{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:31:47Z","timestamp":1773156707981,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100018694","name":"HORIZON EUROPE Marie Sklodowska-Curie Actions","doi-asserted-by":"publisher","award":["101007820"],"award-info":[{"award-number":["101007820"]}],"id":[{"id":"10.13039\/100018694","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17714-7","type":"journal-article","created":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T23:27:34Z","timestamp":1702510054000},"page":"56909-56938","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Deep learning-based biometric cryptographic key generation with post-quantum security"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2331-6326","authenticated-orcid":false,"given":"Oleksandr","family":"Kuznetsov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9519-2444","authenticated-orcid":false,"given":"Dmytro","family":"Zakharov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8893-9244","authenticated-orcid":false,"given":"Emanuele","family":"Frontoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,14]]},"reference":[{"key":"17714_CR1","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Das D (2014) An Overview of Face Liveness Detection. arXiv:1405.2227 [cs] Accessed 12 Feb 2021","DOI":"10.5121\/ijit.2014.3202"},{"key":"17714_CR2","doi-asserted-by":"publisher","unstructured":"Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inform Secu 2011(1):3. https:\/\/doi.org\/10.1186\/1687-417X-2011-3","DOI":"10.1186\/1687-417X-2011-3"},{"issue":"6","key":"17714_CR3","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(6):948\u2013960. https:\/\/doi.org\/10.1109\/JPROC.2004.827372","journal-title":"Proc IEEE"},{"key":"17714_CR4","doi-asserted-by":"publisher","unstructured":"Lutsenko M, Kuznetsov A, Kiian A, Smirnov O, Kuznetsova T (2021) Biometric Cryptosystems: overview, state-of-the-art and perspective directions. Lecture Notes in Networks and Systems, vol 152, p 84. Springer, ???. https:\/\/doi.org\/10.1007\/978-3-030-58359-0_5","DOI":"10.1007\/978-3-030-58359-0_5"},{"key":"17714_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.patcog.2016.02.024","volume":"56","author":"Z Jin","year":"2016","unstructured":"Jin Z, Teoh ABJ, Goi B-M, Tay Y-H (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 56:50\u201362. https:\/\/doi.org\/10.1016\/j.patcog.2016.02.024","journal-title":"Pattern Recogn"},{"key":"17714_CR6","doi-asserted-by":"publisher","unstructured":"Pane A, Chen TM , Nepomuceno E (2022) In: Daimi K, Francia\u00a0III G, Encinas LH (eds) Biometric Cryptography. Springer, Cham, pp 3\u201328. https:\/\/doi.org\/10.1007\/978-3-031-10706-1_1","DOI":"10.1007\/978-3-031-10706-1_1"},{"key":"17714_CR7","unstructured":"www.html-factory.cz, Ji\u0159\u00edk P (2021) The Future of Multi-Factor Biometric Authentication. https:\/\/www.phonexia.com\/blog\/the-future-of-multi-factor-biometric-authentication\/"},{"key":"17714_CR8","doi-asserted-by":"publisher","first-page":"5994","DOI":"10.1109\/ACCESS.2018.2889996","volume":"7","author":"Z Rui","year":"2019","unstructured":"Rui Z, Yan Z (2019) A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7:5994\u20136009. https:\/\/doi.org\/10.1109\/ACCESS.2018.2889996","journal-title":"IEEE Access"},{"key":"17714_CR9","doi-asserted-by":"publisher","unstructured":"hamme TV, Garofalo G, Joos S, Preuveneers D, Joosen W (2022) In: Batina L, B\u00e4ck T, Buhan I, Picek S (eds) AI for Biometric authentication systems. Lecture Notes in Computer Science. Springer, Cham, pp 156\u2013180. https:\/\/doi.org\/10.1007\/978-3-030-98795-4_8","DOI":"10.1007\/978-3-030-98795-4_8"},{"issue":"66","key":"17714_CR10","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1109\/TLA.2022.9757369","volume":"20","author":"W Valderrama","year":"2022","unstructured":"Valderrama W, Magad\u00e1n A, Vergara OO, Ruiz J, Pinto R, Reyes G (2022) Detection of facial spoofing attacks in uncontrolled environments using elbp and color models. IEEE Lat Am Trans 20(66):875\u2013883","journal-title":"IEEE Lat Am Trans"},{"key":"17714_CR11","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1016\/j.neucom.2021.06.033","volume":"458","author":"G Wang","year":"2021","unstructured":"Wang G, Wang Z, Jiang K, Huang B, He Z, Hu R (2021) Silicone mask face anti-spoofing detection based on visual saliency and facial motion. Neurocomputing 458:416\u2013427. https:\/\/doi.org\/10.1016\/j.neucom.2021.06.033","journal-title":"Neurocomputing"},{"key":"17714_CR12","unstructured":"Shafkat I (2019) Inverting Facial Recognition Models. https:\/\/blog.floydhub.com\/inverting-facial-recognition-models\/amp\/"},{"key":"17714_CR13","doi-asserted-by":"publisher","unstructured":"Menezes AJ, Oorschot PCv, Vanstone SA, Oorschot PCv, Vanstone SA (2018) Handbook of Applied Cryptography. CRC Press, ???. https:\/\/doi.org\/10.1201\/9780429466335https:\/\/www.taylorfrancis.com\/books\/9780429466335","DOI":"10.1201\/9780429466335"},{"key":"17714_CR14","doi-asserted-by":"publisher","unstructured":"Klima RE, Klima R, Sigmon NP, Sigmon N, Klima R, Sigmon NP, Sigmon N (2018) Cryptology: Classical and Modern. Chapman and Hall\/CRC, ???. https:\/\/doi.org\/10.1201\/9781315170664https:\/\/www.taylorfrancis.com\/books\/9781315170664","DOI":"10.1201\/9781315170664"},{"key":"17714_CR15","doi-asserted-by":"publisher","unstructured":"Rubinstein-Salzedo S (2018) Cryptography. Springer, Cham, Springer Undergraduate Mathematics Series. https:\/\/doi.org\/10.1007\/978-3-319-94818-8http:\/\/link.springer.com\/10.1007\/978-3-319-94818-8","DOI":"10.1007\/978-3-319-94818-8"},{"key":"17714_CR16","doi-asserted-by":"publisher","unstructured":"Kuznetsov AA, Gorbenko Y, Kiian AKA, Ulianovska YV, Kuznetsova T (2021) Elliptic curve pseudorandom bit generator with maximum period sequences. Int J Comput 494\u2013505 https:\/\/doi.org\/10.47839\/ijc.20.4.2436","DOI":"10.47839\/ijc.20.4.2436"},{"key":"17714_CR17","doi-asserted-by":"publisher","unstructured":"Kuznetsov A, Kiian A, Smirnov O, Cherep A, Kanabekova M, Chepurko I (2020) Testing of code-based pseudorandom number generators for post-quantum application. In: 2020 IEEE 11th International conference on dependable systems, services and technologies (DESSERT), pp 172\u2013177. https:\/\/doi.org\/10.1109\/DESSERT50317.2020.9125045","DOI":"10.1109\/DESSERT50317.2020.9125045"},{"key":"17714_CR18","doi-asserted-by":"publisher","unstructured":"Delfs H, Knebl H (2015) Introduction to Cryptography. Springer, Berlin, Heidelberg, Information Security and Cryptography. https:\/\/doi.org\/10.1007\/978-3-662-47974-2http:\/\/link.springer.com\/10.1007\/978-3-662-47974-2","DOI":"10.1007\/978-3-662-47974-2"},{"key":"17714_CR19","doi-asserted-by":"publisher","unstructured":"Post-Quantum Cryptography. Springer, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-540-88702-7http:\/\/link.springer.com\/10.1007\/978-3-540-88702-7","DOI":"10.1007\/978-3-540-88702-7"},{"key":"17714_CR20","doi-asserted-by":"publisher","unstructured":"Post-Quantum Cryptography. Lecture Notes in Computer Science, vol 9606. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8http:\/\/link.springer.com\/10.1007\/978-3-319-29360-8","DOI":"10.1007\/978-3-319-29360-8"},{"key":"17714_CR21","doi-asserted-by":"publisher","unstructured":"Chuang C-W, Fan C-P (2020) Biometric authentication with combined iris and sclera information by yolo-based deep-learning network. In: 2020 IEEE International conference on consumer electronics - Taiwan (ICCE-Taiwan), pp 1\u20132. https:\/\/doi.org\/10.1109\/ICCE-Taiwan49838.2020.9258253","DOI":"10.1109\/ICCE-Taiwan49838.2020.9258253"},{"issue":"3","key":"17714_CR22","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TFUZZ.2019.2956896","volume":"29","author":"Z Qin","year":"2021","unstructured":"Qin Z, Huang G, Xiong H, Qin Z, Choo K-KR (2021) A fuzzy authentication system based on neural network learning and extreme value statistics. IEEE Trans Fuzzy Syst 29(3):549\u2013559. https:\/\/doi.org\/10.1109\/TFUZZ.2019.2956896","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"17714_CR23","unstructured":"Jana A, Sarker MK, Ebrahimi M, Hitzler P, Amariucai GT (2020) Neural fuzzy extractors: a secure way to use artificial neural networks for biometric user authentication. arXiv:2003.08433 [cs]"},{"key":"17714_CR24","unstructured":"Fuller B, Reyzin L, Smith A (2014) When Are Fuzzy Extractors Possible? vol 961. http:\/\/eprint.iacr.org\/2014\/961"},{"key":"17714_CR25","doi-asserted-by":"crossref","unstructured":"Kuznetsov A, Zakharov D, Frontoni E, Romeo L, Rosati R (2022) Deep learning based fuzzy extractor for generating strong keys from biometric face images. In: 2022 International scientific-practical conference problems of infocommunications. Science and Technology (PIC S T)","DOI":"10.1109\/PICST57299.2022.10238643"},{"key":"17714_CR26","doi-asserted-by":"publisher","unstructured":"Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on computer and communications security. CCS \u201999, pp 28\u201336. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/319709.319714","DOI":"10.1145\/319709.319714"},{"key":"17714_CR27","doi-asserted-by":"publisher","unstructured":"Juels A (2007) In: Tuyls P, Skoric B, Kevenaar T (eds) Fuzzy Commitment. Springer, London, pp 45\u201356. https:\/\/doi.org\/10.1007\/978-1-84628-984-2_3","DOI":"10.1007\/978-1-84628-984-2_3"},{"issue":"4","key":"17714_CR28","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/23742917.2019.1631429","volume":"3","author":"S Chauhan","year":"2019","unstructured":"Chauhan S, Sharma A (2019) A generalized approach for the fuzzy commitment scheme. J Cyber Secur Technol 3(4):189\u2013204. https:\/\/doi.org\/10.1080\/23742917.2019.1631429","journal-title":"J Cyber Secur Technol"},{"key":"17714_CR29","doi-asserted-by":"publisher","unstructured":"Kinkiri S, Keates S (2020) Speaker identification: variations of a human voice. In: 2020 International conference on advances in computing and communication engineering (ICACCE). pp 1\u20134. https:\/\/doi.org\/10.1109\/ICACCE49060.2020.9154998","DOI":"10.1109\/ICACCE49060.2020.9154998"},{"key":"17714_CR30","doi-asserted-by":"publisher","unstructured":"Hsiao C-S, Fan C-P, Hwang Y-T (2021) Iris location and recognition by deep-learning networks based design for biometric authorization. In: 2021 IEEE 3rd Global conference on life sciences and technologies (LifeTech). pp 144\u2013145. https:\/\/doi.org\/10.1109\/LifeTech52111.2021.9391787","DOI":"10.1109\/LifeTech52111.2021.9391787"},{"key":"17714_CR31","doi-asserted-by":"publisher","unstructured":"Taigman Y, Yang M, Ranzato M, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: 2014 IEEE Conference on computer vision and pattern recognition. pp 1701\u20131708. https:\/\/doi.org\/10.1109\/CVPR.2014.220","DOI":"10.1109\/CVPR.2014.220"},{"key":"17714_CR32","doi-asserted-by":"publisher","unstructured":"Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Kanade T, Jain A, Ratha NK (eds) Audio- and video-based biometric person authentication. Lecture notes in computer science. Springer, Berlin, Heidelberg, pp 310\u2013319. https:\/\/doi.org\/10.1007\/11527923_32","DOI":"10.1007\/11527923_32"},{"issue":"2","key":"17714_CR33","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Crypt 38(2):237\u2013257. https:\/\/doi.org\/10.1007\/s10623-005-6343-z","journal-title":"Des Codes Crypt"},{"key":"17714_CR34","doi-asserted-by":"publisher","unstructured":"Frassen T, Zhou X, Busch C (2008) Fuzzy vault for 3d face recognition systems. In: 2008 International conference on intelligent information hiding and multimedia signal processing. pp 1069\u20131074. https:\/\/doi.org\/10.1109\/IIH-MSP.2008.315","DOI":"10.1109\/IIH-MSP.2008.315"},{"issue":"5","key":"17714_CR35","doi-asserted-by":"publisher","first-page":"8739","DOI":"10.1109\/JIOT.2019.2923373","volume":"6","author":"S Banerjee","year":"2019","unstructured":"Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo K-KR (2019) A provably secure and lightweight anonymous user authenticated session key exchange scheme for internet of things deployment. IEEE Internet Things J 6(5):8739\u20138752. https:\/\/doi.org\/10.1109\/JIOT.2019.2923373","journal-title":"IEEE Internet Things J"},{"key":"17714_CR36","doi-asserted-by":"publisher","unstructured":"Jakobsson M, Liu D (2013) In: Jakobsson M (ed) Your password is your new PIN. SpringerBriefs in Computer Science. Springer, New York, pp 25\u201336. https:\/\/doi.org\/10.1007\/978-1-4614-4878-5_3","DOI":"10.1007\/978-1-4614-4878-5_3"},{"key":"17714_CR37","doi-asserted-by":"publisher","unstructured":"Alvarez FH, Encinas LH (2009) Security efficiency analysis of a biometric fuzzy extractor for iris templates. In: Herrero A, Gastaldo P, Zunino R, Corchado E (eds) Computational Intelligence in Security for Information Systems. Advances in Intelligent and Soft Computing. Springer, Berlin, Heidelberg, pp 163\u2013170. https:\/\/doi.org\/10.1007\/978-3-642-04091-7_20","DOI":"10.1007\/978-3-642-04091-7_20"},{"key":"17714_CR38","doi-asserted-by":"publisher","unstructured":"Kuznetsov A, Kiyan A, Uvarova A, Serhiienko R, Smirnov V (2019) New code based fuzzy extractor for biometric cryptography. In: Int. Sci.-Pract. Conf. Probl. Infocommunications Sci. Technol., PIC S T - Proc., pp 119\u2013124. Institute of Electrical and Electronics Engineers Inc., ???. https:\/\/doi.org\/10.1109\/INFOCOMMST.2018.8632040 . journalAbbreviation: Int. Sci.-Pract. Conf. Probl. Infocommunications Sci. Technol., PIC S T - Proc","DOI":"10.1109\/INFOCOMMST.2018.8632040"},{"key":"17714_CR39","doi-asserted-by":"publisher","unstructured":"Overbeck R, Sendrier N (2009) In: Bernstein DJ, Buchmann J, Dahmen E (eds) Code-based cryptography. Springer, Berlin, Heidelberg, pp 95\u2013145. https:\/\/doi.org\/10.1007\/978-3-540-88702-7_4","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"17714_CR40","doi-asserted-by":"publisher","unstructured":"Wang W, Szefer J, Niederhagen R (2018) Fpga-based niederreiter cryptosystem using binary goppa codes. In: Lange T, Steinwandt R (eds) Post-Quantum Cryptography. Lecture Notes in Computer Science. Springer, Cham, pp 77\u201398. https:\/\/doi.org\/10.1007\/978-3-319-79063-3_4","DOI":"10.1007\/978-3-319-79063-3_4"},{"key":"17714_CR41","doi-asserted-by":"publisher","unstructured":"Bardet M, Chaulet J, Dragoi V, Otmani A, Tillich J-P (2016) Cryptanalysis of the mceliece public key cryptosystem based on polar codes. In: Takagi T (ed) Post-quantum cryptography. Lecture Notes in Computer Science. Springer, Cham, pp 118\u2013143. https:\/\/doi.org\/10.1007\/978-3-319-29360-8_9","DOI":"10.1007\/978-3-319-29360-8_9"},{"key":"17714_CR42","doi-asserted-by":"publisher","unstructured":"Maurich I, Heberle L, G\u00fcneysu T (2016) Ind-cca secure hybrid encryption from qc-mdpc niederreiter. In: Takagi T (ed) Post-Quantum Cryptography. Lecture Notes in Computer Science. Springer, Cham, pp 1\u201317. https:\/\/doi.org\/10.1007\/978-3-319-29360-8_1","DOI":"10.1007\/978-3-319-29360-8_1"},{"key":"17714_CR43","doi-asserted-by":"publisher","unstructured":"Moody D, Perlner R (2016) Vulnerabilities of \u201cmceliece in the world of escher\u201d. In: Takagi T (ed) Post-quantum cryptography. Lecture Notes in Computer Science, Springer, Cham, pp 104\u2013117. https:\/\/doi.org\/10.1007\/978-3-319-29360-8_8","DOI":"10.1007\/978-3-319-29360-8_8"},{"key":"17714_CR44","first-page":"114","volume":"44","author":"RJ McEliece","year":"1978","unstructured":"McEliece RJ (1978) A public-key cryptosystem based on algebraic coding theory. Deep Space Netw Progress Rep 44:114\u2013116","journal-title":"Deep Space Netw Progress Rep"},{"key":"17714_CR45","doi-asserted-by":"publisher","unstructured":"Sendrier N (2011) In: Tilborg HCA, Jajodia S (eds) Niederreiter Encryption Scheme. Springer, Boston, MA, pp 842\u2013843. https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_385","DOI":"10.1007\/978-1-4419-5906-5_385"},{"key":"17714_CR46","unstructured":"Classic McEliece: NIST submission. (2023) https:\/\/classic.mceliece.org\/nist.html"},{"key":"17714_CR47","unstructured":"Classic McEliece: Intro. (2023) https:\/\/classic.mceliece.org\/index.html"},{"key":"17714_CR48","doi-asserted-by":"publisher","unstructured":"Lutsenko M, Kuznetsov A, Gorbenko Y, Oleshko I, Pronchakov Y, Kotukh Y (2019) Key generation from biometric data of iris. In: 2019 International conference on information and telecommunication technologies and radio electronics (UkrMiCo). pp 1\u20136 https:\/\/doi.org\/10.1109\/UkrMiCo47782.2019.9165457","DOI":"10.1109\/UkrMiCo47782.2019.9165457"},{"key":"17714_CR49","doi-asserted-by":"publisher","unstructured":"Sutcu Y, Li Q, Memon N (2009) Design and analysis of fuzzy extractors for faces. Proceedings of SPIE - The International Society for Optical Engineering 7306. https:\/\/doi.org\/10.1117\/12.820571","DOI":"10.1117\/12.820571"},{"key":"17714_CR50","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.ins.2012.01.042","volume":"195","author":"R Mari\u00f1o","year":"2012","unstructured":"Mari\u00f1o R, Hern\u00e1ndez \u00c1lvarez F, Hern\u00e1ndez Encinas L (2012) A crypto-biometric scheme based on iris-templates with fuzzy extractors. Inf Sci 195:91\u2013102. https:\/\/doi.org\/10.1016\/j.ins.2012.01.042","journal-title":"Inf Sci"},{"key":"17714_CR51","doi-asserted-by":"publisher","unstructured":"Li N, Guo F, Mu Y, Susilo W, Nepal S (2017) Fuzzy extractors for biometric identification. In: 2017 IEEE 37th International conference on distributed computing systems (ICDCS). pp 667\u2013677. https:\/\/doi.org\/10.1109\/ICDCS.2017.107","DOI":"10.1109\/ICDCS.2017.107"},{"key":"17714_CR52","unstructured":"Nunes IDO, Rindal P, Shirvanian M (2022) Oblivious extractors and improved security in biometric-based authentication systems. Report Number: 1030"},{"key":"17714_CR53","unstructured":"Zhang K, Cui H, Yu Y (2021) Facial template protection via lattice-based fuzzy extractors. Report Number: 1559"},{"key":"17714_CR54","unstructured":"Kirss JM (2022) Biometrics in SplitKey Using Fuzzy Extraction vol D-2-456 \/ 2022, Cybernetica AS M\u00e4ealuse 2\/1 12618 Tallinn Estonia. https:\/\/cyber.ee\/uploads\/Tech_Report_Biometrics_and_Fuzzy_Extraction_d9a6053ba0.pdf"},{"issue":"3","key":"17714_CR55","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/3442198","volume":"17","author":"X Dong","year":"2021","unstructured":"Dong X, Kim S, Jin Z, Hwang JY, Cho S, Teoh ABJ (2021) Secure chaff-less fuzzy vault for face identification systems. ACM Trans Multimed Comput Commun App 17(3):79\u201317922. https:\/\/doi.org\/10.1145\/3442198","journal-title":"ACM Trans Multimed Comput Commun App"},{"key":"17714_CR56","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Merkle J, Scholz J, Tams B, Nesterowicz V (2021) Deep face fuzzy vault: Implementation and performance arXiv:2102.02458 [cs]","DOI":"10.1016\/j.cose.2021.102539"},{"key":"17714_CR57","doi-asserted-by":"publisher","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) Facenet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). pp 815\u2013823. https:\/\/doi.org\/10.1109\/CVPR.2015.7298682","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"17714_CR58","unstructured":"Machine Learning is Fun! Part 4: Modern Face Recognition with Deep Learning \u2014 by Adam Geitgey \u2014 Medium. (2023) https:\/\/medium.com\/@ageitgey\/machine-learning-is-fun-part-4-modern-face-recognition-with-deep-learning-c3cffc121d78"},{"key":"17714_CR59","unstructured":"Huang GB, Mattar M, Berg T, Learned-Miller E (2008) Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. https:\/\/hal.inria.fr\/inria-00321923"},{"key":"17714_CR60","doi-asserted-by":"publisher","unstructured":"Liu Z, Luo P, Wang X, Tang X (2015) Deep learning face attributes in the wild arXiv:1411.7766 [cs] https:\/\/doi.org\/10.48550\/arXiv.1411.7766","DOI":"10.48550\/arXiv.1411.7766"},{"key":"17714_CR61","doi-asserted-by":"publisher","unstructured":"Lint JH, Geer G (1988) In: Lint JH, Geer G (eds) Classical Goppa codes. DMV seminar. Birkh\u00e4user, Basel, pp 22\u201324. https:\/\/doi.org\/10.1007\/978-3-0348-9286-5_5","DOI":"10.1007\/978-3-0348-9286-5_5"},{"key":"17714_CR62","doi-asserted-by":"publisher","unstructured":"Hua G (2022) In: Schintler LA, McNeely CL (eds) Facial Recognition Technologies. Springer, Cham, pp 475\u2013479. https:\/\/doi.org\/10.1007\/978-3-319-32010-6_93","DOI":"10.1007\/978-3-319-32010-6_93"},{"issue":"4","key":"17714_CR63","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10916-021-01723-w","volume":"45","author":"C Libby","year":"2021","unstructured":"Libby C, Ehrenfeld J (2021) Facial recognition technology in 2021: masks, bias, and the future of healthcare. J Med Syst 45(4):39. https:\/\/doi.org\/10.1007\/s10916-021-01723-w","journal-title":"J Med Syst"},{"key":"17714_CR64","unstructured":"Gates KA (2011) Our biometric future: facial Recognition Technology and the Culture of Surveillance. NYU Press ???"},{"key":"17714_CR65","doi-asserted-by":"crossref","unstructured":"Grother PJ, Ngan ML, Hanaoka KK (2018) Ongoing face recognition vendor test (frvt) part 2: identification. NIST. Last Modified: 2018-11-27T15:11-05:00","DOI":"10.6028\/NIST.IR.8238"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17714-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17714-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17714-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T02:26:37Z","timestamp":1716603997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17714-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,14]]},"references-count":65,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["17714"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17714-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2913502\/v1","asserted-by":"object"}]},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,14]]},"assertion":[{"value":"9 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standard"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}