{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:33:06Z","timestamp":1725715986497},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T00:00:00Z","timestamp":1526428800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,16]]},"DOI":"10.1145\/3230820.3230826","type":"proceedings-article","created":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T12:09:54Z","timestamp":1534248594000},"page":"30-37","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Cancellable Fingerprint Template Generation Using Rectangle-Based Adjoining Minutiae Pairs"],"prefix":"10.1145","author":[{"given":"Morampudi Mahesh","family":"Kumar","sequence":"first","affiliation":[{"name":"IDRBT & NIT-W, Hyderabad"}]},{"given":"Munaga V. N. K.","family":"Prasad","sequence":"additional","affiliation":[{"name":"IDRBT, Hyderabad"}]},{"given":"U. S. N.","family":"Raju","sequence":"additional","affiliation":[{"name":"Dept of CSE, NIT-Warangal, Warangal"}]}],"member":"320","published-online":{"date-parts":[[2018,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Biometrics: personal identification in networked society","author":"Jain A","year":"2006","unstructured":"Jain A , Bolle R , Pankanti S , editors. Biometrics: personal identification in networked society , Springer Science & Business Media , 2006 .. Jain A, Bolle R, Pankanti S, editors. Biometrics: personal identification in networked society, Springer Science & Business Media, 2006.."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"e_1_3_2_1_4_1","volume-title":"Bachelor of Science thesis, The Department of Computer Science","author":"Hill CJ.","year":"2001","unstructured":"Hill CJ. Risk of masquerade arising from the storage of biometrics , Bachelor of Science thesis, The Department of Computer Science , Australian National University , 2001 Hill CJ. Risk of masquerade arising from the storage of biometrics, Bachelor of Science thesis, The Department of Computer Science, Australian National University, 2001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1087"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.77"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1557624"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1003"},{"key":"e_1_3_2_1_10_1","first-page":"2727","volume-title":"Biometric perils and patches' Pattern Recognition","author":"Bolle RM","year":"2002","unstructured":"Bolle RM , Connell JH , Ratha NK. ' Biometric perils and patches' Pattern Recognition , 2002 , 35(12), pp. 2727 -- 2738 Bolle RM, Connell JH, Ratha NK. 'Biometric perils and patches' Pattern Recognition, 2002, 35(12), pp. 2727--38"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference, IEEE 2008","author":"Chikkerur S","unstructured":"Chikkerur S , Ratha NK , Connell JH , Bolle RM. Generating registration-free cancelable fingerprint templates. In Biometrics: Theory , Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference, IEEE 2008 pp. 1 -- 6 Chikkerur S, Ratha NK, Connell JH, Bolle RM. Generating registration-free cancelable fingerprint templates. In Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference, IEEE 2008 pp. 1--6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.08.008"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.224"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.03.015"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.02.022"},{"key":"e_1_3_2_1_17_1","first-page":"76","volume-title":"IET biometrics","author":"Belguechi R","year":"2013","unstructured":"Belguechi R , Cherrier E , Rosenberger C , Ait-Aoudia S. ' Operational bio-hash to preserve privacy of fingerprint minutiae templates ', IET biometrics , 2013 , 2(2), pp. 76 -- 84 Belguechi R, Cherrier E, Rosenberger C, Ait-Aoudia S. 'Operational bio-hash to preserve privacy of fingerprint minutiae templates', IET biometrics, 2013, 2(2), pp. 76--84"},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"Computer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Conference, IEEE 2007","author":"Farooq F","unstructured":"Farooq F , Bolle RM , Jea TY , Ratha N. ' Anonymous and revocable fingerprint recognition ', Computer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Conference, IEEE 2007 , pp. 1 -- 7 Farooq F, Bolle RM, Jea TY, Ratha N. 'Anonymous and revocable fingerprint recognition', Computer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Conference, IEEE 2007, pp. 1--7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.11.091"},{"key":"e_1_3_2_1_20_1","first-page":"386","volume-title":"Biometrics (ICB), 2015 International Conference, IEEE 2015","author":"Sandhya M","unstructured":"Sandhya M , Prasad MV. 'k- Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection ', Biometrics (ICB), 2015 International Conference, IEEE 2015 , pp. 386 -- 393 Sandhya M, Prasad MV. 'k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection', Biometrics (ICB), 2015 International Conference, IEEE 2015, pp. 386--393"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.04.020"},{"key":"e_1_3_2_1_22_1","first-page":"131","volume-title":"Generating cancellable fingerprint templates based on Delaunay triangle feature set construction' IET Biometrics","author":"Sandhya M","year":"2016","unstructured":"Sandhya M , Prasad MV , Chillarige RR. ' Generating cancellable fingerprint templates based on Delaunay triangle feature set construction' IET Biometrics , 2016 , 5(2), pp. 131 -- 139 Sandhya M, Prasad MV, Chillarige RR. 'Generating cancellable fingerprint templates based on Delaunay triangle feature set construction' IET Biometrics, 2016, 5(2), pp. 131--39"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Prasad MV Swathi P Rao CR Deekshatulu BL. 'Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates' International Journal of Pattern Recognition and Artificial Intelligence 2014 28(06) 1456013 Prasad MV Swathi P Rao CR Deekshatulu BL. 'Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates' International Journal of Pattern Recognition and Artificial Intelligence 2014 28(06) 1456013","DOI":"10.1142\/S0218001414560138"},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"BTAS'09","author":"Yang B","year":"2009","unstructured":"Yang B , Busch C. ' Parameterized geometric alignment for minutiae-based fingerprint template protection' Biometrics: Theory, Applications, and Systems, 2009 . BTAS'09 . IEEE 3rd International Conference, IEEE 2009 , pp. 1 -- 6 Yang B, Busch C. 'Parameterized geometric alignment for minutiae-based fingerprint template protection' Biometrics: Theory, Applications, and Systems, 2009. BTAS'09. IEEE 3rd International Conference, IEEE 2009, pp. 1--6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117597"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.03.039"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.01.019"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.05.004"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.10.003"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.01.001"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.08.017"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3042"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.12.011"},{"key":"e_1_3_2_1_34_1","volume-title":"Van Loan CF. Matrix computations","author":"Golub GH","year":"2012","unstructured":"Golub GH , Van Loan CF. Matrix computations , 2012 JHU Press , 3 Golub GH, Van Loan CF. Matrix computations, 2012 JHU Press, 3"},{"key":"e_1_3_2_1_35_1","volume-title":"http:\/\/bias.csr.unibo.it\/fvc2002 accessed","author":"Fingerprint Verification Competetion","year":"2017","unstructured":"Fingerprint Verification Competetion : http:\/\/bias.csr.unibo.it\/fvc2002 accessed 20 December 2017 Fingerprint Verification Competetion: http:\/\/bias.csr.unibo.it\/fvc2002 accessed 20 December 2017"},{"key":"e_1_3_2_1_36_1","volume-title":"http:\/\/www.neurotechnology.com, accessed","author":"Neurotechnology VeriFinger SDK","year":"2017","unstructured":"Neurotechnology VeriFinger SDK : http:\/\/www.neurotechnology.com, accessed 11 December 2017 Neurotechnology VeriFinger SDK: http:\/\/www.neurotechnology.com, accessed 11 December 2017"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2392559"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.03.003"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.02.011"}],"event":{"name":"ICBEA '18: 2018 2nd International Conference on Biometric Engineering and Applications - ICBEA '18","acronym":"ICBEA '18","location":"Amsterdam Netherlands"},"container-title":["Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230820.3230826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T07:22:10Z","timestamp":1673594530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230820.3230826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,16]]},"references-count":39,"alternative-id":["10.1145\/3230820.3230826","10.1145\/3230820"],"URL":"https:\/\/doi.org\/10.1145\/3230820.3230826","relation":{},"subject":[],"published":{"date-parts":[[2018,5,16]]},"assertion":[{"value":"2018-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}