{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T19:49:37Z","timestamp":1777060177931,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819973552","type":"print"},{"value":"9789819973569","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7356-9_20","type":"book-chapter","created":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T09:03:24Z","timestamp":1697706204000},"page":"333-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["CryptoMask: Privacy-Preserving Face Recognition"],"prefix":"10.1007","author":[{"given":"Jianli","family":"Bai","sequence":"first","affiliation":[]},{"given":"Xiaowu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiangfu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Qifan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shujie","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,20]]},"reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. (Csur) 51(4), 1\u201335 (2018)","journal-title":"ACM Comput. Surv. (Csur)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-46766-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"D Beaver","year":"1992","unstructured":"Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420\u2013432. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_34"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Boddeti, V.N.: Secure face matching using fully homomorphic encryption. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u201310. IEEE (2018)","DOI":"10.1109\/BTAS.2018.8698601"},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/MTAS.2004.1273467","volume":"23","author":"KW Bowyer","year":"2004","unstructured":"Bowyer, K.W.: Face recognition technology: security versus privacy. IEEE Technol. Soc. Mag. 23(1), 9\u201319 (2004)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/978-3-030-78372-3_18","volume-title":"Applied Cryptography and Network Security","author":"H Chen","year":"2021","unstructured":"Chen, H., Dai, W., Kim, M., Song, Y.: Efficient homomorphic conversion between (Ring) LWE ciphertexts. In: Sako, K., Tippenhauer, N.O. (eds.) ACNS 2021. LNCS, vol. 12726, pp. 460\u2013479. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78372-3_18"},{"key":"20_CR6","unstructured":"Cherepanova, V., et al.: Lowkey: leveraging adversarial attacks to protect social media users from facial recognition. arXiv preprint arXiv:2101.07922 (2021)"},{"issue":"3","key":"20_CR7","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/0146-664X(80)90054-4","volume":"14","author":"PE Danielsson","year":"1980","unstructured":"Danielsson, P.E.: Euclidean distance mapping. Comput. Gr. Image Process. 14(3), 227\u2013248 (1980)","journal-title":"Comput. Gr. Image Process."},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., Zohner, M.: Aby-a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23113"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Engelsma, J.J., Jain, A.K., Boddeti, V.N.: Hers: Homomorphically encrypted representation search. IEEE Trans. Biom. Behav. Identity Sci. (2022). https:\/\/github.com\/human-analysis\/secure-face-matching","DOI":"10.1109\/TBIOM.2021.3139866"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","volume-title":"Privacy Enhancing Technologies","author":"Z Erkin","year":"2009","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235\u2013253. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03168-7_14"},{"key":"20_CR11","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"4","key":"20_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/85.969965","volume":"23","author":"T Haigh","year":"2001","unstructured":"Haigh, T.: The chromium-plated tabulator: institutionalizing an electronic revolution, 1954\u20131958. IEEE Ann. History Comput. 23(4), 75\u2013104 (2001)","journal-title":"IEEE Ann. History Comput."},{"issue":"10","key":"20_CR14","doi-asserted-by":"publisher","first-page":"2448","DOI":"10.1109\/TIFS.2018.2819128","volume":"13","author":"S Hu","year":"2018","unstructured":"Hu, S., Li, M., Wang, Q., Chow, S.S., Du, M.: Outsourced biometric identification with privacy. IEEE Trans. Inf. Forensics Secur. 13(10), 2448\u20132463 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR15","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Workshop on faces in Real-Life Images: Detection, Alignment, and Recognition (2008)"},{"key":"20_CR16","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report 07\u201349, University of Massachusetts, Amherst, October 2007"},{"key":"20_CR17","unstructured":"Huang, Z., Lu, W.j., Hong, C., Ding, J.: Cheetah: lean and fast secure two-party deep neural network inference. IACR Cryptol. ePrint Arch. 2022, 207 (2022). https:\/\/github.com\/Alibaba-Gemini-Lab\/OpenCheetah"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-45146-4_9","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145\u2013161. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_9"},{"issue":"2","key":"20_CR19","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2017","unstructured":"Jin, Z., Hwang, J.Y., Lai, Y.L., Kim, S., Teoh, A.B.J.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393\u2013407 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/978-3-030-92078-4_21","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"A Kim","year":"2021","unstructured":"Kim, A., Polyakov, Y., Zucca, V.: Revisiting homomorphic encryption schemes for finite fields. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13092, pp. 608\u2013639. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92078-4_21"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Lee, Y.J., Park, K.R., Lee, S.J., Bae, K., Kim, J.: A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 38(5), 1302\u20131313 (2008)","DOI":"10.1109\/TSMCB.2008.927261"},{"key":"20_CR22","unstructured":"Parmar, D.N., Mehta, B.B.: Face recognition methods & applications. arXiv preprint arXiv:1403.0485 (2014)"},{"issue":"5","key":"20_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2015.2434151","volume":"32","author":"VM Patel","year":"2015","unstructured":"Patel, V.M., Ratha, N.K., Chellappa, R.: Cancelable biometrics: a review. IEEE Signal Process. Mag. 32(5), 54\u201365 (2015)","journal-title":"IEEE Signal Process. Mag."},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Pradel, G., Mitchell, C.: Privacy-preserving biometric matching using homomorphic encryption. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 494\u2013505. IEEE (2021)","DOI":"10.1109\/TrustCom53373.2021.00079"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Rao, Y.S., Sukonkina, Y., Bhagwati, C., Singh, U.K.: Fingerprint based authentication application using visual cryptography methods (improved id card). In: TENCON 2008\u20132008 IEEE Region 10 Conference, pp. 1\u20135. IEEE (2008)","DOI":"10.1109\/TENCON.2008.4766425"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Rathee, D., et al.: Cryptflow2: practical 2-party secure inference. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 325\u2013342 (2020)","DOI":"10.1145\/3372297.3417274"},{"issue":"11","key":"20_CR27","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L., et al.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secure Comput."},{"issue":"1","key":"20_CR28","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/TIFS.2010.2097252","volume":"6","author":"A Ross","year":"2010","unstructured":"Ross, A., Othman, A.: Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70\u201381 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"20_CR30","unstructured":"Microsoft SEAL (release 3.7), September 2021, Microsoft Research, Redmond, WA. https:\/\/github.com\/Microsoft\/SEAL"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Shashank, J., Kowshik, P., Srinathan, K., Jawahar, C.: Private content based image retrieval. In: 2008 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20138. IEEE (2008)","DOI":"10.1109\/CVPR.2008.4587388"},{"issue":"4","key":"20_CR32","first-page":"35","volume":"24","author":"A Singhal","year":"2001","unstructured":"Singhal, A., et al.: Modern information retrieval: a brief overview. IEEE Data Eng. Bull. 24(4), 35\u201343 (2001)","journal-title":"IEEE Data Eng. Bull."},{"issue":"1","key":"20_CR33","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10623-012-9720-4","volume":"71","author":"NP Smart","year":"2014","unstructured":"Smart, N.P., Vercauteren, F.: Fully homomorphic SIMD operations. Des. Codes Crypt. 71(1), 57\u201381 (2014)","journal-title":"Des. Codes Crypt."},{"issue":"7","key":"20_CR34","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1109\/TIFS.2013.2262273","volume":"8","author":"JR Troncoso-Pastoriza","year":"2013","unstructured":"Troncoso-Pastoriza, J.R., Gonz\u00e1lez-Jim\u00e9nez, D., P\u00e9rez-Gonz\u00e1lez, F.: Fully private noninteractive face verification. IEEE Trans. Inf. Forensics Secur. 8(7), 1101\u20131114 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/11527923_32","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"U Uludag","year":"2005","unstructured":"Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310\u2013319. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11527923_32"},{"key":"20_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1007\/978-3-642-01793-3_91","volume-title":"Advances in Biometrics","author":"M Upmanyu","year":"2009","unstructured":"Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.V.: Efficient biometric verification in encrypted domain. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 899\u2013908. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01793-3_91"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.: Efficient privacy preserving video surveillance. In: 2009 IEEE 12th International Conference on Computer Vision, pp. 1639\u20131646. IEEE (2009)","DOI":"10.1109\/ICCV.2009.5459370"},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp. 162\u2013167. IEEE (1986)","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7356-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:19:19Z","timestamp":1730344759000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7356-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819973552","9789819973569"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7356-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icics23.nankai.edu.cn\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"181","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.33","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.93","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}