{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T17:25:51Z","timestamp":1744910751486,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/icassp.2009.4959726","type":"proceedings-article","created":{"date-parts":[[2009,5,27]],"date-time":"2009-05-27T19:13:38Z","timestamp":1243451618000},"page":"885-888","source":"Crossref","is-referenced-by-count":4,"title":["Face recognition with enhanced privacy protection"],"prefix":"10.1109","author":[{"family":"Yongjin Wang","sequence":"first","affiliation":[]},{"given":"Dimitrios","family":"Hatzinakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/TNN.2002.806629","article-title":"face recognition using kernel direct discriminant analysis algorithms","volume":"14","author":"lu","year":"2003","journal-title":"IEEE Trans on Neural Networks"},{"key":"15","article-title":"the ar face database","author":"martinez","year":"0","journal-title":"CVC Technical Report"},{"journal-title":"Aging Database","year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1251154"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.03.010"},{"key":"12","first-page":"295","article-title":"the feret database and evaluation procedure for face recognition algorithms, image vision","volume":"16","author":"phillips","year":"1998","journal-title":"Comput J"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/34.254061"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00247-3"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.24"},{"key":"4","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"fuzzy extractors: how to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Proc Eurocrypt 2004"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334679"}],"event":{"name":"ICASSP 2009 - 2009 IEEE International Conference on Acoustics, Speech and Signal Processing","start":{"date-parts":[[2009,4,19]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2009,4,24]]}},"container-title":["2009 IEEE International Conference on Acoustics, Speech and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4912736\/4959496\/04959726.pdf?arnumber=4959726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T20:19:51Z","timestamp":1497817191000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4959726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icassp.2009.4959726","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}