{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T09:35:52Z","timestamp":1767864952417,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642193750","type":"print"},{"value":"9783642193767","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19376-7_7","type":"book-chapter","created":{"date-parts":[[2011,2,17]],"date-time":"2011-02-17T06:46:54Z","timestamp":1297925214000},"page":"78-87","source":"Crossref","is-referenced-by-count":5,"title":["Cancellable Face Biometrics System by Combining Independent Component Analysis Coefficients"],"prefix":"10.1007","author":[{"given":"MinYi","family":"Jeong","sequence":"first","affiliation":[]},{"given":"Andrew Beng Jin","family":"Teoh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/2.820038","volume":"33","author":"A. Pankanti","year":"2000","unstructured":"Pankanti, A., Bolle, R.M., Jain, A.K.: Biometrics: the future of identification. IEEE Computer\u00a033(2), 46\u201349 (2000)","journal-title":"IEEE Computer"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal\u00a040(3) (2001)","DOI":"10.1147\/sj.403.0614"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"2727","DOI":"10.1016\/S0031-3203(01)00247-3","volume":"35","author":"R.M. Bolle","year":"2002","unstructured":"Bolle, R.M., Connel, J.H., Ratha, N.K.: Biometrics Perils and Patches. Pattern Recognition\u00a035, 2727\u20132738 (2002)","journal-title":"Pattern Recognition"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through off-line biometric identification. In: Proc. of IEEE Symposium on Security and Privacy, September 4, pp. 148\u2013157 (2006)","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Jeong, M.Y., Lee, C., Kim, J., Choi, J.Y., Toh, K.A., Kim, J.: Cancelable Biometrics for Appearance based Face Recognition. In: Proc. of Biometrics Consortium Conference (September 2006)","DOI":"10.1109\/BCC.2006.4341629"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Savvides, M., Vijaya Kumar, B.V.K., Khosla, P.K.: Cancelable Biometric Filters for Face Recognition. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), vol.\u00a03, pp. 922\u2013925 (2004)","DOI":"10.1109\/ICPR.2004.1334679"},{"issue":"10","key":"7_CR7","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1016\/j.patrec.2004.11.021","volume":"26","author":"A.B.J. Teoh","year":"2005","unstructured":"Teoh, A.B.J., Ngo, D.C.L.: Cancellable biometrics featuring with tokenized random number. Pattern Recognition Letter\u00a026(10), 1454\u20131460 (2005)","journal-title":"Pattern Recognition Letter"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/11569947_9","volume-title":"Advances in Biometric Person Authentication","author":"J. Kang","year":"2005","unstructured":"Kang, J., Nyang, D., Lee, K.: Two Factor Face Authentication Scheme with Cancelable Feature. In: Li, S.Z., Sun, Z., Tan, T., Pankanti, S., Chollet, G., Zhang, D. (eds.) IWBRS 2005. LNCS, vol.\u00a03781, pp. 67\u201376. Springer, Heidelberg (2005)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Jeong, M.Y., Lee, C., Choi, J.Y., Kim, J.: Changeable Biometrics for PCA based Face recognition. In: IEEK Summer Conference, vol.\u00a029(1), pp. 331\u2013332 (2006)","DOI":"10.1109\/BCC.2006.4341629"},{"key":"7_CR10","unstructured":"Boult, T.: Robust Distance Measures for Face-recognition supporting revocable biometrics token. In: 7th International Conference Automatic Face and Gesture Recognition, Southampton, UK, April 10-12 (2007)"},{"key":"7_CR11","unstructured":"Jeong, M.Y., Kim, J.: A Study of Generation for Changeable Face Template. In: IEEK Summer Conference, vol.\u00a030(1), pp. 391\u2013392 (2007)"},{"issue":"6","key":"7_CR12","first-page":"16","volume":"44-SP","author":"M.Y. Jeong","year":"2007","unstructured":"Jeong, M.Y., Lee, C., Choi, J.Y., Kim, J.: Generation of Changeable Face Template by Combining Independent Component Analysis Coefficients. Journal of IEEK\u00a044-SP(6), 16\u201323 (2007)","journal-title":"Journal of IEEK"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Jeong, M.Y., Choi, J.Y., Kim, J.: Using Genetic Algorithms to Improve Matching Performance of Changeable biometrics from Combining PCA and ICA Methods. In: Computer Vision and Pattern Recognition (CVPR) (June 2007)","DOI":"10.1109\/CVPR.2007.383384"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"1450","DOI":"10.1109\/TNN.2002.804287","volume":"13","author":"M.S. Bartlett","year":"2002","unstructured":"Bartlett, M.S., Movellan, J.R., Sejnowski, T.J.: Face Recognition by Independent Component Analysis. IEEE Trans. Neural Networks\u00a013, 1450\u20131464 (2002)","journal-title":"IEEE Trans. Neural Networks"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1007\/3-540-44887-X_97","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"K. Bae","year":"2003","unstructured":"Bae, K., Noh, S., Kim, J.: Iris Feature Extraction Using Independent Component Analysis. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 838\u2013844. Springer, Heidelberg (2003)"},{"key":"7_CR16","unstructured":"Martinez, A.M., Benavente, R.: The AR Face Database. CVC Technical Report #24 (1998)"}],"container-title":["Lecture Notes in Computer Science","Computational Forensics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19376-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T17:49:58Z","timestamp":1740937798000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19376-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642193750","9783642193767"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19376-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}