{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T09:38:23Z","timestamp":1767865103177,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642024771","type":"print"},{"value":"9783642024788","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02478-8_152","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T22:46:41Z","timestamp":1244242001000},"page":"1216-1223","source":"Crossref","is-referenced-by-count":7,"title":["Protecting DCT Templates for a Face Verification System by Means of Pseudo-random Permutations"],"prefix":"10.1007","author":[{"given":"Marco","family":"Grassi","sequence":"first","affiliation":[]},{"given":"Marcos","family":"Faundez-Zanuy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"152_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-30598-9_1","volume-title":"Security in Communication Networks","author":"B. Preneel","year":"2005","unstructured":"Preneel, B.: ECRYPT: The Cryptographic Research Challenges for the Next Decade. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 1\u201315. Springer, Heidelberg (2005)"},{"key":"152_CR2","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. Eurasip journal on Advances in Signal Processing. Special issue on Biometrics, 1\u201320 (January 2008)","DOI":"10.1155\/2008\/579416"},{"issue":"6","key":"152_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MAES.2006.1662038","volume":"21","author":"M. Faundez Zanuy","year":"2006","unstructured":"Faundez Zanuy, M.: Biometric security technology. IEEE Aerospace and Electronic Systems Magazine\u00a021(6), 15\u201326 (2006)","journal-title":"IEEE Aerospace and Electronic Systems Magazine"},{"key":"152_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/3-540-57220-1_80","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A.P.L. Hiltgen","year":"1993","unstructured":"Hiltgen, A.P.L.: Constructions of feebly-one-way families of permutations. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 422\u2013434. Springer, Heidelberg (1993)"},{"key":"152_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-25976-3_15","volume-title":"Biometric Authentication","author":"P. Tuyls","year":"2004","unstructured":"Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol.\u00a03087, pp. 158\u2013170. Springer, Heidelberg (2004)"},{"issue":"4","key":"152_CR6","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"N.K. Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancellable fingerprint templates. IEEE Trans. On Pattern Analysis and Machine Intelligence\u00a029(4), 561\u2013572 (2007)","journal-title":"IEEE Trans. On Pattern Analysis and Machine Intelligence"},{"key":"152_CR7","doi-asserted-by":"crossref","unstructured":"Abate, A.F., Nappi, M., Riccio, D., Sabatino, G.: 2D and 3D Face Recognition: A Survey. Pattern Recognition Letters (December 4, 2006)","DOI":"10.1016\/j.patrec.2006.12.018"},{"key":"152_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/978-3-540-73007-1_85","volume-title":"Computational and Ambient Intelligence","author":"M. Grassi","year":"2007","unstructured":"Grassi, M., Faundez-Zanuy, M.: Face Recognition with Facial Mask Application and Neural Networks. In: Sandoval, F., Prieto, A.G., Cabestany, J., Gra\u00f1a, M. (eds.) IWANN 2007. LNCS, vol.\u00a04507, pp. 709\u2013716. Springer, Heidelberg (2007)"},{"issue":"6","key":"152_CR9","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1109\/TPAMI.2002.1008382","volume":"24","author":"A.M. Martinez","year":"2002","unstructured":"Martinez, A.M.: Recognizing Imprecisely Localized, Partially Occluded, and Expression Variant Faces from a Single Sample per Class. IEEE Transaction On Pattern Analysis and Machine Intelligence\u00a024(6), 748\u2013763 (2002)","journal-title":"IEEE Transaction On Pattern Analysis and Machine Intelligence"},{"key":"152_CR10","doi-asserted-by":"crossref","unstructured":"Martin, A.: The DET curve in assessment of detection task performance. In: European Speech Processing Conference Eurospeech 1997, vol.\u00a04, pp. 1895\u20131898 (1997)","DOI":"10.21437\/Eurospeech.1997-504"},{"key":"152_CR11","unstructured":"Zanuy, M.F.: Face Recognition in a Transformed Domain. In: Proceedings 37th Annual International Carnahan Conference On Security Tecnology, pp. 290\u2013297 (2003)"}],"container-title":["Lecture Notes in Computer Science","Bio-Inspired Systems: Computational and Ambient Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02478-8_152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T14:51:44Z","timestamp":1685026304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02478-8_152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024771","9783642024788"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02478-8_152","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}