{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T02:48:48Z","timestamp":1768358928951,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556786","type":"print"},{"value":"9789819556793","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5679-3_26","type":"book-chapter","created":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T18:37:02Z","timestamp":1768329422000},"page":"373-386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and\u00a0Scalable Face Retrieval via\u00a0Cancelable Product Quantization"],"prefix":"10.1007","author":[{"given":"Haomiao","family":"Tang","sequence":"first","affiliation":[]},{"given":"Wenjie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yixiang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Genping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shu-Tao","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,14]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Boddeti, V.N.: Secure face matching using fully homomorphic encryption. In: International Conference on Biometrics: Theory, Applications and Systems, pp. 1\u201310 (2018)","DOI":"10.1109\/BTAS.2018.8698601"},{"key":"26_CR3","doi-asserted-by":"publisher","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00482","DOI":"10.1109\/CVPR.2019.00482"},{"issue":"3","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3442198","volume":"17","author":"X Dong","year":"2021","unstructured":"Dong, X., Kim, S., Jin, Z., Hwang, J.Y., Cho, S., Teoh, A.B.J.: Secure chaff-less fuzzy vault for face identification systems. ACM Trans. Multimed. Comput. Commun. Appl. 17(3), 1\u201322 (2021)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"issue":"3","key":"26_CR5","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/TBIOM.2021.3139866","volume":"4","author":"JJ Engelsma","year":"2022","unstructured":"Engelsma, J.J., Jain, A.K., Boddeti, V.N.: HERS: homomorphically encrypted representation search. IEEE Trans. Biometrics Behav. Identity Sci. 4(3), 349\u2013360 (2022)","journal-title":"IEEE Trans. Biometrics Behav. Identity Sci."},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","volume":"5672","author":"Z Erkin","year":"2009","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, R.L., Toft, T.: Privacy-preserving face recognition. Priv. Enhancing Technol. 5672, 235\u2013253 (2009)","journal-title":"Priv. Enhancing Technol."},{"key":"26_CR7","unstructured":"Feng, Y., Wang, J., Xu, Z.: Fingerprint template protection based on homomorphic encryption and discrete wavelet transform. Secur. Commun. Netw. 2019 (2019)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1109\/TIFS.2022.3228494","volume":"18","author":"VK Hahn","year":"2022","unstructured":"Hahn, V.K., Marcel, S.: Biometric template protection for neural-network-based face recognition systems: a survey of methods and evaluation techniques. IEEE Trans. Inf. Forensics Secur. 18, 639\u2013666 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"26_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TBIOM.2022.3140472","volume":"4","author":"VK Hahn","year":"2022","unstructured":"Hahn, V.K., Marcel, S.: Towards protecting face embeddings in mobile face verification scenarios. IEEE Trans. Biometrics Behav. Identity Sci. 4(1), 117\u2013134 (2022)","journal-title":"IEEE Trans. Biometrics Behav. Identity Sci."},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., Perez-Cruz, F.: Deep models under the Gan: information leakage from collaborative deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 603\u2013618 (2017)","DOI":"10.1145\/3133956.3134012"},{"issue":"4","key":"26_CR12","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1090\/S0273-0979-06-01126-8","volume":"43","author":"S Hoory","year":"2006","unstructured":"Hoory, S., Linial, N.: Expander graphs and their applications. Bull. Am. Math. Soc. 43(4), 439\u2013562 (2006). https:\/\/doi.org\/10.1090\/S0273-0979-06-01126-8","journal-title":"Bull. Am. Math. Soc."},{"key":"26_CR13","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report, University of Massachusetts Amherst (2007)"},{"issue":"2","key":"26_CR14","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2017","unstructured":"Jin, Z., Hwang, J.Y., Lai, Y.L., Kim, S., Teoh, A.B.J.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393\u2013407 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"26_CR15","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory, p.\u00a0408. IEEE (2002)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: Fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS), pp. 28\u201336. ACM (1999)","DOI":"10.1145\/319709.319714"},{"key":"26_CR17","doi-asserted-by":"publisher","unstructured":"Kemelmacher-Shlizerman, I., Seitz, S.M., Miller, D., Brossard, E.: The MegaFace benchmark: 1 million faces for recognition at scale. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4873\u20134882 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.527","DOI":"10.1109\/CVPR.2016.527"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Lee, H., Low, C.Y., Teoh, A.B.J.: SoftmaxOut transformation-permutation network for facial template protection. In: Proceedings of the 25th International Conference on Pattern Recognition (ICPR), pp. 7558\u20137565 (2021)","DOI":"10.1109\/ICPR48806.2021.9413163"},{"issue":"11","key":"26_CR19","first-page":"7801","volume":"44","author":"H Li","year":"2021","unstructured":"Li, H., Deng, W., Tao, D.: Deep template protection: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 44(11), 7801\u20137821 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"26_CR20","unstructured":"Li, Y., Ma, J., Miao, Y., Wang, Y., Liu, X., Choo, K.K.R.: Similarity search for encrypted images in secure cloud computing. IEEE Trans. Cloud Comput. (2020)"},{"key":"26_CR21","unstructured":"Liu, Y., Shen, Y., Zhang, Y., Zhu, T., Xiong, N., Wang, S.: Privacy-preserving federated image retrieval with hybrid indexing. In: Proceedings of the 30th ACM International Conference on Information and Knowledge Management (CIKM), pp. 2909\u20132918 (2021)"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling search over encrypted multimedia databases. In: Media Forensics and Security, vol.\u00a07254, p. 725418. International Society for Optics and Photonics (2009)","DOI":"10.1117\/12.806980"},{"issue":"5","key":"26_CR23","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TPAMI.2018.2827389","volume":"41","author":"G Mai","year":"2018","unstructured":"Mai, G., Cao, K., Yuen, P.C., Jain, A.K.: On the reconstruction of face images from deep face templates. IEEE Trans. Pattern Anal. Mach. Intell. 41(5), 1188\u20131202 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, 2nd edn. Springer (2009)","DOI":"10.1007\/978-1-84882-254-2"},{"key":"26_CR25","unstructured":"National Institute of Standards and Technology: advanced encryption standard (AES). Technical report. FIPS PUB 197, U.S. Department of Commerce, Gaithersburg, MD, November 2001. https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.197.pdf. Federal Information Processing Standards Publication"},{"issue":"3","key":"26_CR26","first-page":"1","volume":"19","author":"M Osadchy","year":"2017","unstructured":"Osadchy, M., Nissim, K., Pinkas, B., Weinreb, A.: CNN-based learning for secure image retrieval. ACM Trans. Inf. Syst. Secur. (TISSEC) 19(3), 1\u201331 (2017)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"26_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"26_CR28","unstructured":"Pandey, G., Dantcheva, A.: Secure face template generation via adversarial training. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 4473\u20134477. IEEE (2016)"},{"issue":"2","key":"26_CR29","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/TBIOM.2020.3046620","volume":"3","author":"JR Pinto","year":"2021","unstructured":"Pinto, J.R., Correia, M.V., Cardoso, J.S.: Secure triplet loss: achieving cancelability and non-linkability in end-to-end deep biometrics. IEEE Trans. Biometrics Behav. Identity Sci. 3(2), 180\u2013189 (2021)","journal-title":"IEEE Trans. Biometrics Behav. Identity Sci."},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Pitroda, A., Seher, I., Elchouemi, A.: Privacy-preserving content-based image retrieval in the cloud: a review. In: Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, pp. 405\u2013422. Springer (2023)","DOI":"10.1007\/978-3-031-71773-4_25"},{"issue":"4","key":"26_CR31","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561\u2013572 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Song, F., Qin, Z., Zhang, J., Liu, D., Liang, J., Shen, X.S.: Efficient and privacy-preserving outsourced image retrieval in public clouds. In: GLOBECOM 2020-IEEE Global Communications Conference, pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/GLOBECOM42002.2020.9322134"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Tang, Z., Fan, H., Gu, X., Li, Y., Li, B., Wang, X.: ELSEIR: a privacy-preserving large-scale image retrieval framework for outsourced data sharing. In: Proceedings of the 2024 International Conference on Multimedia Retrieval, pp. 488\u2013496 (2024)","DOI":"10.1145\/3652583.3658099"},{"issue":"12","key":"26_CR34","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","volume":"28","author":"AB Teoh","year":"2006","unstructured":"Teoh, A.B., Goh, A., Ngo, D.C.: Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892\u20131901 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"26_CR35","unstructured":"Xu, J., Ren, K., Yu, W., Wang, S.: Privacy-preserving image retrieval based on adversarial hash learning. In: IEEE INFOCOM 2020, pp. 748\u2013757. IEEE (2020)"},{"key":"26_CR36","unstructured":"Zhang, Y., Liu, W., Sun, H., Li, X.: Privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Serv. Comput. 11, 803\u2013816 (2018)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5679-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T18:37:05Z","timestamp":1768329425000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5679-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556786","9789819556793"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5679-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"14 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}