{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:22:53Z","timestamp":1729632173552,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/eusipco.2015.7362819","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:30:25Z","timestamp":1451338225000},"page":"2421-2425","source":"Crossref","is-referenced-by-count":7,"title":["Unitary transform-based template protection and its properties"],"prefix":"10.1109","author":[{"given":"Ibuki","family":"Nakamura","sequence":"first","affiliation":[]},{"given":"Yoshihide","family":"Tonomura","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903538"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/319709.319714","article-title":"A fuzzy commitment scheme","author":"juels","year":"1999","journal-title":"Proc ACM Conference on Computer and Communications Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2038760"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854304"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref16","first-page":"24","article-title":"Robustness Analysis of Cancelable Biometrics Systems in Terms of Visual Recognizability","author":"muraki","year":"2014","journal-title":"Proc International Workshop on Advanced Image Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2009.5297690"},{"key":"ref18","article-title":"One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images","volume":"2009","author":"ito","year":"2010","journal-title":"EURASIP J Information Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4711743"},{"key":"ref4","first-page":"922","article-title":"Cancelable biometric filters for face recognition","volume":"3","author":"marios","year":"2004","journal-title":"Proc of the 17th International Conference on Pattern Recognition"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","article-title":"Random mul-tispace quantization as an analytic mechanism for bio-hashing of biometric and random identity inputs","volume":"28","author":"goh","year":"2006","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.34"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430530"},{"key":"ref8","article-title":"A Compressible Template Protection Scheme for Face Recognition Based on Sparse Representation","author":"muraki","year":"2014","journal-title":"Proc European Signal Processing Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2013.6694155"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959885"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1109\/IJCNN.1998.682302","article-title":"Dimensionality Reduction by Random Mapping","volume":"1","author":"kaski","year":"1998","journal-title":"Proc IEEE Int'l Joint Conf Neural Networks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/34.927464"}],"event":{"name":"2015 23rd European Signal Processing Conference (EUSIPCO)","start":{"date-parts":[[2015,8,31]]},"location":"Nice","end":{"date-parts":[[2015,9,4]]}},"container-title":["2015 23rd European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7362053\/7362087\/07362819.pdf?arnumber=7362819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T22:06:50Z","timestamp":1653948410000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7362819\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/eusipco.2015.7362819","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}