<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:42:14.306Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:393" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:393</identifier>
                <datestamp>2013-10-24T20:54:28Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">On chip fingerprint identification combined with the cryptographic key using Slepian Wolf coding</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2012</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/393</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://www.eiic.cz/archive/?vid=1&amp;aid=2&amp;kid=20101-68</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:1235" confidence="-1">G. Kunjadić</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-6136-1895" confidence="-1">M. Veinović</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="etfid:6" confidence="-1">M. Milosavljević</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">In this paper we propose the practical and secure
solution how to integrate the fingerprint biometric into
cryptographic applications. A binary string which could be
reproduced unambiguously, practically, a cryptographic key, can
reliably protected with originally fingerprint codes. The key is
generated using random number generator, such as HSM device.
In that way we are keeping coincidence of cryptographic key,
also keeping its entropy, and what is more important if the key is
compromised, we can easily use the new one. For the key
encoding we are proposing Slepian Wolf coding, basically defined
in Slepian Wolf theorem. Like a method for converting
fingerprint into minutiae and after that to a binary string we
propose Rajarshi Guha method, detail encoded in C
programming language and approved in practice. After
combining two mentioned binary strings we get an unique data
set and place them onto the chip card. The some other kinds of
tamper resistant tokens can be used as well. The key revelation
process is strictly conditioned by the presence of fingerprint and
the chip card. Proposed solution provides maximum security of
fingerprint and the lowest possible errors that can be occurred.
Also the degree of false positive and false negative authentication
is reduced to a minimum.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">732</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">737</dim:field>
                    <dim:field mdschema="dc" element="source">Proceedings</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
