{"id":"https://openalex.org/W2071461360","doi":"https://doi.org/10.1109/tifs.2012.2191961","title":"Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources","display_name":"Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources","publication_year":2012,"publication_date":"2012-04-11","ids":{"openalex":"https://openalex.org/W2071461360","doi":"https://doi.org/10.1109/tifs.2012.2191961","mag":"2071461360"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2012.2191961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2012.2191961","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027076914","display_name":"Emile Kelkboom","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122849","display_name":"Philips (Netherlands)","ror":"https://ror.org/02p2bgp27","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210122849"]},{"id":"https://openalex.org/I4210131230","display_name":"Philips (United States)","ror":"https://ror.org/03kw6wr76","country_code":"US","type":"company","lineage":["https://openalex.org/I4210122849","https://openalex.org/I4210131230"]}],"countries":["NL","US"],"is_corresponding":true,"raw_author_name":"Emile J. C. Kelkboom","raw_affiliation_strings":["Philips Research, Eindhoven, Netherlands","Philips Research, Eindhoven, NETHERLANDS"],"affiliations":[{"raw_affiliation_string":"Philips Research, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I4210122849"]},{"raw_affiliation_string":"Philips Research, Eindhoven, NETHERLANDS","institution_ids":["https://openalex.org/I4210131230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004462789","display_name":"Jeroen Breebaart","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166405","display_name":"Technolution (Netherlands)","ror":"https://ror.org/05d021z60","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210166405"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jeroen Breebaart","raw_affiliation_strings":["Civolution, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Civolution, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I4210166405"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028001019","display_name":"Ileana Buhan","orcid":"https://orcid.org/0000-0001-5494-9164"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ileana Buhan","raw_affiliation_strings":["Riscure, Delft, Netherlands"],"affiliations":[{"raw_affiliation_string":"Riscure, Delft, Netherlands","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031138348","display_name":"Raymond Veldhuis","orcid":"https://orcid.org/0000-0002-0381-5235"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Raymond N. J. Veldhuis","raw_affiliation_strings":["Faculty EEMCS, University of Twente, Enschede, Netherlands","Fac. EEMCS, Univ. of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty EEMCS, University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Fac. EEMCS, Univ. of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027076914"],"corresponding_institution_ids":["https://openalex.org/I4210122849","https://openalex.org/I4210131230"],"apc_list":null,"apc_paid":null,"fwci":0.991,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.79420125,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7","issue":"4","first_page":"1225","last_page":"1241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.882565975189209},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7505851984024048},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6605937480926514},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.6337020397186279},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5677065253257751},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5230244994163513},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5190830230712891},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.49849820137023926},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.49387937784194946},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4708038568496704},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.44825220108032227},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4356370270252228},{"id":"https://openalex.org/keywords/mixture-model","display_name":"Mixture model","score":0.4239582419395447},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.41139352321624756},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38464441895484924},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.27491295337677},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1692904829978943},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.14301905035972595},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14014926552772522},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11277344822883606}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.882565975189209},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7505851984024048},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6605937480926514},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.6337020397186279},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5677065253257751},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5230244994163513},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5190830230712891},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.49849820137023926},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.49387937784194946},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4708038568496704},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.44825220108032227},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4356370270252228},{"id":"https://openalex.org/C61224824","wikidata":"https://www.wikidata.org/wiki/Q2260434","display_name":"Mixture model","level":2,"score":0.4239582419395447},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.41139352321624756},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38464441895484924},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27491295337677},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1692904829978943},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.14301905035972595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14014926552772522},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11277344822883606},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2012.2191961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2012.2191961","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/bec3f5aa-cec7-4cc3-b342-47a99f015ae5","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/bec3f5aa-cec7-4cc3-b342-47a99f015ae5","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kelkboom, E J C, Breebaart, J, Buhan, I R & Veldhuis, R N J 2012, 'Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources', IEEE transactions on information forensics and security, vol. 7, no. 4, pp. 1225-1241. https://doi.org/10.1109/TIFS.2012.2191961","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/bec3f5aa-cec7-4cc3-b342-47a99f015ae5","is_oa":false,"landing_page_url":"http://eprints.eemcs.utwente.nl/secure2/21782/01/Kelkboom12_Maximum_Key_Size_and_Classification_Performance_of_Fuzzy_Commitment_for_Gaussian_Modeled_Biometric_Sources.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W34942443","https://openalex.org/W191434445","https://openalex.org/W1546438435","https://openalex.org/W1547249794","https://openalex.org/W1556646323","https://openalex.org/W1593558380","https://openalex.org/W1599789598","https://openalex.org/W1606443045","https://openalex.org/W1606480398","https://openalex.org/W1851882747","https://openalex.org/W1977348714","https://openalex.org/W2010023107","https://openalex.org/W2018903522","https://openalex.org/W2026884613","https://openalex.org/W2032551902","https://openalex.org/W2037420844","https://openalex.org/W2041942569","https://openalex.org/W2053438338","https://openalex.org/W2063355793","https://openalex.org/W2092988036","https://openalex.org/W2099111195","https://openalex.org/W2119334679","https://openalex.org/W2124169682","https://openalex.org/W2126975908","https://openalex.org/W2130203169","https://openalex.org/W2139340143","https://openalex.org/W2144127923","https://openalex.org/W2146813141","https://openalex.org/W2151888520","https://openalex.org/W2164684058","https://openalex.org/W2165367855","https://openalex.org/W2165831888","https://openalex.org/W2166409200","https://openalex.org/W2168892181","https://openalex.org/W2534370658","https://openalex.org/W2548219122","https://openalex.org/W3160027900","https://openalex.org/W4297900077","https://openalex.org/W6601449344","https://openalex.org/W6607767893","https://openalex.org/W6629700272","https://openalex.org/W6635598337","https://openalex.org/W6635598765","https://openalex.org/W6635981913","https://openalex.org/W6639151589","https://openalex.org/W6728970016"],"related_works":["https://openalex.org/W2075383893","https://openalex.org/W4312294872","https://openalex.org/W1988287319","https://openalex.org/W4229921532","https://openalex.org/W1987065448","https://openalex.org/W3034595259","https://openalex.org/W4324137500","https://openalex.org/W2348992262","https://openalex.org/W2053603591","https://openalex.org/W2362653998"],"abstract_inverted_index":{"Template":[0],"protection":[1,26,97],"techniques":[2,27],"are":[3,28],"used":[4],"within":[5],"biometric":[6,14,46,105,137,150],"systems":[7],"in":[8,230,234],"order":[9],"to":[10,39],"protect":[11],"the":[12,40,45,51,58,66,69,72,85,94,103,114,118,122,127,141,144,149,153,158,166,170,180,186,195,205,227],"stored":[13],"template":[15,25,96],"against":[16],"privacy":[17,60],"and":[18,61,107,126,162,165,191,219],"security":[19,62],"threats.":[20],"A":[21],"great":[22],"portion":[23],"of":[24,50,68,93,121,143,155,160,179,182],"based":[29,101],"on":[30,65,84,102,169,185,217],"extracting":[31],"a":[32,37,81,135,214],"key":[33,38,52,87,130,172,189,220,232],"from,":[34],"or":[35],"binding":[36],"binary":[41],"vector":[42],"derived":[43],"from":[44],"sample.":[47],"The":[48],"size":[49,131,190,221],"plays":[53],"an":[54,177,201],"important":[55],"role,":[56],"as":[57,133,148,198,200],"achieved":[59],"mainly":[63],"depend":[64],"entropy":[67],"key.":[70],"In":[71,109],"literature,":[73],"it":[74],"can":[75,225],"be":[76],"observed":[77],"that":[78,210],"there":[79],"is":[80],"large":[82,215,228],"variation":[83],"reported":[86,231],"lengths":[88],"at":[89],"similar":[90],"classification":[91,119,192],"performance":[92,120,168,218],"same":[95,104],"system,":[98],"even":[99],"when":[100],"modality":[106],"database.":[108],"this":[110],"work,":[111],"we":[112,175],"determine":[113],"analytical":[115],"relationship":[116],"between":[117],"fuzzy":[123],"commitment":[124],"scheme":[125],"theoretical":[128,196],"maximum":[129,171,188],"given":[132],"input":[134],"Gaussian":[136],"source.":[138],"We":[139],"show":[140],"effect":[142,181],"system":[145],"parameters":[146],"such":[147],"source":[151],"capacity,":[152],"number":[154,159],"feature":[156,183,211],"components,":[157],"enrolment":[161],"verification":[163],"samples,":[164],"target":[167],"size.":[173],"Furthermore,":[174],"provide":[176],"analysis":[178],"interdependencies":[184,212],"estimated":[187],"performance.":[193],"Both":[194],"analysis,":[197],"well":[199],"experimental":[202],"evaluation":[203],"using":[204],"MCYT":[206],"fingerprint":[207],"database":[208],"showed":[209],"have":[213],"impact":[216],"estimates.":[222],"This":[223],"property":[224],"explain":[226],"deviation":[229],"sizes":[233],"literature.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
