{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T14:48:30Z","timestamp":1745419710044,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031843556"},{"type":"electronic","value":"9783031843563"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84356-3_18","type":"book-chapter","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T13:47:32Z","timestamp":1740491252000},"page":"212-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Embedding Non-distortive Cancelable Face Template Generation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9519-2444","authenticated-orcid":false,"given":"Dmytro","family":"Zakharov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2331-6326","authenticated-orcid":false,"given":"Oleksandr","family":"Kuznetsov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8893-9244","authenticated-orcid":false,"given":"Emanuele","family":"Frontoni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3678-9229","authenticated-orcid":false,"given":"Natalia","family":"Kryvinska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Artificial Intelligence for Cybersecurity, Advances in Information Security, vol.\u00a054. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97087-1","DOI":"10.1007\/978-3-030-97087-1"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Amin, R., Gaber, T., ElTaweel, G., Hassanien, A.E.: Biometric and traditional mobile authentication techniques: Overviews and open issues. In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 423\u2013446 (2014)","DOI":"10.1007\/978-3-662-43616-5_16"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"6624890","DOI":"10.1155\/2021\/6624890","volume":"2021","author":"G Bok-Min","year":"2021","unstructured":"Bok-Min, G., Abanda, Y., Tiedeu, A., Kom, G.: Image encryption with fusion of two maps. Secur. Commun. Networks 2021, 6624890 (2021). https:\/\/doi.org\/10.1155\/2021\/6624890","journal-title":"Secur. Commun. Networks"},{"issue":"6","key":"18_CR4","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L.: The MNIST database of handwritten digit images for machine learning research. IEEE Signal Process. Mag. 29(6), 141\u2013142 (2012)","journal-title":"IEEE Signal Process. Mag."},{"issue":"3","key":"18_CR5","first-page":"1","volume":"1","author":"J Galbally","year":"2007","unstructured":"Galbally, J., Fierrez, J., Ortega-Garc\u00eda, J.: Vulnerabilities in biometric systems: attacks and recent advances in liveness detection. Database 1(3), 1\u20138 (2007)","journal-title":"Database"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Gatys, L.A., Ecker, A.S., Bethge, M.: Image style transfer using convolutional neural networks. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2414\u20132423 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.265","DOI":"10.1109\/CVPR.2016.265"},{"key":"18_CR7","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27 (2014)"},{"key":"18_CR8","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report 07-49, University of Massachusetts, Amherst (2007)"},{"key":"18_CR9","unstructured":"Isola, P., Zhu, J., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. CoRR (2016). arxiv:1611.07004"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2019.07.023","volume":"102","author":"H Kaur","year":"2020","unstructured":"Kaur, H., Khanna, P.: Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Futur. Gener. Comput. Syst. 102, 30\u201341 (2020). https:\/\/doi.org\/10.1016\/j.future.2019.07.023","journal-title":"Futur. Gener. Comput. Syst."},{"key":"18_CR11","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"18_CR12","unstructured":"Kumar, S.K.: On weight initialization in deep neural networks. CoRR, arXiv:1704.08863 (2017)"},{"key":"18_CR13","unstructured":"Le, H.M., Samaras, D.: Shadow removal via shadow image decomposition. CoRR abs\/1908.08628 (2019). arxiv:1908.08628"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Z., Yin, H., Wu, X., Wu, Z., Mi, Y., Wang, S.: From shadow generation to shadow removal. CoRR abs\/2103.12997 (2021). arXiv:2103.12997","DOI":"10.1109\/CVPR46437.2021.00489"},{"issue":"6","key":"18_CR15","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/JPROC.2009.2018367","volume":"97","author":"O Matoba","year":"2009","unstructured":"Matoba, O., Nomura, T., Perez-Cabre, E., Millan, M.S., Javidi, B.: Optical techniques for information security. Proc. IEEE 97(6), 1128\u20131148 (2009). https:\/\/doi.org\/10.1109\/JPROC.2009.2018367","journal-title":"Proc. IEEE"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Parkhi, O., Vedaldi, A., Zisserman, A.: Deep face recognition. In: BMVC 2015-Proceedings of the British Machine Vision Conference 2015. British Machine Vision Association (2015)","DOI":"10.5244\/C.29.41"},{"key":"18_CR17","unstructured":"Puech, W.: Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption, 1st edn. Wiley-ISTE, Hoboken (2022)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-net: convolutional networks for biomedical image segmentation. CoRR (2015). arxiv:1505.04597","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"18_CR19","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. CoRR abs\/1503.03832 (2015). abs\/1505.04597 arxiv:1503.03832"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"23409","DOI":"10.1109\/ACCESS.2021.3053998","volume":"9","author":"N Subramanian","year":"2021","unstructured":"Subramanian, N., Elharrouss, O., Al-Maadeed, S., Bouridane, A.: Image steganography: a review of the recent advances. IEEE Access 9, 23409\u201323423 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3053998","journal-title":"IEEE Access"},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"Vasluianu, F.A., Romero, A., Van\u00a0Gool, L., Timofte, R.: Shadow removal with paired and unpaired learning. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 826\u2013835 (2021). https:\/\/doi.org\/10.1109\/CVPRW53098.2021.00092","DOI":"10.1109\/CVPRW53098.2021.00092"},{"key":"18_CR22","unstructured":"Wang, F., Xiang, X., Cheng, J., Yuille, A.L.: Normface: L$$ _{\\text{2}}$$ hypersphere embedding for face verification. CoRR abs\/1704.06369 (2017). arXiv:1704.06369"},{"issue":"1","key":"18_CR23","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2337\/1\/012009","volume":"2337","author":"P Yang","year":"2022","unstructured":"Yang, P., Zhang, M., Wu, R., Su, Y., Guo, K.: Hiding image within image based on deep learning. J. Phys: Conf. Ser. 2337(1), 012009 (2022). https:\/\/doi.org\/10.1088\/1742-6596\/2337\/1\/012009","journal-title":"J. Phys: Conf. Ser."},{"key":"18_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102583","volume":"114","author":"W Yang","year":"2022","unstructured":"Yang, W., Wang, S., Kang, J.J., Johnstone, M.N., Bedari, A.: A linear convolution-based cancelable fingerprint biometric authentication system. Comput. Secur. 114, 102583 (2022). https:\/\/doi.org\/10.1016\/j.cose.2021.102583","journal-title":"Comput. Secur."},{"key":"18_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102704","volume":"58","author":"W Yang","year":"2021","unstructured":"Yang, W., Wang, S., Shahzad, M., Zhou, W.: A cancelable biometric authentication system based on feature-adaptive random projection. J. Inf. Secur. Appl. 58, 102704 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2020.102704","journal-title":"J. Inf. Secur. Appl."},{"key":"18_CR26","unstructured":"Zhang, K.A., Cuesta-Infante, A., Veeramachaneni, K.: SteganoGAN: high capacity image steganography with GANs. arXiv preprint arXiv:1901.03892 (2019). arXiv:1901.03892"},{"key":"18_CR27","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1109\/ACCESS.2016.2569421","volume":"4","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Zhang, L.Y., Zhou, J., Liu, L., Chen, F., He, X.: A review of compressive sensing in information security field. IEEE Access 4, 2507\u20132519 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2569421","journal-title":"IEEE Access"},{"issue":"1","key":"18_CR28","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TCI.2016.2644865","volume":"3","author":"H Zhao","year":"2017","unstructured":"Zhao, H., Gallo, O., Frosio, I., Kautz, J.: Loss functions for image restoration with neural networks. IEEE Trans. Comput. Imaging 3(1), 47\u201357 (2017). https:\/\/doi.org\/10.1109\/TCI.2016.2644865","journal-title":"IEEE Trans. Comput. Imaging"},{"key":"18_CR29","unstructured":"Zhmoginov, A., Sandler, M.: Inverting face embeddings with convolutional neural networks. arXiv:abs\/1606.04189 (2016). https:\/\/api.semanticscholar.org\/CorpusID:15785666"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84356-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T13:47:38Z","timestamp":1740491258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84356-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031843556","9783031843563"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84356-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}