{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:15:22Z","timestamp":1763968522129,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,21]]},"DOI":"10.1109\/icpr56361.2022.9956077","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T19:34:13Z","timestamp":1669750453000},"page":"833-839","source":"Crossref","is-referenced-by-count":1,"title":["A Secure and Practical Sample-then-lock Scheme for Iris Recognition"],"prefix":"10.1109","author":[{"given":"Feng","family":"Zhu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security,Chinese Academy of Sciences"}]},{"given":"Peisong","family":"Shen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security,Chinese Academy of Sciences"}]},{"given":"Kaini","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security,Chinese Academy of Sciences"}]},{"given":"Yucheng","family":"Ma","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security,Chinese Academy of Sciences"}]},{"given":"Chi","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security,Chinese Academy of Sciences"}]}],"member":"263","reference":[{"key":"ref10","first-page":"465","volume":"11723","author":"simhadri","year":"2019","journal-title":"Information Security - 22nd International Conference ISC 2019 New York City NY USA September 16-18 2019 Proceedings ser Lecture Notes in Computer Science"},{"key":"ref11","first-page":"259","article-title":"A performance-optimization method for reusable fuzzy extractor based on block error distribution of iris trait","volume":"305","author":"zhu","year":"2019","journal-title":"Security and Privacy in Communication Networks - 15th EAI International Conference SecureComm 2019 Orlando FL USA October 23-25 2019 Proceedings Part II ser Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2371691"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2033427"},{"year":"0","key":"ref14","article-title":"Casia iris image database"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.59"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09367-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2020.104602"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60080-2_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5230-9_4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884092"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.09.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93638-3_3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.05.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412957"},{"key":"ref21","article-title":"Chaffing and winnowing confidentiality without encryption !","volume":"4","author":"rivest","year":"1998","journal-title":"CryptoBytes"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31298-4_10"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6784-6_16"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199825"},{"article-title":"Recognition of human iris patterns for biometric identification","year":"2003","author":"masek","key":"ref25"}],"event":{"name":"2022 26th International Conference on Pattern Recognition (ICPR)","start":{"date-parts":[[2022,8,21]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2022,8,25]]}},"container-title":["2022 26th International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9956007\/9955631\/09956077.pdf?arnumber=9956077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T20:05:02Z","timestamp":1671480302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9956077\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,21]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icpr56361.2022.9956077","relation":{},"subject":[],"published":{"date-parts":[[2022,8,21]]}}}