{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:19:18Z","timestamp":1725538758886},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642317231"},{"type":"electronic","value":"9783642317248"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31724-8_51","type":"book-chapter","created":{"date-parts":[[2012,7,21]],"date-time":"2012-07-21T15:32:34Z","timestamp":1342884754000},"page":"490-498","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Aware Database System for Retrieving Facial Images"],"prefix":"10.1007","author":[{"given":"Tomohiko","family":"Fujita","sequence":"first","affiliation":[]},{"given":"Takuya","family":"Funatomi","sequence":"additional","affiliation":[]},{"given":"Yoshitaka","family":"Morimura","sequence":"additional","affiliation":[]},{"given":"Michihiko","family":"Minoh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"51_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A. Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptography\u00a038(2), 237\u2013257 (2006)","journal-title":"Des. Codes Cryptography"},{"key":"51_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11527923_45","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical Biometric Authentication with Template Protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.\u00a03546, pp. 436\u2013446. Springer, Heidelberg (2005)"},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"Chen, C., Veldhuis, R.N.J.: Multi-Bits Biometric String Generation based on the Likelihood Ratio. In: IEEE Conference on Biometrics: Theory, Applications and Systems, pp. 27\u201329 (September 2007)","DOI":"10.1109\/BTAS.2007.4401912"},{"key":"51_CR4","unstructured":"Eastlake, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1) RFC3174 Cisco Systems (September 2008)"},{"key":"51_CR5","unstructured":"Announcing the Advanced Encryption Standard Federal Information Processing Standards Publication 197 (November 26, 2001)"},{"issue":"1","key":"51_CR6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/TSMCA.2007.909557","volume":"38","author":"W. Gao","year":"2008","unstructured":"Gao, W., Cao, B., Shan, S., Chen, X., Zhou, D., Zhang, X., Zhao, D.: The CAS-PEAL Large-Scale Chinese Face Database and Baseline Evaluations. IEEE Trans. on System Man, and Cybernetics (Part A)\u00a038(1), 149\u2013161 (2008)","journal-title":"IEEE Trans. on System Man, and Cybernetics (Part A)"}],"container-title":["Communications in Computer and Information Science","Advances in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31724-8_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:46:15Z","timestamp":1620128775000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31724-8_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642317231","9783642317248"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31724-8_51","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}