{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:57:30Z","timestamp":1760245050595,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_2","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T10:40:06Z","timestamp":1496313606000},"page":"19-33","source":"Crossref","is-referenced-by-count":5,"title":["GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation"],"prefix":"10.1007","author":[{"given":"Margarita","family":"Osadchy","sequence":"first","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Orr","family":"Dunkelman","sequence":"additional","affiliation":[]},{"given":"Stuart","family":"Gibson","sequence":"additional","affiliation":[]},{"given":"Julio","family":"Hernandez-Castro","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Solomon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"issue":"7","key":"2_CR1","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"PN Belhumeur","year":"1997","unstructured":"Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19(7), 711\u2013720 (1997)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Blanz, V., Vetter, T.: A morphable model for the synthesis of 3D faces. In: Proceedings of the 26th Annual Conference on Computer Graphics and Interactive Techniques, pp. 187\u2013194. ACM Press\/Addison-Wesley Publishing Co. (1999)","DOI":"10.1145\/311535.311556"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Favre, M., Patey, A., Schneider, T., Zohner, M.: GSHADE: faster privacy-preserving distance computation and biometric identification. In: Unterweger, A., Uhl, A., Katzenbeisser, S., Kwitt, R., Piva, A. (eds.) ACM Information Hiding and Multimedia Security Workshop, IH&MMSec 2014, Salzburg, Austria, June 11\u201313, 2014, pp. 187\u2013198. ACM (2014)","DOI":"10.1145\/2600918.2600922"},{"key":"2_CR4","unstructured":"Cappelli, R., Maio, D., Maltoni, D.: SFinGe: an approach to synthetic fingerprint generation. In: International Workshop on Biometric Technologies, pp. 147\u2013154 (2004)"},{"key":"2_CR5","unstructured":"Chang, Y., Zhang, W., Chen, T.: Biometrics-based cryptographic key generation. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 2203\u20132206 (2004)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Chen, C., Veldhuis, R., Kevenaar, T., Akkermans, A.: Biometric binary string generation with detection rate optimized bit allocation. In: CVPR Workshop on Biometrics, pp. 1\u20137 (2008)","DOI":"10.1109\/CVPRW.2008.4563112"},{"issue":"6","key":"2_CR7","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/34.927467","volume":"23","author":"TF Cootes","year":"2001","unstructured":"Cootes, T.F., Edwards, G.J., Taylor, C.J.: Active appearance models. IEEE Trans. Pattern Anal. Mach. Intell. 23(6), 681\u2013685 (2001)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2_CR8","unstructured":"Dezert, J., Musso, C.: An efficient method for generating points uniformly distributed in hyperellipsoids. In: The Workshop on Estimation, Tracking and Fusion: A Tribute to Yaakov Bar-Shalom (2001)"},{"issue":"1","key":"2_CR9","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.D.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"2_CR10","unstructured":"Dunkelman, O., Osadchy, M., Sharif, M.: Secure authentication from facial attributes with no privacy loss. In: Sadeghi, A., Gligor, V.D., Yung, M. (eds.) 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, November 4\u20138, 2013, pp. 1403\u20131406. ACM (2013)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/BFb0054766","volume-title":"Computer Vision \u2014 ECCV\u201998","author":"GJ Edwards","year":"1998","unstructured":"Edwards, G.J., Cootes, T.F., Taylor, C.J.: Face recognition using active appearance models. In: Burkhardt, H., Neumann, B. (eds.) ECCV 1998. LNCS, vol. 1407, pp. 581\u2013595. Springer, Heidelberg (1998). doi:\n10.1007\/BFb0054766"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Gibson, S.J., Solomon, C.J., Bejarano, A.P.: Synthesis of photographic quality facial composites using evolutionary algorithms. In: Proceedings on British Machine Vision Conference, BMVC 2003, Norwich, UK, pp. 1\u201310, September 2003 (2003)","DOI":"10.5244\/C.17.23"},{"issue":"1","key":"2_CR13","doi-asserted-by":"crossref","first-page":"170","DOI":"10.3758\/BF03206412","volume":"37","author":"SJ Gibson","year":"2005","unstructured":"Gibson, S.J., Solomon, C.J., Pallares-Bejarano, A.: Nonlinear, near photo-realisticcaricatures using a parametric facial appearance model. Behav. Res. Methods 37(1), 170\u2013181 (2005). \nhttp:\/\/dx.doi.org\/10.3758\/BF03206412","journal-title":"Behav. Res. Methods"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Motiwalla, J., Tsudik, G. (eds.) CCS 1999, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1\u20134, 1999, pp. 28\u201336. ACM (1999)","DOI":"10.1145\/319709.319714"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23\u201328, 2014, pp. 1867\u20131874 (2014)","DOI":"10.1109\/CVPR.2014.241"},{"issue":"5","key":"2_CR16","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1111\/1467-9280.00274","volume":"11","author":"K Lee","year":"2000","unstructured":"Lee, K., Byatt, G., Rhodes, G.: Caricature effects, distinctiveness, and identification: testing the face-space framework. Psychol. Sci. 11(5), 379\u2013385 (2000)","journal-title":"Psychol. Sci."},{"issue":"1","key":"2_CR17","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/13506280344000194","volume":"11","author":"M Lewis","year":"2004","unstructured":"Lewis, M.: Face-space-R: towards a unified account of face recognition. Vis. Cogn. 11(1), 29\u201369 (2004)","journal-title":"Vis. Cogn."},{"key":"2_CR18","unstructured":"Li, M., Zuo, W., Zhang, D.: Convolutional network for attribute-driven and identity-preserving human face generation. arXiv preprint \narXiv:1608.06434\n\n (2016)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-319-46454-1_35","volume-title":"Computer Vision \u2013 ECCV 2016","author":"I Masi","year":"2016","unstructured":"Masi, I., Tran, A.T., Hassner, T., Leksut, J.T., Medioni, G.: Do we really need to collect millions of faces for effective face recognition? In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9909, pp. 579\u2013596. Springer, Cham (2016). doi:\n10.1007\/978-3-319-46454-1_35"},{"issue":"2","key":"2_CR20","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1023\/B:VISI.0000029666.37597.d3","volume":"60","author":"I Matthews","year":"2004","unstructured":"Matthews, I., Baker, S.: Active appearance models revisited. Int. J. Comput. Vis. 60(2), 135\u2013164 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-85363-3_42","volume-title":"Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques","author":"H Narayanan","year":"2008","unstructured":"Narayanan, H., Niyogi, P.: Sampling hypersurfaces through diffusion. In: Goel, A., Jansen, K., Rolim, J.D.P., Rubinfeld, R. (eds.) APPROX\/RANDOM -2008. LNCS, vol. 5171, pp. 535\u2013548. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-85363-3_42"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Paysan, P., Knothe, R., Amberg, B., Romdhani, S., Vetter, T.: A 3D face model for pose and illumination invariant face recognition. In: Tubaro, S., Dugelay, J. (eds.) Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, 2\u20134 September 2009, Genova, Italy, pp. 296\u2013301. IEEE Computer Society (2009).,","DOI":"10.1109\/AVSS.2009.58"},{"issue":"7","key":"2_CR23","doi-asserted-by":"crossref","first-page":"3298","DOI":"10.1016\/j.asoc.2013.02.010","volume":"13","author":"CJ Solomon","year":"2013","unstructured":"Solomon, C.J., Gibson, S.J., Mist, J.J.: Interactive evolutionary generation of facial composites for locating suspects in criminal investigations. Appl. Soft Comput. 13(7), 3298\u20133306 (2013)","journal-title":"Appl. Soft Comput."},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/11608288_79","volume-title":"Advances in Biometrics","author":"K Sumi","year":"2005","unstructured":"Sumi, K., Liu, C., Matsuyama, T.: Study on synthetic face database for performance evaluation. In: Zhang, D., Jain, A.K. (eds.) ICB 2006. LNCS, vol. 3832, pp. 598\u2013604. Springer, Heidelberg (2005). doi:\n10.1007\/11608288_79"},{"issue":"1","key":"2_CR25","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71\u201386 (1991)","journal-title":"J. Cogn. Neurosci."},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11527923_45","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"P Tuyls","year":"2005","unstructured":"Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436\u2013446. Springer, Heidelberg (2005). doi:\n10.1007\/11527923_45"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Tzimiropoulos, G., Pantic, M.: Optimization problems for fast AAM fitting in-the-wild. In: IEEE International Conference on Computer Vision, ICCV, pp. 593\u2013600 (2013)","DOI":"10.1109\/ICCV.2013.79"},{"issue":"2","key":"2_CR28","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1080\/14640749108400966","volume":"43","author":"T Valentine","year":"1991","unstructured":"Valentine, T.: A unified account of the effects of distinctiveness, inversion, and race in face recognition. Q. J. Exp. Psychol. 43(2), 161\u2013204 (1991)","journal-title":"Q. J. Exp. Psychol."},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Wu, H., Liu, X., Doretto, G.: Face alignment via boosted ranking model. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 24\u201326 June 2008, Anchorage, Alaska, USA (2008)","DOI":"10.1109\/CVPR.2008.4587753"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, L., Lin, L., Wu, X., Ding, S., Zhang, L.: End-to-end photo-sketch generation via fully convolutional representation learning. In: Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, pp. 627\u2013634. ACM (2015)","DOI":"10.1145\/2671188.2749321"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T10:40:43Z","timestamp":1496313643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}