{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:11:18Z","timestamp":1730279478605,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/iwbf49977.2020.9107964","type":"proceedings-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T16:31:04Z","timestamp":1591288264000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Template Protection on Multiple Facial Biometrics in the Signal Domain under Visible and Near-Infrared Light"],"prefix":"10.1109","author":[{"given":"Simon","family":"Kirchgasser","sequence":"first","affiliation":[]},{"given":"Luca","family":"Debiasi","sequence":"additional","affiliation":[]},{"given":"Rudolf","family":"Schraml","sequence":"additional","affiliation":[]},{"given":"Heinz","family":"Hofbauer","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Boyle","sequence":"additional","affiliation":[]},{"given":"James","family":"Ferryman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2173932"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339045"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1109\/TIP.2004.827237","article-title":"Efficient iris recognition by characterizing key local variations","volume":"13","author":"ma","year":"2004","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299116"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2434151"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0049"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5772\/52152"},{"journal-title":"A probabilistic image jigsaw puzzle solver","year":"2010","author":"cho","key":"ref4"},{"key":"ref27","first-page":"523","article-title":"Face matching between near infrared and visible light images","author":"yi","year":"0","journal-title":"International Conference on Biometrics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.10.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2013.06.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1117\/12.778652"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247699"},{"journal-title":"30136 2018 information technology &#x2014; performance testing of biometric template protection schemes","year":"2018","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.767"},{"journal-title":"24745 2011 information technology &#x2014; security techniques &#x2014; biometric information protection","year":"2011","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2015.7110225"},{"key":"ref22","article-title":"Iris Recognition: From Segmentation to Template Security","author":"rathgeb","year":"2013","journal-title":"volume 59 of Advances in Information Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108288"},{"key":"ref23","first-page":"1","article-title":"Protect multimodal db: a multimodal biometrics dataset envisaging border control","author":"sequeira","year":"2018","journal-title":"Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1007\/s003710050148","article-title":"Image morphing: a survey","volume":"14","author":"wolberg","year":"1998","journal-title":"The Visual Computer"},{"journal-title":"VisageSDK","article-title":"Visage Technologies","year":"2019","key":"ref25"}],"event":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2020,4,29]]},"location":"Porto, Portugal","end":{"date-parts":[[2020,4,30]]}},"container-title":["2020 8th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9105916\/9107938\/09107964.pdf?arnumber=9107964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:54:04Z","timestamp":1656438844000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iwbf49977.2020.9107964","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}