{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:16:16Z","timestamp":1729649776018,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/idaacs.2011.6072859","type":"proceedings-article","created":{"date-parts":[[2011,11,11]],"date-time":"2011-11-11T13:56:19Z","timestamp":1321019779000},"page":"696-699","source":"Crossref","is-referenced-by-count":5,"title":["Biometric logical access control enhanced by use of steganography over secured transmission channel"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Kapczynski","sequence":"first","affiliation":[]},{"given":"Arkadiusz","family":"Banasik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Disappearing Cryptography Information Hiding Steganography & Watermarking","year":"2002","author":"wayner","key":"ref39"},{"journal-title":"Ochrona danych i zabezpieczenia w systemach teleinformatycznych","year":"2003","author":"stoklosa","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2002.1035630"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1016\/S0164-1212(98)10036-5","article-title":"An Efective Model for Composition of Secure Systems. Elsevier","author":"shi","year":"1998","journal-title":"The Journal of Systems and Software"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.846648"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DSDE.2010.10"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/3468.661150"},{"journal-title":"A Survey of Publickey Infrastructures","year":"1997","author":"branchaud","key":"ref10"},{"key":"ref40","article-title":"Technologies and systems","author":"zhang","year":"2000","journal-title":"Automated Biometrics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/34.765653"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.903586"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-35167-4_5","article-title":"An Approach to Deriving Global Authorizations in Federated Database Systems","author":"castano","year":"1997","journal-title":"Database Security Status and Prospects"},{"key":"ref14","article-title":"Protection of information in computer systems","author":"clark","year":"1975","journal-title":"IEEE CompCon Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(93)90151-L"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1499799.1499815"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"journal-title":"The Science of Fingerprints Classification and Uses","year":"1984","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-4832-3093-1.50017-1"},{"journal-title":"Kryptografia Teoria i praktyka zabezpieczania systemow komputerowych","year":"1999","author":"kutylowski","key":"ref28"},{"key":"ref4","article-title":"Biometrics","author":"ashbourn","year":"2000","journal-title":"Advanced Identity Verification"},{"journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","author":"katzenbeisser","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839903"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"journal-title":"Advances in Fingerprint Technology","year":"1991","author":"lee","key":"ref29"},{"journal-title":"Image Quality Statistics and Their Use in Steganalysis and Compression","year":"2001","author":"avicbas","key":"ref5"},{"key":"ref8","article-title":"Computer-Access Security Systems Using Keystroke Dynamics","volume":"12","author":"blecha","year":"1990","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"journal-title":"History of Fingerprinting","year":"2001","author":"berry","key":"ref7"},{"key":"ref2","volume":"12","author":"anderson","year":"1972","journal-title":"Information Security in a Multiuser Computer Environment Advances in Computers"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(94)90031-0"},{"journal-title":"Understanding Public-Key Infrastructure","year":"2001","author":"lloyd","key":"ref1"},{"journal-title":"Automatic personal identification using fingerprints","year":"1998","author":"hong","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2002.5745550"},{"key":"ref21","article-title":"Fingerprint Image Enhancement: Algorithms and Performance Evaluation","volume":"20","author":"hong","year":"1998","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/5.628674"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1053-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/34.587996"},{"key":"ref26","article-title":"Hiding Biometric Data","volume":"25","author":"jain","year":"2003","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref25","article-title":"Personal Identification in Networked Society","author":"jain","year":"2000","journal-title":"Biometrics"}],"event":{"name":"2011 IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","start":{"date-parts":[[2011,9,15]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2011,9,17]]}},"container-title":["Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6063705\/6072809\/06072859.pdf?arnumber=6072859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T08:19:54Z","timestamp":1560932394000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6072859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/idaacs.2011.6072859","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}