{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:31Z","timestamp":1767339631944},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1109\/ijcb54206.2022.10007939","type":"proceedings-article","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T13:58:35Z","timestamp":1673963915000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Indexing Protected Deep Face Templates by Frequent Binary Patterns"],"prefix":"10.1109","author":[{"given":"Daile","family":"Osorio-Roig","sequence":"first","affiliation":[{"name":"Hochschule Darmstadt,Germany"}]},{"given":"Christian","family":"Rathgeb","sequence":"additional","affiliation":[{"name":"Hochschule Darmstadt,Germany"}]},{"given":"Hatef Otroshi","family":"Shahreza","sequence":"additional","affiliation":[{"name":"Idiap Research Institute,Switzerland"}]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[{"name":"Hochschule Darmstadt,Germany"}]},{"given":"Sebastien","family":"Marcel","sequence":"additional","affiliation":[{"name":"Idiap Research Institute,Switzerland"}]}],"member":"263","reference":[{"key":"ref10","first-page":"7","article-title":"Faces in the wild: a database for studying face recognition in unconstrained environments","author":"huang","year":"2007","journal-title":"Technical Report"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"journal-title":"ISO\/IEC 24745 2022 Information Technology - Security Techniques - Biometric Information Protection","year":"2022","key":"ref12"},{"journal-title":"ISO\/IEC 19795&#x2013;1 2021 Information Technology - Biometric Performance Testing and Reporting - Part 1 Principles and Framework","year":"2021","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2753172"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2827389"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908456"},{"key":"ref17","article-title":"Stable hash generation for efficient privacy-preserving face identification","author":"osorio-roig","year":"2021","journal-title":"Trans on Biometrics Behavior and Identity Science (TBIOM)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2434151"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999656"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2019.0076"},{"key":"ref3","first-page":"1","article-title":"On the application of homomorphic encryption to face identification","author":"drozdowski","year":"2019","journal-title":"Biometrics Special Interest Group (BIOSIG)"},{"journal-title":"Hers Homomor-phically encrypted representation search","year":"2020","author":"engelsma","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118830"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"},{"journal-title":"REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)","year":"2016","author":"council","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3442198"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107277"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2019.102805"},{"journal-title":"On the recognition performance of biohashing on state-of-the-art face recognition models","year":"2021","author":"shahreza","key":"ref20"},{"journal-title":"Mlp-hash Protecting face templates via hashing of randomized multi-layer perceptron","year":"2022","author":"shahreza","key":"ref22"},{"journal-title":"Face reconstruction from deep facial embeddings using a convolutional neural network","year":"2022","author":"shahreza","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2727048"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"}],"event":{"name":"2022 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2022,10,10]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2022,10,13]]}},"container-title":["2022 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10007927\/10007928\/10007939.pdf?arnumber=10007939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T16:45:21Z","timestamp":1676911521000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10007939\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ijcb54206.2022.10007939","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]}}}