{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:55:55Z","timestamp":1729648555030,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icme.2010.5583030","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T18:03:07Z","timestamp":1285783387000},"page":"492-497","source":"Crossref","is-referenced-by-count":21,"title":["Privacy-preserving approximation of L1 distance for multimedia applications"],"prefix":"10.1109","author":[{"given":"Shantanu","family":"Rane","sequence":"first","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Vetro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892082"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"journal-title":"Multiple biometric grand challenge database","year":"0","key":"ref10"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1090\/conm\/026\/737400","article-title":"Extensions of Lipschitz Mapping Into Hilbert Space","volume":"26","author":"johnson","year":"1984","journal-title":"Contemporary Mathematics"},{"key":"ref11","article-title":"Face recognition using boosted local features","author":"jones","year":"2003","journal-title":"Technical report TR2003-96 MERL"},{"key":"ref5","article-title":"Secure Image Retrieval through Feature Detection","author":"lu","year":"2009","journal-title":"Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(03)00025-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539799361701"},{"key":"ref9","article-title":"Secure Distortion Computation in the Encrypted Domain Using Homomorphic Encryption","author":"rane","year":"2009","journal-title":"Proc IEEE International Conference on Image Processing"},{"key":"ref1","first-page":"523","article-title":"Protocols for secure remote database access with approximate matching","author":"du","year":"2000","journal-title":"Seventh ACM Conference on Computer and Communications Security"}],"event":{"name":"2010 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2010,7,19]]},"location":"Singapore, Singapore","end":{"date-parts":[[2010,7,23]]}},"container-title":["2010 IEEE International Conference on Multimedia and Expo"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5570012\/5582530\/05583030.pdf?arnumber=5583030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T14:36:19Z","timestamp":1497882979000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5583030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icme.2010.5583030","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}