{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:17:21Z","timestamp":1729653441290,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/isbast.2014.7013085","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:34:53Z","timestamp":1421850893000},"page":"6-12","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-preserving biometrics using matrix random low-rank approximation approach"],"prefix":"10.1109","author":[{"given":"Xi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Luping","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zengli","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiashu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-004-0223-4"},{"key":"17","first-page":"181","volume":"7751","author":"li","year":"2013","journal-title":"Dimensionality Reduction by Low-rank Embedding Intelligent Science and Intelligent Data Engineering Lecture Notes in Computer Science"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"15","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1090\/conm\/026\/737400","article-title":"Extensions of Lipshitz mapping into Hilbert space","volume":"26","author":"johnson","year":"1984","journal-title":"Contemporary Mathematics"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2007.4414330"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.002"},{"key":"14","article-title":"The random projection method","author":"vempala","year":"2004","journal-title":"DIMACS Series in Discrete Mathematics and Theoretical Computer Science"},{"key":"11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-45184-6_1","article-title":"Computaion of cryptographic keys from face biometrics","author":"goh","year":"2003","journal-title":"Lecture Notes in Computer Science 2828"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.11.021"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-2789(00)00184-6"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.05.061"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1117\/12.605553","article-title":"Face recognition experiments with random projections","author":"goel","year":"2005","journal-title":"SPIE Conference on Biometric Technology for Human Identification"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227981"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21934-4_37"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(04)00456-4"},{"year":"0","author":"valid face database","key":"28"},{"year":"0","author":"the polyu palmprint database","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"10","first-page":"1454","article-title":"Random subspace for an improved BioHashing for face authentication","author":"nanni","year":"2005","journal-title":"Pattern Recognition Letters"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00247-3"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334679"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00247-3"},{"key":"4","first-page":"649","article-title":"Biometrics Encryption","author":"soutar","year":"1999","journal-title":"ICSA Guide to Cryptography"},{"key":"9","first-page":"2139","article-title":"Sparse random projection for efficient cancelable face feature extraction","author":"kim","year":"2008","journal-title":"The 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903538"}],"event":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","start":{"date-parts":[[2014,8,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2014,8,27]]}},"container-title":["2014 International Symposium on Biometrics and Security Technologies (ISBAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994953\/7013076\/07013085.pdf?arnumber=7013085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:03:22Z","timestamp":1498176202000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/isbast.2014.7013085","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}