{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:35:07Z","timestamp":1770230107081,"version":"3.49.0"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11263-024-02280-8","type":"journal-article","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T16:04:52Z","timestamp":1730909092000},"page":"2158-2175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Rethinking Contemporary Deep Learning Techniques for Error Correction in Biometric Data"],"prefix":"10.1007","volume":"133","author":[{"given":"YenLung","family":"Lai","sequence":"first","affiliation":[]},{"given":"XingBo","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4501-7992","authenticated-orcid":false,"given":"Zhe","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Tistarelli","sequence":"additional","affiliation":[]},{"given":"XueJun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,6]]},"reference":[{"key":"2280_CR1","volume-title":"Cryptography engineering: design principles and practical applications","author":"N Ferguson","year":"2010","unstructured":"Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: design principles and practical applications. New York: Wiley Publishing."},{"key":"2280_CR2","doi-asserted-by":"crossref","unstructured":"Liu, S., Shao, W., Li, T., Xu, W., & Song, L. (2022) Recent advances in biometrics-based user authentication for wearable devices: A contemporary survey, Digital Signal Processing, vol. 125, p. 103120, sensing, Signal Processing and Computing for the Era of Wearables. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1051200421001597","DOI":"10.1016\/j.dsp.2021.103120"},{"key":"2280_CR3","first-page":"1","volume":"82","author":"P Kaur","year":"2022","unstructured":"Kaur, P., Kumar, N., & Singh, M. (2022). Biometric cryptosystems: A comprehensive survey. Multimedia Tools and Applications, 82, 1\u201356.","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"2280_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2011-3","volume":"2011","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb, C., & Uhl, A. (2011). A survey on biometric cryptosystems and cancelable biometrics. EURASIP journal on information security, 2011(1), 1\u201325.","journal-title":"EURASIP journal on information security"},{"issue":"6","key":"2280_CR5","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K. (2004). Biometric cryptosystems: issues and challenges. Proceedings of the IEEE, 92(6), 948\u2013960.","journal-title":"Proceedings of the IEEE"},{"key":"2280_CR6","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., & Smith, A. (2004). \u201cFuzzy extractors: How to generate strong keys from biometrics and other noisy data,\u201d in Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, Proceedings 23. Springer, 2004, pp. 523\u2013540.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"2280_CR7","doi-asserted-by":"crossref","unstructured":"Shaltiel, R. (2011). \u201cAn introduction to randomness extractors,\u201d in Automata, Languages and Programming: 38th International Colloquium, ICALP. (2011). Zurich, Switzerland, Proceedings, Part II 38. Springer, 21\u201341.","DOI":"10.1007\/978-3-642-22012-8_2"},{"key":"2280_CR8","doi-asserted-by":"crossref","unstructured":"Kingma, D.P., & Welling, M. (2019). \u201cAn introduction to variational autoencoders.\u201d Foundations and Trends\u00ae in Machine Learning, 12(4): 307\u2013392,","DOI":"10.1561\/2200000056"},{"key":"2280_CR9","volume-title":"Error-correcting codes","author":"WW Peterson","year":"1972","unstructured":"Peterson, W. W., Peterson, W., Weldon, E. J., & Weldon, E. J. (1972). Error-correcting codes. Cambridge: MIT press."},{"key":"2280_CR10","doi-asserted-by":"crossref","unstructured":"Juels, A., & Wattenberg, M. (1999). \u201cA fuzzy commitment scheme,\u201d In Proceedings of the 6th ACM conference on Computer and communications security, pp. 28\u201336.","DOI":"10.1145\/319709.319714"},{"issue":"1","key":"2280_CR11","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/1327452.1327494","volume":"51","author":"A Andoni","year":"2008","unstructured":"Andoni, A., & Indyk, P. (2008). Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications of the ACM, 51(1), 117\u2013122.","journal-title":"Communications of the ACM"},{"issue":"3","key":"2280_CR12","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1007\/s41870-018-0275-0","volume":"14","author":"S Chauhan","year":"2022","unstructured":"Chauhan, S., & Sharma, A. (2022). Improved fuzzy commitment scheme. International Journal of Information Technology, 14(3), 1321\u20131331.","journal-title":"International Journal of Information Technology"},{"key":"2280_CR13","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1109\/iSES54909.2022.00142","volume":"2022","author":"AM Ganorkar","year":"2022","unstructured":"Ganorkar, A. M., & Sahula, V. (2022). Error correction using pufs for reliable key generation. IEEE International Symposium on Smart Electronic Systems (iSES), 2022, 643\u2013646.","journal-title":"IEEE International Symposium on Smart Electronic Systems (iSES)"},{"key":"2280_CR14","doi-asserted-by":"crossref","unstructured":"B\u00f6sch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P., & \u201cEfficient helper data key extractor on fpgas,\u201d In Cryptographic Hardware and Embedded Systems-CHES,. (2008). 10th International Workshop, Washington, DC, USA, August 10\u201313, 2008. Proceedings 10. Springer: Berlin, 181\u2013197.","DOI":"10.1007\/978-3-540-85053-3_12"},{"key":"2280_CR15","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., & Verbauwhede, I. (2009). \u201cA soft decision helper data algorithm for sram pufs,\u201d In: (2009). IEEE international symposium on information theory. IEEE, 2101\u20132105.","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"2280_CR16","doi-asserted-by":"crossref","unstructured":"Maes, R., Van Herrewege, A., Verbauwhede, I., & \u201cPufky: A fully functional puf-based cryptographic key generator,\u201d In: Cryptographic Hardware and Embedded Systems-CHES,. (2012). 14th International Workshop, Leuven, Belgium, September 9\u201312, 2012. Proceedings 14. Springer, 2012, 302\u2013319.","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"2280_CR17","doi-asserted-by":"crossref","unstructured":"Van Herrewege, A., Katzenbeisser, S., Maes, R., Peeters, R., Sadeghi, A-R., Verbauwhede, I., & Wachsmann, C. (2012). \u201cReverse fuzzy extractors: Enabling lightweight mutual authentication for puf-enabled rfids,\u201d In: Financial Cryptography and Data Security: 16th International Conference, FC. Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers 16. Springer, 374\u2013389.","DOI":"10.1007\/978-3-642-32946-3_27"},{"issue":"3","key":"2280_CR18","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1016\/j.patcog.2013.10.001","volume":"47","author":"W Yang","year":"2014","unstructured":"Yang, W., Hu, J., Wang, S., & Stojmenovic, M. (2014). An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recognition, 47(3), 1309\u20131320.","journal-title":"Pattern Recognition"},{"key":"2280_CR19","doi-asserted-by":"crossref","unstructured":"Suh, G.E., O\u2019Donnell, C.W., Sachdev, I., & Devadas, S. (2005). \u201cDesign and implementation of the aegis single-chip secure processor using physical random functions,\u201d In: 32nd International Symposium on Computer Architecture (ISCA\u201905). IEEE, pp. 25\u201336.","DOI":"10.1109\/ISCA.2005.22"},{"key":"2280_CR20","first-page":"2952","volume":"2019","author":"B Fuller","year":"2019","unstructured":"Fuller, B., & Peng, L. (2019). Continuous-source fuzzy extractors: Source uncertainty and insecurity. IEEE International Symposium on Information Theory (ISIT), 2019, 2952\u20132956.","journal-title":"IEEE International Symposium on Information Theory (ISIT)"},{"issue":"8","key":"2280_CR21","doi-asserted-by":"crossref","first-page":"5282","DOI":"10.1109\/TIT.2020.2984751","volume":"66","author":"B Fuller","year":"2020","unstructured":"Fuller, B., Reyzin, L., & Smith, A. (2020). When are fuzzy extractors possible? IEEE Transactions on Information Theory, 66(8), 5282\u20135298.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2280_CR22","unstructured":"Lin, S., Costello, D.J. (2001). Error control coding. Prentice hall Lebanon, IN, vol.\u00a02, no.\u00a04."},{"issue":"3","key":"2280_CR23","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"E Berlekamp","year":"1978","unstructured":"Berlekamp, E., McEliece, R., & Van Tilborg, H. (1978). On the inherent intractability of certain coding problems (corresp.). IEEE Transactions on Information Theory, 24(3), 384\u2013386.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"2280_CR24","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/26.486609","volume":"44","author":"X-A Wang","year":"1996","unstructured":"Wang, X.-A., & Wicker, S. B. (1996). An artificial neural net viterbi decoder. IEEE Transactions on communications, 44(2), 165\u2013171.","journal-title":"IEEE Transactions on communications"},{"key":"2280_CR25","doi-asserted-by":"crossref","unstructured":"Hamalainen, A., & Henriksson, J. (1999). A recurrent neural decoder for convolutional codes, In: IEEE International Conference on Communications (Cat. No. 99CH36311), vol.\u00a02. IEEE, 1999, pp. 1305\u20131309.","DOI":"10.1109\/ICC.1999.765550"},{"key":"2280_CR26","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L., & Imagenet: A large-scale hierarchical image database, In,. (2009). IEEE conference on computer vision and pattern recognition. Ieee, 2009, 248\u2013255.","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"2","key":"2280_CR27","first-page":"1","volume":"5","author":"WE Ryan","year":"2004","unstructured":"Ryan, W. E., et al. (2004). An introduction to ldpc codes. CRC Handbook for Coding and Signal Processing for Recording Systems, 5(2), 1\u201323.","journal-title":"CRC Handbook for Coding and Signal Processing for Recording Systems"},{"issue":"8","key":"2280_CR28","doi-asserted-by":"crossref","first-page":"3746","DOI":"10.1109\/TIT.2006.878176","volume":"52","author":"J Jiang","year":"2006","unstructured":"Jiang, J., & Narayanan, K. R. (2006). Iterative soft-input soft-output decoding of reed-solomon codes by adapting the parity-check matrix. IEEE Transactions on Information Theory, 52(8), 3746\u20133756.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2280_CR29","doi-asserted-by":"crossref","unstructured":"Nachmani, E.,\u00a0Be\u2019ery, Y., & Burshtein, D. (2016). Learning to decode linear codes using deep learning,\u201d In: 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, pp. 341\u2013346.","DOI":"10.1109\/ALLERTON.2016.7852251"},{"key":"2280_CR30","doi-asserted-by":"crossref","unstructured":"Gruber, T., Cammerer, S., Hoydis, J., ten Brink, S., & \u201cOn deep learning-based channel decoding,\u201d In: (2017). 51st annual conference on information sciences and systems (CISS). IEEE, 2017, 1\u20136.","DOI":"10.1109\/CISS.2017.7926071"},{"key":"2280_CR31","unstructured":"Keskar, N.S., Mudigere, D., Nocedal, J., Smelyanskiy, M., & Tang, P.T.P. (2016). On large-batch training for deep learning: Generalization gap and sharp minima,\u201d arXiv preprint arXiv:1609.04836"},{"issue":"2","key":"2280_CR32","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/TIFS.2015.2500196","volume":"11","author":"J Daugman","year":"2015","unstructured":"Daugman, J. (2015). Information theory and the iriscode. IEEE transactions on information forensics and security, 11(2), 400\u2013409.","journal-title":"IEEE transactions on information forensics and security"},{"key":"2280_CR33","doi-asserted-by":"crossref","DOI":"10.1007\/b138151","volume-title":"Biometric systems: technology, design and performance evaluation","author":"JL Wayman","year":"2005","unstructured":"Wayman, J. L., Jain, A. K., Maltoni, D., & Maio, D. (2005). Biometric systems: technology, design and performance evaluation. Berlin: Springer."},{"key":"2280_CR34","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., Rane, S., Yedidia, J. S., Draper, S. C., Vetro, A., & (2008). \u201cFeature extraction for a slepian-wolf biometric system using ldpc codes,\u201d In: (2008) IEEE International Symposium on Information Theory. IEEE, 2008, 2297\u20132301.","DOI":"10.1109\/ISIT.2008.4595400"},{"key":"2280_CR35","unstructured":"Delvaux, J. (2017). \u201cSecurity analysis of puf-based key generation and entity authentication,\u201d"},{"issue":"1","key":"2280_CR36","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIFS.2010.2098872","volume":"6","author":"L Lai","year":"2010","unstructured":"Lai, L., Ho, S.-W., & Poor, H. V. (2010). Privacy-security trade-offs in biometric security systems\u2014part i: Single use case. IEEE transactions on information forensics and security, 6(1), 122\u2013139.","journal-title":"IEEE transactions on information forensics and security"},{"issue":"4","key":"2280_CR37","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1109\/TIFS.2009.2033228","volume":"4","author":"T Ignatenko","year":"2009","unstructured":"Ignatenko, T., & Willems, F. M. (2009). Biometric systems: privacy and secrecy aspects. IEEE transactions on information forensics and security, 4(4), 956\u2013973.","journal-title":"IEEE transactions on information forensics and security"},{"key":"2280_CR38","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-90B","volume-title":"Nist special publication 800\u201390b: recommendation for the entropy sources used for random bit generation,\u201d US Department of Commerce, National institute of standards and technology: gaithersburg","author":"MS Turan","year":"2018","unstructured":"Turan, M. S., Barker, E., Kelsey, J., McKay, K., Baish, M. L., & Boyle, M. (2018). Nist special publication 800\u201390b: recommendation for the entropy sources used for random bit generation,\u2019\u2019 US Department of Commerce, National institute of standards and technology: gaithersburg. USA: MD."},{"key":"2280_CR39","doi-asserted-by":"crossref","unstructured":"Charikar, M.S. (2002). \u201cSimilarity estimation techniques from rounding algorithms,\u201d In: Proceedings of the thiry-fourth annual ACM symposium on Theory of computing pp. 380\u2013388.","DOI":"10.1145\/509907.509965"},{"issue":"1","key":"2280_CR40","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MDT.2010.25","volume":"27","author":"M-D Yu","year":"2010","unstructured":"Yu, M.-D., & Devadas, S. (2010). Secure and robust error correction for physical unclonable functions. IEEE design & test of computers, 27(1), 48\u201365.","journal-title":"IEEE design & test of computers"},{"key":"2280_CR41","unstructured":"Bishop, C.M., & Nasrabadi, N.M. (2006). Pattern recognition and machine learning. Springer: Berlin, vol.\u00a04, no.\u00a04."},{"key":"2280_CR42","unstructured":"Meng, Q., Zhao, S., Huang, Z., & Zhou, F. (2021). Magface: A universal representation for face recognition and quality assessment,\u201d In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition pp. 14\u00a0225\u201314\u00a0234."},{"key":"2280_CR43","unstructured":"Huang, G.B., Mattar, M., Berg, T., & Learned-Miller, E. (2008). \u201cLabeled faces in the wild: A database forstudying face recognition in unconstrained environments,\u201d In: Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition."},{"key":"2280_CR44","doi-asserted-by":"crossref","unstructured":"Sengupta, S., Chen, J.-C., Castillo, C., Patel, V. M., Chellappa, R., Jacobs, D. W., & (2016). \u201cFrontal to profile face verification in the wild,\u201d In: (2016). IEEE winter conference on applications of computer vision (WACV). IEEE, 2016, 1\u20139.","DOI":"10.1109\/WACV.2016.7477558"},{"key":"2280_CR45","unstructured":"Sim, T., Baker, S., & Bsat, M (2002). The cmu pose, illumination, and expression (pie) database,\u201d In: Proceedings of fifth IEEE international conference on automatic face gesture recognition. IEEE, pp. 53\u201358."},{"issue":"10","key":"2280_CR46","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"PJ Phillips","year":"2000","unstructured":"Phillips, P. J., Moon, H., Rizvi, S. A., & Rauss, P. J. (2000). The feret evaluation methodology for face-recognition algorithms. IEEE transactions on pattern analysis and machine intelligence, 22(10), 1090\u20131104.","journal-title":"IEEE transactions on pattern analysis and machine intelligence"},{"key":"2280_CR47","doi-asserted-by":"crossref","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., & Jain, A.K. (2002). Fvc2002: Second fingerprint verification competition, In: Object recognition supported by user interaction for service robots, vol.\u00a03. IEEE pp. 811\u2013814.","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"2280_CR48","doi-asserted-by":"crossref","unstructured":"Kumar\u00a0Jindal, A., Chalamala, S., & Kumar\u00a0Jami, S. (2018). Face template protection using deep convolutional neural network, In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops pp. 462\u2013470.","DOI":"10.1109\/CVPRW.2018.00087"},{"key":"2280_CR49","doi-asserted-by":"crossref","unstructured":"Kumar\u00a0Pandey, R., Zhou, Y., Urala\u00a0Kota, B., & Govindaraju, V. (2016). Deep secure encoding for face template protection,\u201d In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops pp. 9\u201315.","DOI":"10.1109\/CVPRW.2016.17"},{"key":"2280_CR50","doi-asserted-by":"crossref","unstructured":"Talreja, V., Valenti, M.C., & Nasrabadi, N.M. (2019). Zero-shot deep hashing and neural network based error correction for face template protection, In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, pp. 1\u201310.","DOI":"10.1109\/BTAS46853.2019.9185979"},{"issue":"3","key":"2280_CR51","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1049\/iet-bmt.2018.5156","volume":"8","author":"L Chen","year":"2019","unstructured":"Chen, L., Zhao, G., Zhou, J., Ho, A. T., & Cheng, L.-M. (2019). Face template protection using deep ldpc codes learning. IET biometrics, 8(3), 190\u2013197.","journal-title":"IET biometrics"},{"key":"2280_CR52","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1016\/j.ins.2019.05.064","volume":"502","author":"Y-L Lai","year":"2019","unstructured":"Lai, Y.-L., Hwang, J. Y., Jin, Z., Kim, S., Cho, S., & Teoh, A. B. J. (2019). Symmetric keyring encryption scheme for biometric cryptosystem. Information sciences, 502, 492\u2013509.","journal-title":"Information sciences"},{"key":"2280_CR53","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1109\/TIFS.2020.3009590","volume":"16","author":"G Mai","year":"2020","unstructured":"Mai, G., Cao, K., Lan, X., & Yuen, P. C. (2020). Secureface: face template protection. IEEE transactions on information forensics and security, 16, 262\u2013277.","journal-title":"IEEE transactions on information forensics and security"},{"key":"2280_CR54","doi-asserted-by":"crossref","unstructured":"Kim, S., Jeong, Y., Kim, J., Kim, J., Lee, H.T., & Seo, J.H. (2021). Ironmask: Modular architecture for protecting deep face template, In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition pp. 16\u00a0125\u201316\u00a0134.","DOI":"10.1109\/CVPR46437.2021.01586"},{"key":"2280_CR55","doi-asserted-by":"crossref","unstructured":"Maze, B., Adams, J., Duncan, J. A., Kalka, N., Miller, T., Otto, C., Jain, A. K., Niggel, W. T., Anderson, J., Cheney, J., \u201cIarpa janus benchmark-c: Face dataset and protocol, et al. (2018). In: international conference on biometrics (ICB). IEEE, 2018, 158\u2013165.","DOI":"10.1109\/ICB2018.2018.00033"},{"key":"2280_CR56","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TIFS.2022.3230212","volume":"18","author":"TM Dang","year":"2022","unstructured":"Dang, T. M., Nguyen, T. D., Hoang, T., Kim, H., Teoh, A. B. J., & Choi, D. (2022). Avet: a novel transform function to improve cancellable biometrics security. IEEE transactions on information forensics and security, 18, 758\u2013772.","journal-title":"IEEE transactions on information forensics and security"},{"key":"2280_CR57","doi-asserted-by":"crossref","first-page":"3101","DOI":"10.1109\/TIFS.2023.3273919","volume":"18","author":"Y Lai","year":"2023","unstructured":"Lai, Y., Dong, X., Jin, Z., Tistarelli, M., Yap, W.-S., & Goi, B.-M. (2023). Breaking free from entropy\u2019s shackles: cosine distance-sensitive error correction for reliable biometric cryptography. IEEE transactions on information forensics and security, 18, 3101\u20133115.","journal-title":"IEEE transactions on information forensics and security"},{"key":"2280_CR58","doi-asserted-by":"crossref","unstructured":"Boddeti, V.N. (2018). \u201cSecure face matching using fully homomorphic encryption,\u201d In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, pp. 1\u201310.","DOI":"10.1109\/BTAS.2018.8698601"},{"key":"2280_CR59","doi-asserted-by":"crossref","unstructured":"Shahreza, H. O., Hahn, V. K., Marcel, S., & (2023). Mlp-hash: Protecting face templates via hashing of randomized multi-layer perceptron, (2023). In: 31st European Signal Processing Conference (EUSIPCO). IEEE, 2023, 605\u2013609.","DOI":"10.23919\/EUSIPCO58844.2023.10289780"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02280-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-024-02280-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02280-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T21:55:34Z","timestamp":1743371734000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-024-02280-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,6]]},"references-count":59,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2280"],"URL":"https:\/\/doi.org\/10.1007\/s11263-024-02280-8","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,6]]},"assertion":[{"value":"28 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}