{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:06:16Z","timestamp":1762430776079},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642402456"},{"type":"electronic","value":"9783642402463"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40246-3_55","type":"book-chapter","created":{"date-parts":[[2013,8,17]],"date-time":"2013-08-17T00:31:00Z","timestamp":1376699460000},"page":"440-448","source":"Crossref","is-referenced-by-count":86,"title":["Identification Using Encrypted Biometrics"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Haghighat","sequence":"first","affiliation":[]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Abdel-Mottaleb","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"55_CR1","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1162\/089976600300014980","volume":"12","author":"G. Baudat","year":"2000","unstructured":"Baudat, G., Anouar, F.: Generalized discriminant analysis using a kernel approach. Neural Computation\u00a012(10), 2385\u20132404 (2000)","journal-title":"Neural Computation"},{"key":"55_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, pp. 535\u2013554. Springer, Heidelberg (2007)"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Kindarji, B.: Error-tolerant searchable encryption. In: IEEE International Conference on Communications, ICC 2009, pp. 1\u20136 (2009)","DOI":"10.1109\/ICC.2009.5199004"},{"issue":"11","key":"55_CR4","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J.G. Daugman","year":"1993","unstructured":"Daugman, J.G.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a015(11), 1148\u20131161 (1993)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"55_CR5","doi-asserted-by":"crossref","unstructured":"Haghighat, M.B.A., Namjoo, E.: Evaluating the informativity of features in dimensionality reduction methods. In: 2011 5th International Conference on Application of Information and Communication Technologies, AICT, pp. 1\u20135 (October 2011)","DOI":"10.1109\/ICAICT.2011.6110938"},{"issue":"2","key":"55_CR6","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/328236.328110","volume":"43","author":"A. Jain","year":"2000","unstructured":"Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM\u00a043(2), 90\u201398 (2000)","journal-title":"Communications of the ACM"},{"issue":"2","key":"55_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A. Jain","year":"2006","unstructured":"Jain, A., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security\u00a01(2), 125\u2013143 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"55_CR8","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TIP.2002.999679","volume":"11","author":"C. Liu","year":"2002","unstructured":"Liu, C., Wechsler, H.: Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition. IEEE Transactions on Image Processing\u00a011, 467\u2013476 (2002)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"55_CR9","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.compeleceng.2012.12.011","volume":"39","author":"S. Meshgini","year":"2013","unstructured":"Meshgini, S., Aghagolzadeh, A., Seyedarabi, H.: Face recognition using gabor-based direct linear discriminant analysis and support vector machine. Computers & Electrical Engineering\u00a039(3), 727\u2013745 (2013)","journal-title":"Computers & Electrical Engineering"},{"issue":"10","key":"55_CR10","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"P.J. Phillips","year":"2000","unstructured":"Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a022(10), 1090\u20131104 (2000)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"5","key":"55_CR11","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.imavis.2006.05.002","volume":"25","author":"L.L. Shen","year":"2007","unstructured":"Shen, L.L., Bai, L., Fairhurst, M.: Gabor wavelets and general discriminant analysis for face identification and verification. Image and Vision Computing\u00a025(5), 553\u2013563 (2007)","journal-title":"Image and Vision Computing"},{"issue":"2","key":"55_CR12","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P. Viola","year":"2004","unstructured":"Viola, P., Jones, M.J.: Robust real-time face detection. International Journal of Computer Vision\u00a057(2), 137\u2013154 (2004)","journal-title":"International Journal of Computer Vision"}],"container-title":["Lecture Notes in Computer Science","Computer Analysis of Images and Patterns"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40246-3_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T18:16:24Z","timestamp":1558030584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40246-3_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642402456","9783642402463"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40246-3_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}