{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:08:08Z","timestamp":1750392488754,"version":"3.41.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031957666","type":"print"},{"value":"9783031957673","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95767-3_6","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:25:10Z","timestamp":1750335910000},"page":"137-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cancelable Biometrics Based on\u00a0Cosine Locality Sensitive Hashing and\u00a0Grouped Inner Product Transformation for\u00a0Real-Valued Features"],"prefix":"10.1007","author":[{"given":"Ruoqi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yulin","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Peisong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Yuepeng","family":"E","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"6_CR1","unstructured":"Casia-facev5. http:\/\/biometrics.idealtest.org\/"},{"key":"6_CR2","unstructured":"Fvc2002. http:\/\/bias.csr.unibo.it\/fvc2002\/"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Bawa, M., Condie, T., Ganesan, P.: LSH forest: self-tuning indexes for similarity search. In: Ellis, A., Hagino, T. (eds.) Proceedings of the 14th International Conference on World Wide Web, WWW 2005, Chiba, Japan, 10\u201314 May 2005, pp. 651\u2013660. ACM (2005)","DOI":"10.1145\/1060745.1060840"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Belguechi, R., Rosenberger, C., Ait-Aoudia, S.: Biohashing for securing minutiae template. In: 20th International Conference on Pattern Recognition, ICPR 2010, Istanbul, Turkey, 23\u201326 August 2010, pp. 1168\u20131171. IEEE Computer Society (2010)","DOI":"10.1109\/ICPR.2010.292"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Charikar, M.: Similarity estimation techniques from rounding algorithms. In: Reif, J.H. (ed.) Proceedings on 34th Annual ACM Symposium on Theory of Computing, 19\u201321 May 2002, Montr\u00e9al, Qu\u00e9bec, Canada, pp. 380\u2013388. ACM (2002)","DOI":"10.1145\/509907.509965"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.sigpro.2018.09.013","volume":"154","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Wo, Y., Xie, R., Wu, C., Han, G.: Deep secure quantization: on secure biometric hashing against similarity-based attacks. Signal Process. 154, 314\u2013323 (2019)","journal-title":"Signal Process."},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ipl.2004.09.014","volume":"93","author":"T Connie","year":"2005","unstructured":"Connie, T., Teoh, A., Goh, M., Ngo, D.: Palmhashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93(1), 1\u20135 (2005)","journal-title":"Inf. Process. Lett."},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TIFS.2022.3230212","volume":"18","author":"TM Dang","year":"2022","unstructured":"Dang, T.M., Nguyen, T.D., Hoang, T., Kim, H., Teoh, A., Choi, D.: Avet: a novel transform function to improve cancellable biometrics security. IEEE Trans. Inf. Forensics Secur. 18, 758\u2013772 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1002\/rsa.10073","volume":"22","author":"S Dasgupta","year":"2003","unstructured":"Dasgupta, S., Gupta, A.: An elementary proof of a theorem of johnson and lindenstrauss. Random Struct. Algorithms 22(1), 60\u201365 (2003)","journal-title":"Random Struct. Algorithms"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: Snoeyink, J., Boissonnat, J. (eds.) Proceedings of the 20th ACM Symposium on Computational Geometry, Brooklyn, New York, USA, 8\u201311 June 2004, pp. 253\u2013262. ACM (2004)","DOI":"10.1145\/997817.997857"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: Arcface: additive angular margin loss for deep face recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019, Long Beach, CA, USA, 16\u201320 June 2019, pp. 4690\u20134699. Computer Vision Foundation\/IEEE (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Dong, X., Jin, Z., Jin, A.T.B.: A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp.\u00a01\u20138. IEEE (2019)","DOI":"10.1109\/BTAS46853.2019.9185997"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Durbet, A., Lafourcade, P., Migdal, D., Thiry-Atighehchi, K., Grollemund, P.M.: Authentication attacks on projection-based cancelable biometric schemes. arXiv preprint arXiv:2110.15163 (2021)","DOI":"10.5220\/0011277100003283"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.1109\/TIFS.2020.2977533","volume":"15","author":"L Ghammam","year":"2020","unstructured":"Ghammam, L., Karabina, K., Lacharme, P., Thiry-Atighehchi, K.: A cryptanalysis of two cancelable biometric schemes based on index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 15, 2869\u20132880 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR15","unstructured":"Gionis, A., Indyk, P., Motwani, R.: Similarity search in high dimensions via hashing. In: Atkinson, M.P., Orlowska, M.E., Valduriez, P., Zdonik, S.B., Brodie, M.L. (eds.) VLDB 1999, Proceedings of 25th International Conference on Very Large Data Bases, 7\u201310 September 1999, Edinburgh, Scotland, UK, pp. 518\u2013529. Morgan Kaufmann (1999)"},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1049\/iet-bmt.2017.0210","volume":"7","author":"EE Hansley","year":"2018","unstructured":"Hansley, E.E., Segundo, M.P., Sarkar, S.: Employing fusion of learned and handcrafted features for unconstrained ear recognition. IET Biometrics 7(3), 215\u2013223 (2018)","journal-title":"IET Biometrics"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: Vitter, J.S. (ed.) Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, Dallas, Texas, USA, 23\u201326 May 1998, pp. 604\u2013613. ACM (1998)","DOI":"10.1145\/276698.276876"},{"key":"6_CR18","unstructured":"ISO\/IEC: Information security, cybersecurity and privacy protection - biometric information protection. https:\/\/std.samr.gov.cn\/gj\/search\/gjDetailed?id=C9A4EB337D5D197FF0DE218C1ADBE692"},{"issue":"11","key":"6_CR19","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"A Jin","year":"2004","unstructured":"Jin, A., Ling, D., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245\u20132255 (2004)","journal-title":"Pattern Recogn."},{"issue":"2","key":"6_CR20","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2017","unstructured":"Jin, Z., Hwang, J.Y., Lai, Y.L., Kim, S., Teoh, A.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393\u2013407 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"6_CR21","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1109\/TSMC.2015.2499725","volume":"46","author":"Z Jin","year":"2016","unstructured":"Jin, Z., Lim, M., Teoh, A., Goi, B., Tay, Y.H.: Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans. Syst. Man Cybern. Syst. 46(10), 1415\u20131428 (2016)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"3","key":"6_CR22","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.patcog.2011.06.005","volume":"45","author":"A Kumar","year":"2012","unstructured":"Kumar, A., Wu, C.: Automated human identification using ear imaging. Pattern Recogn. 45(3), 956\u2013968 (2012)","journal-title":"Pattern Recogn."},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"3170","DOI":"10.1109\/TIFS.2021.3073802","volume":"16","author":"Y Lai","year":"2021","unstructured":"Lai, Y., Jin, Z., Wong, K., Tistarelli, M.: Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans. Inf. Forensics Secur. 16, 3170\u20133185 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"6_CR24","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057\u20131065 (2007)","journal-title":"Pattern Recogn."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Nagar, A., Nandakumar, K., Jain, A.K.: Biometric template transformation: a security analysis. In: Media Forensics and Security II, vol.\u00a07541, pp. 237\u2013251. SPIE (2010)","DOI":"10.1117\/12.839976"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Pillai, J.K., Patel, V.M., Chellappa, R., Ratha, N.K.: Sectored random projections for cancelable iris biometrics. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1838\u20131841. IEEE (2010)","DOI":"10.1109\/ICASSP.2010.5495383"},{"issue":"11","key":"6_CR27","doi-asserted-by":"publisher","first-page":"2972","DOI":"10.1109\/TIFS.2019.2907014","volume":"14","author":"D Sadhya","year":"2019","unstructured":"Sadhya, D., Raman, B.: Generation of cancelable iris templates via randomized bit sampling. IEEE Trans. Inf. Forensics Secur. 14(11), 2972\u20132986 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric encryption using image processing. In: Optical Security and Counterfeit Deterrence Techniques II, vol.\u00a03314, pp. 178\u2013188. SPIE (1998)","DOI":"10.1117\/12.304705"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Teoh, A.B.J., Yuang, C.T.: Cancelable biometrics realization with multispace random projections. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 37(5), 1096\u20131106 (2007)","DOI":"10.1109\/TSMCB.2007.903538"},{"issue":"6","key":"6_CR30","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1016\/j.patcog.2007.12.002","volume":"41","author":"AB Teoh","year":"2008","unstructured":"Teoh, A.B., Kuan, Y.W., Lee, S.: Cancellable biometrics and annotations on biohash. Pattern Recogn. 41(6), 2034\u20132044 (2008)","journal-title":"Pattern Recogn."},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Wang, Y., Plataniotis, K.N.: An analysis of random projection for changeable and privacy-preserving biometric verification. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 40(5), 1280\u20131293 (2010)","DOI":"10.1109\/TSMCB.2009.2037131"},{"key":"6_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102750","volume":"118","author":"L Yu","year":"2022","unstructured":"Yu, L., Wang, Q., Wo, Y., Han, G.: Secure biometric hashing against relation-based attacks via maximizing min-entropy. Comput. Secur. 118, 102750 (2022)","journal-title":"Comput. Secur."},{"key":"6_CR33","doi-asserted-by":"publisher","unstructured":"Yu, L., Wo, Y.: A general framework for secure biometric hashing against reconstruction attacks. Appl. Intell. 53(10), 12811\u201312830 (2023). https:\/\/doi.org\/10.1007\/S10489-022-04153-4","DOI":"10.1007\/S10489-022-04153-4"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, R., Shen, P., Lv, K., Chen, C.: One-factor cancelable biometric template protection scheme for real-valued features. In: Pattern Recognition, pp. 98\u2013115. Springer, Cham (2025)","DOI":"10.1007\/978-3-031-78110-0_7"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95767-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:25:15Z","timestamp":1750335915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95767-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957666","9783031957673"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95767-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}