{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:12:58Z","timestamp":1763467978334,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/cvprw.2010.5544620","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T20:24:44Z","timestamp":1281471884000},"page":"154-161","source":"Crossref","is-referenced-by-count":6,"title":["Illumination invariant representation for privacy preserving face identification"],"prefix":"10.1109","author":[{"given":"Boaz","family":"Moskovich","sequence":"first","affiliation":[]},{"given":"Margarita","family":"Osadchy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/CVPR.2007.383106"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/JPROC.2004.827372"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ICPR.2004.1334679"},{"key":"ref32","article-title":"Efficient privacy-preserving face recognition","author":"sadeghi","year":"2009","journal-title":"(ICISC 09)LNCS"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TPAMI.2007.1004"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/34.879790"},{"key":"ref37","article-title":"Capacity and examples of template protecting biometric authentication systems","author":"tuyls","year":"2004","journal-title":"ECCV workshop"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1109\/TPAMI.2003.1251154","article-title":"The cmu pose, illumination, and expression database","volume":"25","author":"sim","year":"2003","journal-title":"PAMI"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1007\/978-3-540-77226-2_23"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/DICTA.2007.4426824"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/BTAS.2007.4401912"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/34.598235"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CVPRW.2008.4563112"},{"key":"ref13","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Eurocrypt"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","article-title":"Privacy-preserving face recognition","volume":"5672","author":"erkin","year":"2009","journal-title":"Privacy Enhancing Technologies (PET)"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/34.927464"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICSMC.2004.1398368"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CVPRW.2006.76"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s11263-006-0006-z"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-642-01957-9_7"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TPAMI.2003.1177153"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/CVPR.2006.172"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-540-24671-8_12"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/FGR.2006.94"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/CVPRW.2006.149"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ICASSP.2007.366305"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/34.254061"},{"key":"ref7","article-title":"Secure remote authentication using biometric data","author":"boyen","year":"2005","journal-title":"Eurocrypt"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TPAMI.2006.244"},{"key":"ref9","first-page":"2203","article-title":"Biometrics-based cryptographic key generation","author":"chang","year":"2004","journal-title":"ICME"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/34.598229"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"ref22","first-page":"277","article-title":"Molding face shapes by example","volume":"i","author":"kemelmacher","year":"2006","journal-title":"ECCV"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1145\/319709.319714","article-title":"A fuzzy commitment scheme","author":"juels","year":"1999","journal-title":"ACM Conf Computer Communications Security"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/12.210173"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1145\/954339.954342"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/AUTOID.2005.24"},{"key":"ref41","first-page":"230","article-title":"Automatic detection of face and facial features","author":"yuen","year":"2008","journal-title":"ISPRA '08"},{"year":"2004","author":"li","journal-title":"Face Recognition Across Pose and Illumination","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/AFGR.2008.4813452"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/BTAS.2007.4401923"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/TPAMI.2007.25"}],"event":{"name":"2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPR Workshops)","start":{"date-parts":[[2010,6,13]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2010,6,18]]}},"container-title":["2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5521877\/5543135\/05544620.pdf?arnumber=5544620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T08:42:17Z","timestamp":1711701737000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5544620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/cvprw.2010.5544620","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}