{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:24:18Z","timestamp":1770229458497,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819985647","type":"print"},{"value":"9789819985654","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-8565-4_33","type":"book-chapter","created":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T06:03:13Z","timestamp":1701410593000},"page":"350-362","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SP$$^2$$IN: Leveraging Fuzzy Commitment and\u00a0LDPC Sum-Product Decoder for\u00a0Key Generation from\u00a0Face"],"prefix":"10.1007","author":[{"given":"Yafei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ying","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Weiyu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yufang","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Xingbo","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,2]]},"reference":[{"issue":"5","key":"33_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25\u201331 (2004)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"33_CR2","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/0167-4048(92)90207-8","volume":"11","author":"EH Spafford","year":"1992","unstructured":"Spafford, E.H.: OPUS: preventing weak password choices. Comput. Secur. 11(3), 273\u2013278 (1992)","journal-title":"Comput. Secur."},{"key":"33_CR3","series-title":"Signal Processing for Security Technologies","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-319-47301-7_14","volume-title":"Biometric Security and Privacy","author":"M Sandhya","year":"2017","unstructured":"Sandhya, M., Prasad, M.V.N.K.: Biometric template protection: a systematic literature review of approaches and modalities. In: Jiang, R., Al-maadeed, S., Bouridane, A., Crookes, D., Beghdadi, A. (eds.) Biometric Security and Privacy. SPST, pp. 323\u2013370. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-47301-7_14"},{"key":"33_CR4","unstructured":"EuropeanParliament, General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu\/"},{"key":"33_CR5","doi-asserted-by":"publisher","first-page":"3101","DOI":"10.1109\/TDSC.2021.3083970","volume":"19","author":"J Lei","year":"2021","unstructured":"Lei, J., Pei, Q., Wang, Y., Sun, W., Liu, X.: PRIVFACE: fast privacy-preserving face authentication with revocable and reusable biometric credentials. IEEE Trans. Dependable Secur. Comput. 19, 3101\u20133112 (2021)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TDSC.2020.2997558","volume":"19","author":"GS Walia","year":"2020","unstructured":"Walia, G.S., Aggarwal, K., Singh, K., Singh, K.: Design and analysis of adaptive graph based cancelable multi-biometrics approach. IEEE Trans. Dependable Secur. Comput. 19, 54\u201366 (2020)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"33_CR7","doi-asserted-by":"publisher","unstructured":"Xi, K., Hu, J.: Bio-cryptography. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 129\u2013157. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-04117-4_7","DOI":"10.1007\/978-3-642-04117-4_7"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, ser. CCS 1999, ACM. New York, NY, USA, pp. 28\u201336. ACM (1999)","DOI":"10.1145\/319709.319714"},{"issue":"9","key":"33_CR9","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081\u20131088 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"33_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1007\/978-3-540-74549-5_60","volume-title":"Advances in Biometrics","author":"EJC Kelkboom","year":"2007","unstructured":"Kelkboom, E.J.C., G\u00f6kberk, B., Kevenaar, T.A.M., Akkermans, A.H.M., van der Veen, M.: \u201c3D face\u2019\u2019: biometric template protection for 3D face recognition. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 566\u2013573. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74549-5_60"},{"issue":"7","key":"33_CR11","doi-asserted-by":"publisher","first-page":"6562","DOI":"10.1016\/j.eswa.2011.12.048","volume":"39","author":"P Li","year":"2012","unstructured":"Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst. Appl. 39(7), 6562\u20136574 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"33_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/1687-417X-2011-3","volume":"2011","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 3 (2011)","journal-title":"EURASIP J. Inf. Secur."},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Z\u00e9mor, G.: Optimal iris fuzzy sketches. In: 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1\u20136. IEEE (2007)","DOI":"10.1109\/BTAS.2007.4401904"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Chen, B., Chandran, V.: Biometric based cryptographic key generation from faces. In: 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394\u2013401. IEEE (2007)","DOI":"10.1109\/DICTA.2007.4426824"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Yang, W., et al.: Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem. IEEE Access 6, 36939\u201336947 (2018)","DOI":"10.1109\/ACCESS.2018.2844182"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Gilkalaye, B.P., Rattani, A., Derakhshani, R.: Euclidean-distance based fuzzy commitment scheme for biometric template security. In: 2019 7th International Workshop on Biometrics and Forensics (IWBF), pp. 1\u20136 (2019)","DOI":"10.1109\/IWBF.2019.8739177"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Dong, X., Jin, Z., Zhao, L., Guo, Z.: Bio can crypto: an LDPC coded bio-cryptosystem on fingerprint cancellable template. In: 2021 IEEE International Joint Conference on Biometrics, pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/IJCB52358.2021.9484391"},{"issue":"2","key":"33_CR18","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1049\/iet-bmt.2016.0061","volume":"6","author":"S Adamovic","year":"2017","unstructured":"Adamovic, S., Milosavljevic, M., Veinovic, M., Sarac, M., Jevremovic, A.: Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics. IET Biometrics 6(2), 89\u201396 (2017)","journal-title":"IET Biometrics"},{"issue":"3","key":"33_CR19","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1049\/iet-bmt.2018.5156","volume":"8","author":"L Chen","year":"2019","unstructured":"Chen, L., Zhao, G., Zhou, J., Ho, A.T., Cheng, L.-M.: Face template protection using deep LDPC codes learning. IET Biometrics 8(3), 190\u2013197 (2019)","journal-title":"IET Biometrics"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Phillips, P.J., et al.: Overview of the face recognition grand challenge. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), vol. 1. pp, 947\u2013954. IEEE (2005)","DOI":"10.1109\/CVPR.2005.268"},{"issue":"10","key":"33_CR21","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"PJ Phillips","year":"2000","unstructured":"Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090\u20131104 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"33_CR22","unstructured":"Sim, T., Baker, S., Bsat, M.: The CMU pose, illumination, and expression (PIE) database. In: Proceedings of fifth IEEE International Conference on Automatic Face Gesture Recognition, pp. 53\u201358. IEEE (2002)"},{"issue":"6","key":"33_CR23","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/34.927464","volume":"23","author":"AS Georghiades","year":"2001","unstructured":"Georghiades, A.S., Belhumeur, P.N., Kriegman, D.J.: From few to many: illumination cone models for face recognition under variable lighting and pose. IEEE Trans. Pattern Anal. Mach. Intell. 23(6), 643\u2013660 (2001)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"33_CR24","doi-asserted-by":"publisher","first-page":"102539","DOI":"10.1016\/j.cose.2021.102539","volume":"113","author":"C Rathgeb","year":"2022","unstructured":"Rathgeb, C., Merkle, J., Scholz, J., Tams, B., Nesterowicz, V.: Deep face fuzzy vault: implementation and performance. Comput. Secur. 113, 102539 (2022)","journal-title":"Comput. Secur."},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"33_CR26","unstructured":"Multiplexing and Channel Coding, Release 16. 3GPP Standard TS 38.212, V16.0.0 (2019)"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Drozdowski, P., Struck, F., Rathgeb, C., Busch, C.: Benchmarking binarisation schemes for deep face templates. In:2018 25th IEEE International Conference on Image Processing, pp. 191\u2013195. IEEE (2018)","DOI":"10.1109\/ICIP.2018.8451291"},{"issue":"2","key":"33_CR28","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TPAMI.2012.122","volume":"35","author":"M-H Lim","year":"2012","unstructured":"Lim, M.-H., Teoh, A.B.J.: A novel encoding scheme for effective biometric discretization: linearly separable subcode. IEEE Trans. Pattern Anal. Mach. Intell. 35(2), 300\u2013313 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"33_CR29","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1049\/iet-bmt.2015.0029","volume":"5","author":"TK Dang","year":"2016","unstructured":"Dang, T.K., Truong, Q.C., Le, T.T.B., Truong, H.: Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biometrics 5(3), 229\u2013235 (2016)","journal-title":"IET Biometrics"},{"key":"33_CR30","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"33_CR31","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Zhang, D., Deng, Y., Lu, X., Shi, S.: Lightweight face recognition challenge. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops (2019)","DOI":"10.1109\/ICCVW.2019.00322"},{"key":"33_CR32","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Workshop on Faces in Real-Life Images: Detection, Alignment, and Recognition (2008)"},{"key":"33_CR33","unstructured":"Zheng, T., Deng, W., Hu, J.: Cross-age LFW: a database for studying cross-age face recognition in unconstrained environments. arXiv preprint arXiv:1708.08197 (2017)"},{"key":"33_CR34","doi-asserted-by":"crossref","unstructured":"Moschoglou, S., Papaioannou, A., Sagonas, C., Deng, J., Kotsia, I., Zafeiriou, S.: AgeDB: the first manually collected, in-the-wild age database. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 51\u201359 (2017)","DOI":"10.1109\/CVPRW.2017.250"},{"key":"33_CR35","unstructured":"Daugman, J.: Biometric decision landscapes. University of Cambridge, Computer Laboratory, Technical report (2000)"},{"key":"33_CR36","doi-asserted-by":"crossref","unstructured":"Boddeti, V.N.: Secure face matching using fully homomorphic encryption. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u201310. IEEE (2018)","DOI":"10.1109\/BTAS.2018.8698601"},{"key":"33_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3442198","volume":"17","author":"X Dong","year":"2021","unstructured":"Dong, X., Kim, S., Jin, Z., Hwang, J.Y., Cho, S., Teoh, A.B.J.: A secure chaff-less fuzzy vault for face identification system. ACM Trans. Multimedia Comput. Commun. Appl. 17, 1\u201322 (2021)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"key":"33_CR38","unstructured":"Zhang, K., Cui, H., Yu, Y.: Facial template protection via lattice-based fuzzy extractors. Cryptology ePrint Archive (2021)"},{"key":"33_CR39","doi-asserted-by":"crossref","unstructured":"Kumar Jindal, A., Chalamala, S., Kumar Jami, S.: Face template protection using deep convolutional neural network. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 462\u2013470 (2018)","DOI":"10.1109\/CVPRW.2018.00087"},{"issue":"6","key":"33_CR40","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1109\/TIFS.2017.2788000","volume":"13","author":"M Gomez-Barrero","year":"2017","unstructured":"Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406\u20131420 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8565-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T16:17:27Z","timestamp":1730737047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8565-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819985647","9789819985654"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8565-4_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xuzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}