2008 pp.1069\u20131074","DOI":"10.1109\/IIH-MSP.2008.315"},{"key":"e_1_2_10_52_1","doi-asserted-by":"crossref","unstructured":"Wang Y. Plataniotis K.N.: \u2018Fuzzy vault for face based cryptographic key generation\u2019.Proc. Biometrics Symp. 2007 2007","DOI":"10.1109\/BCC.2007.4430549"},{"key":"e_1_2_10_53_1","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1109\/ICME.2004.1394707","article-title":"Biometrics\u2010based cryptographic key generation","volume":"3","author":"Chang Y.\u2010J.","year":"2004","journal-title":"IEEE Int. Conf. on Multimedia and Expo (ICME \u201904)"},{"key":"e_1_2_10_54_1","doi-asserted-by":"crossref","unstructured":"Wu L. Yuan S.: \u2018A face based fuzzy vault scheme for secure online authentication\u2019.Second Int. Symp. on Data Privacy and E\u2010Commerce (ISDPE) September2010 pp.45\u201349","DOI":"10.1109\/ISDPE.2010.13"},{"issue":"9","key":"e_1_2_10_55_1","first-page":"682","article-title":"A fuzzy vault scheme for ordered biometrics","volume":"6","author":"Wu L.","year":"2011","journal-title":"JCM"},{"key":"e_1_2_10_56_1","doi-asserted-by":"crossref","first-page":"1771","DOI":"10.1109\/ICACT.2007.358714","article-title":"Authentication protocol using fuzzy eigenface vault based on moc","volume":"3","author":"Kim A.\u2010Y.","year":"2007","journal-title":"The Ninth Int. Conf. on Advanced Communication Technology"},{"key":"e_1_2_10_57_1","unstructured":"Feng Y.C. Yuen P.: \u2018Protecting face biometric data on smartcard with Reed\u2013Solomon code\u2019.Conf. on Computer Vision and Pattern Recognition Workshop (CVPRW) June2006 pp.29\u201329"},{"key":"e_1_2_10_58_1","doi-asserted-by":"crossref","unstructured":"Joshi V. Sanghavi P.: \u2018Three tier data storage security in cloud using face fuzzy vault\u2019.Int. Conf. on Computing Communication and Applications (ICCCA) February2012 pp.1\u20136","DOI":"10.1109\/ICCCA.2012.6179217"},{"key":"e_1_2_10_59_1","volume-title":"Biometric product testing final report","author":"Mansfield T.","year":"2001"},{"key":"e_1_2_10_60_1","doi-asserted-by":"crossref","unstructured":"Fouad M. El\u2010Saddik A. Zhao J. et al. : \u2018A fuzzy vault implementation for securing revocable iris templates\u2019.IEEE Int. Systems Conf. (SysCon) April2011 pp.491\u2013494","DOI":"10.1109\/SYSCON.2011.5929061"},{"key":"e_1_2_10_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.927261"},{"key":"e_1_2_10_62_1","doi-asserted-by":"crossref","unstructured":"Lee Y.J. Bae K. Lee S.J. et al. : \u2018Biometric key binding: fuzzy vault based on iris images\u2019.Proc. 2007 Int. Conf. on Advances in Biometrics ser. ICB'07 Berlin Heidelberg 2007 pp.800\u2013808","DOI":"10.1007\/978-3-540-74549-5_84"},{"key":"e_1_2_10_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"e_1_2_10_64_1","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1007\/3-540-44887-X_97","article-title":"Iris feature extraction using independent component analysis","volume":"2688","author":"Bae K.","year":"2003","journal-title":"Audio\u2010 and Video\u2010Based Biometric Person Authentication"},{"key":"e_1_2_10_65_1","doi-asserted-by":"crossref","unstructured":"Kanade S. Camara D. Krichen E. et al. : \u2018Three factor scheme for biometric\u2010based cryptographic key regeneration using iris\u2019.Biometrics Symp. 2008 (BSYM \u201908) September2008 pp.59\u201364","DOI":"10.1109\/BSYM.2008.4655523"},{"key":"e_1_2_10_66_1","doi-asserted-by":"crossref","unstructured":"Wu X. Qi N. Wang K. et al. : \u2018A novel cryptosystem based on iris key generation\u2019.Proc. Fourth Int. Conf. on Natural Computation \u2013 Volume 04 ser. ICNC \u201908 Washington DC USA 2008 pp.53\u201356","DOI":"10.1109\/ICNC.2008.808"},{"key":"e_1_2_10_67_1","doi-asserted-by":"crossref","unstructured":"Wu X. Qi N. Wang K. et al. : \u2018An iris cryptosystem for information security\u2019.Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP \u201908) August2008 pp.1533\u20131536","DOI":"10.1109\/IIH-MSP.2008.83"},{"key":"e_1_2_10_68_1","doi-asserted-by":"crossref","unstructured":"Reddy E. Ramesh Babu I.: \u2018Performance of iris based hard fuzzy vault\u2019.IEEE Eighth Int. Conf. Computer and Information Technology Workshops (CIT Workshops 2008) July2008 pp.248\u2013253","DOI":"10.1109\/CIT.2008.Workshops.20"},{"key":"e_1_2_10_69_1","unstructured":"Meenakshi V.S. Padmavathi G.: \u2018Securing iris templates using combined user and soft biometric based password hardened fuzzy vault\u2019.CoRR 2010 vol. abs\/1003.1449"},{"key":"e_1_2_10_70_1","doi-asserted-by":"crossref","unstructured":"Meenakshi V.S. Padmavathi G.: \u2018Security analysis of hardened retina based fuzzy vault\u2019.Int. Conf. on Advances in Recent Technologies in Communication and Computing October2009 pp.926\u2013930","DOI":"10.1109\/ARTCom.2009.101"},{"key":"e_1_2_10_71_1","doi-asserted-by":"crossref","unstructured":"Chen L. Xiang Y. Chen Y. et al. : \u2018Retinal image registration using bifurcation structures\u2019.ICIP 2011 pp.2169\u20132172","DOI":"10.1109\/ICIP.2011.6116041"},{"key":"e_1_2_10_72_1","first-page":"509","article-title":"Generation of replaceable cryptographic keys from dynamic handwritten signatures","volume":"79","author":"Yip W.K.","year":"2006","journal-title":"Proc. Int. Conf. on Advances in Biometrics, ser. ICB'06"},{"key":"e_1_2_10_73_1","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/ICPR.2002.1044628","article-title":"Biometric hash based on statistical features of online signatures","volume":"1","author":"Vielhauer C.","year":"2002","journal-title":"Proc. 16th Int. Conf. on Pattern Recognition"},{"key":"e_1_2_10_74_1","doi-asserted-by":"crossref","unstructured":"Kholmatov A. Yanikoglu B.: \u2018Biometric cryptosystem using online signatures\u2019.Computer and Information Sciences (ISCIS 2006) 2006 pp.981\u2013990","DOI":"10.1007\/11902140_102"},{"key":"e_1_2_10_75_1","doi-asserted-by":"crossref","unstructured":"Freire\u2010Santos M. Fierrez\u2010Aguilar J. Ortega\u2010Garcia J.: \u2018Cryptographic key generation using handwritten signature\u2019.Biometric Technology for Human Identification III SPIE Bellingham WA USA April2006","DOI":"10.1117\/12.665875"},{"issue":"0","key":"e_1_2_10_76_1","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.ins.2013.09.004","article-title":"A bio\u2010cryptographic system based on offline signature images","volume":"259","author":"Eskander G.S.","year":"2014","journal-title":"Inf. Sci."},{"key":"e_1_2_10_77_1","doi-asserted-by":"crossref","unstructured":"Eskander G. Sabourin R. Granger E.: \u2018Improving signature\u2010based biometric cryptosystems using cascaded signature verification\u2010fuzzy vault (sv\u2010fv) approach\u2019.14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR) September2014 pp.187\u2013192","DOI":"10.1109\/ICFHR.2014.39"},{"key":"e_1_2_10_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.242"},{"key":"e_1_2_10_79_1","doi-asserted-by":"crossref","unstructured":"Uludag U. Member S. Pankanti S. et al. : \u2018Biometric cryptosystems: issues and challenges\u2019.Proc. IEEE 2004 pp.948\u2013960","DOI":"10.1109\/JPROC.2004.827372"},{"key":"e_1_2_10_80_1","doi-asserted-by":"crossref","unstructured":"Wu X. Wang K. Zhang D.: \u2018A cryptosystem based on palmprint feature\u2019.19th Int. Conf. on Pattern Recognition December2008 pp.1\u20134","DOI":"10.1109\/ICPR.2008.4761117"},{"key":"e_1_2_10_81_1","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/978-3-642-39094-4_10","article-title":"A novel template protection method based on palmprint feature","volume":"7950","author":"Lu G.","year":"2013","journal-title":"Image Analysis and Recognition"},{"key":"e_1_2_10_82_1","first-page":"9","article-title":"A palmprint\u2010based cryptosystem using double encryption","volume":"6944","author":"Kumar A.","year":"2008","journal-title":"Biometric technology for human identification V"},{"key":"e_1_2_10_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.02.021"},{"issue":"2","key":"e_1_2_10_84_1","first-page":"289","article-title":"A new palm print based fuzzy vault system for securing cryptographic key","volume":"2","author":"Verma O.","year":"2012","journal-title":"Int. J. Inf. Electron. Eng."},{"key":"e_1_2_10_85_1","doi-asserted-by":"crossref","unstructured":"Hailun Liu K.X. Sun D. Qiu Z.: \u2018Palmprint based multidimensional fuzzy vault scheme\u2019 Sci. World J. 2014 no. Article ID 819031 p.9","DOI":"10.1155\/2014\/819031"},{"key":"e_1_2_10_86_1","first-page":"95","article-title":"A dissimilarity\u2010based approach for biometric fuzzy vaults\u2010application to handwritten signature images","volume":"8158","author":"Eskander G.S.","year":"2013","journal-title":"ICIAP Workshops"},{"key":"e_1_2_10_87_1","doi-asserted-by":"crossref","unstructured":"Eskander G. Sabourin R. Granger E.: \u2018Signature based fuzzy vaults with boosted feature selection\u2019.IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM) April2011 pp.131\u2013138","DOI":"10.1109\/CIBIM.2011.5949215"},{"key":"e_1_2_10_88_1","doi-asserted-by":"crossref","unstructured":"Eskander G.S. Sabourin R. Granger E.: \u2018Offline signature\u2010based fuzzy vault (OSFV: review and new results\u2019.CoRR 2014 vol. abs\/1408.3985","DOI":"10.1109\/CIBIM.2014.7015442"},{"key":"e_1_2_10_89_1","doi-asserted-by":"crossref","unstructured":"Zhang X. Shi R. Ritcey J.: \u2018On the implementation of modified fuzzy vault for biometric encryption\u2019.Information Theory and Applications Workshop (ITA) 2012 February2012 pp.56\u201361","DOI":"10.1109\/ITA.2012.6181819"},{"key":"e_1_2_10_90_1","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: how to generate strong keys from biometrics and other noisy data","volume":"3027","author":"Dodis Y.","year":"2004","journal-title":"Advances in Cryptology \u2013 EUROCRYPT 2004"},{"key":"e_1_2_10_91_1","unstructured":"Poon H.T. Miri A.: \u2018On efficient decoding for the fuzzy vault scheme\u2019.11th Int. Conf. on Information Science Signal Processing and their Applications (ISSPA) July2012 pp.454\u2013459"},{"key":"e_1_2_10_92_1","unstructured":"Marshall K. Rosenthal J. Schipani D. et al. : \u2018Subspace fuzzy vault\u2019.CoRR 2012 vol. abs\/1210.7190"},{"key":"e_1_2_10_93_1","unstructured":"Ross A. Jain A.K.: \u2018Multimodal biometrics: an overview\u2019.EUSIPCO 2004 pp.1221\u20131224"},{"key":"e_1_2_10_94_1","doi-asserted-by":"crossref","unstructured":"Kelkboom E.J.C. Zhou X. Breebaart J. et al. : \u2018Multi\u2010algorithm fusion with template protection\u2019.IEEE Third Int. Conf. on Biometrics: Theory Applications and Systems BTAS \u201909 September2009 pp.1\u20138","DOI":"10.1109\/BTAS.2009.5339045"},{"key":"e_1_2_10_95_1","first-page":"566","article-title":"\u20183d face\u2019: biometric template protection for 3D face recognition","volume":"4642","author":"Kelkboom E.J.C.","year":"2007","journal-title":"ICB"},{"key":"e_1_2_10_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(60)90287-4"},{"key":"e_1_2_10_97_1","doi-asserted-by":"crossref","unstructured":"Rathgeb C. Uhl A. Wild P.: \u2018Reliability\u2010balanced feature level fusion for fuzzy commitment scheme\u2019.Int. Joint Conf. on Biometrics (IJCB) October2011 pp.1\u20137","DOI":"10.1109\/IJCB.2011.6117535"},{"key":"e_1_2_10_98_1","doi-asserted-by":"crossref","unstructured":"Nandakumar K. Jain A.: \u2018Multibiometric template security using fuzzy vault\u2019.Second IEEE Int. Conf. on Biometrics: Theory Applications and Systems BTAS 2008 September2008 pp.1\u20136","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"e_1_2_10_99_1","first-page":"1","article-title":"Image versus feature mosaicing: a case study in fingerprints","volume":"6202","author":"Ross A.","year":"2006","journal-title":"Biometric Technology for Human Identification III"},{"issue":"1","key":"e_1_2_10_100_1","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TIFS.2011.2166545","article-title":"Multibiometric cryptosystems based on feature\u2010level fusion","volume":"7","author":"Nagar A.","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"e_1_2_10_101_1","first-page":"195","article-title":"Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications","volume":"2","author":"Meenakshi V.S.","year":"2010","journal-title":"Proc. CS"},{"key":"e_1_2_10_102_1","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-642-15766-0_30","article-title":"Secure and revocable multibiometric templates using fuzzy vault for fingerprint and iris","volume":"101","author":"Meenakshi V.S.","year":"2010","journal-title":"ICT, ser. Communications in Computer and Information Science"},{"issue":"29","key":"e_1_2_10_103_1","first-page":"67","article-title":"Retina and iris based multimodal biometric fuzzy vault","volume":"1","author":"Meenakshi V.","year":"2010","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_10_104_1","first-page":"344","article-title":"A systematic approach for feature extraction in fingerprint images","volume":"3072","author":"Chikkerur S.","year":"2004","journal-title":"ICBA"},{"key":"e_1_2_10_105_1","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-3-540-88181-0_29","article-title":"A multi\u2010biometric verification system for the privacy protection of iris templates","volume":"53","author":"Cimato S.","year":"2008","journal-title":"CISIS, ser. Advances in Soft Computing"},{"issue":"6","key":"e_1_2_10_106_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.4172\/2155-6180.1000150","article-title":"Multi\u2010modal biometric template security: fingerprint and palmprint based fuzzy vault","volume":"3","author":"Brindha V.E.","year":"2012","journal-title":"J. Biometrics Biostat."},{"key":"e_1_2_10_107_1","doi-asserted-by":"crossref","unstructured":"Sowkarthika S. Radha N.: \u2018Securing iris and fingerprint templates using fuzzy vault and symmetric algorithm\u2019.Seventh Int. Conf. on Intelligent Systems and Control (ISCO) January2013 pp.189\u2013193","DOI":"10.1109\/ISCO.2013.6481146"},{"key":"e_1_2_10_108_1","doi-asserted-by":"crossref","unstructured":"Li X. Sun D.: \u2018A dual\u2010mode fingerprint fusion encryption method based on fuzzy vault\u2019.Int. Conf. on Cyber\u2010Enabled Distributed Computing and Knowledge Discovery (CyberC) October2012 pp.208\u2013215","DOI":"10.1109\/CyberC.2012.42"},{"issue":"2","key":"e_1_2_10_109_1","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1179\/1743131x14Y.0000000090","article-title":"Palm and hand vein\u2010based fuzzy vault generation scheme for multibiometric cryptosystem","volume":"63","author":"Lalithamani N.","year":"2015","journal-title":"Imaging Sci. J."},{"key":"e_1_2_10_110_1","doi-asserted-by":"crossref","unstructured":"Ao M. Li S.Z.: \u2018Near infrared face based biometric key binding\u2019.Proc. Third Int. Conf. on Advances in Biometrics ser. ICB \u201909 Berlin Heidelberg 2009 pp.376\u2013385","DOI":"10.1007\/978-3-642-01793-3_39"},{"key":"e_1_2_10_111_1","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-642-53914-5_21","article-title":"Biometric template protection based on biometric certificate and fuzzy fingerprint vault","volume":"8346","author":"Wang W.","year":"2013","journal-title":"Advanced Data Mining and Applications"},{"key":"e_1_2_10_112_1","doi-asserted-by":"crossref","unstructured":"Moon D. Yong Choi W. Moon K. et al. : \u2018Fuzzy fingerprint vault using multiple polynomials\u2019.IEEE 13th Int. Symp. on Consumer Electronics. ISCE \u201909 May2009 pp.290\u2013293","DOI":"10.1109\/ISCE.2009.5156914"},{"key":"e_1_2_10_113_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2014.04.014"},{"key":"e_1_2_10_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2392559"},{"key":"e_1_2_10_115_1","doi-asserted-by":"crossref","unstructured":"Liu H. Sun D. Xiong K. et al. : \u2018Is fuzzy vault scheme very effective for key binding in biometric cryptosystems?\u2019.Int. Conf. on Cyber\u2010Enabled Distributed Computing and Knowledge Discovery (CyberC) October2011 pp.279\u2013284","DOI":"10.1109\/CyberC.2011.54"},{"key":"e_1_2_10_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033228"},{"key":"e_1_2_10_117_1","volume-title":"Constructing practical fuzzy extractors using QIM","author":"Buhan I.R.","year":"2007"},{"key":"e_1_2_10_118_1","doi-asserted-by":"crossref","unstructured":"Buhan I. Doumen J. Hartel P. et al. : \u2018Fuzzy extractors for continuous distributions\u2019.Proc. Second ACM Symp. on Information Computer and Communications Security ser. ASIACCS \u201907 New York NY USA 2007 pp.353\u2013355","DOI":"10.1145\/1229285.1229325"},{"key":"e_1_2_10_119_1","unstructured":"Ballard L. Kamara S. Reiter M.K.: \u2018The practical subtleties of biometric key generation\u2019.Proc. 17th Conf. Security Symp. ser. SS'08 Berkeley CA USA 2008 pp.61\u201374"},{"issue":"2","key":"e_1_2_10_120_1","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TIFS.2010.2046984","article-title":"Information leakage in fuzzy commitment schemes","volume":"5","author":"Ignatenko T.","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"e_1_2_10_121_1","doi-asserted-by":"crossref","unstructured":"Simoens K. Tuyls P. Preneel B.: \u2018Privacy weaknesses in biometric sketches\u2019.30th IEEE Symp. Security and Privacy May2009 pp.188\u2013203","DOI":"10.1109\/SP.2009.24"},{"key":"e_1_2_10_122_1","doi-asserted-by":"crossref","unstructured":"Kelkboom E.J.C. Breebaart J. Kevenaar T.A.M. et al. : \u2018Preventing the decodability attack based cross\u2010matching in a fuzzy commitment scheme\u2019 IEEE Trans. Inf. Forensics Sec. 2011 6 (1) pp.107\u2013121","DOI":"10.1109\/TIFS.2010.2091637"},{"key":"e_1_2_10_123_1","doi-asserted-by":"crossref","unstructured":"Failla P. Sutcu Y. Barni M.: \u2018esketch: A privacy\u2010preserving fuzzy commitment scheme for authentication using encrypted biometrics\u2019.Proc. 12th ACM Workshop on Multimedia and Security ser. MM& Sec \u201910 New York NY USA 2010 pp.241\u2013246","DOI":"10.1145\/1854229.1854271"},{"issue":"3","key":"e_1_2_10_124_1","first-page":"146","article-title":"Security capacity of the fuzzy fingerprint vault","volume":"3","author":"Merkle J.","year":"2010","journal-title":"Int. J. Adv. Sec."},{"key":"e_1_2_10_125_1","doi-asserted-by":"crossref","unstructured":"Chang E.\u2010C. Shen R. Teo F.W.: \u2018Finding the original point set hidden among chaff\u2019.Proc. 2006 ACM Symp. on Information Computer and Communications Security ser. ASIACCS \u201906 New York NY USA 2006 pp.182\u2013188","DOI":"10.1145\/1128817.1128845"},{"key":"e_1_2_10_126_1","article-title":"Realization of correlation attack against the fuzzy vault scheme","volume":"6819","author":"Kholmatov A.","year":"2008","journal-title":"Society of Photo\u2010Optical Instrumentation Engineers (SPIE) Conf. Series, ser. Society of Photo\u2010Optical Instrumentation Engineers (SPIE) Conf. Series"},{"key":"e_1_2_10_127_1","unstructured":"Mihailescu P.: \u2018The fuzzy vault for fingerprints is vulnerable to brute force attack\u2019.CoRR 2007 vol. abs\/0708.2974"},{"issue":"1","key":"e_1_2_10_128_1","first-page":"27","article-title":"A collusion attack on the fuzzy vault scheme","volume":"1","author":"Poon H.T.","year":"2009","journal-title":"ISeCure, ISC Int. J. Inf. Sec."},{"key":"e_1_2_10_129_1","first-page":"299","article-title":"Fast polynomial reconstruction attack against fuzzy fingerprint vault","volume":"2","author":"Choi W.\u2010Y.","year":"2011","journal-title":"Fifth Int. Conf. on New Trends in Information Science and Service Science (NISS)"},{"key":"e_1_2_10_130_1","first-page":"76","article-title":"The vulnerabilities analysis of fuzzy vault using password","volume":"3","author":"Hong S.","year":"2008","journal-title":"Second Int. Conf. on Future Generation Communication and Networking"},{"key":"e_1_2_10_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"e_1_2_10_132_1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-540-68164-9_8","article-title":"An authentication protocol with encrypted biometric data","volume":"5023","author":"Bringer J.","year":"2008","journal-title":"Progress in Cryptology AFRICACRYPT 2008"},{"key":"e_1_2_10_133_1","doi-asserted-by":"crossref","unstructured":"Barni M. Bianchi T. Catalano D. et al. : \u2018A privacy\u2010compliant fingerprint recognition system based on homomorphic encryption and fingercode templates\u2019.Fourth IEEE Int. Conf. on Biometrics: Theory Applications and Systems (BTAS) September2010 pp.1\u20137","DOI":"10.1109\/BTAS.2010.5634527"}],"container-title":["IET Biometrics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-bmt.2015.0035","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-bmt.2015.0035","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-bmt.2015.0035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T09:59:06Z","timestamp":1612605546000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-bmt.2015.0035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,5]]},"references-count":132,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1049\/iet-bmt.2015.0035"],"URL":"https:\/\/doi.org\/10.1049\/iet-bmt.2015.0035","archive":["Portico"],"relation":{},"ISSN":["2047-4938","2047-4946"],"issn-type":[{"value":"2047-4938","type":"print"},{"value":"2047-4946","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,5]]}}}