{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:00:17Z","timestamp":1774454417650,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"15","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Hainan Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["624QN230"],"award-info":[{"award-number":["624QN230"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Hainan Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["625MS046"],"award-info":[{"award-number":["625MS046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2024JC-YBMS-471"],"award-info":[{"award-number":["2024JC-YBMS-471"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,8,1]]},"DOI":"10.1109\/jiot.2025.3571052","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T13:58:30Z","timestamp":1747663110000},"page":"30448-30459","source":"Crossref","is-referenced-by-count":2,"title":["Cancelable Binary Face Templates Generation Based on Partial Cake-Cutting Transformation and Spherical Hashing"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9533-6329","authenticated-orcid":false,"given":"Qikang","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2044-4752","authenticated-orcid":false,"given":"Yuxing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5525-687X","authenticated-orcid":false,"given":"Qingchen","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4883-4465","authenticated-orcid":false,"given":"Zifeng","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0242-7609","authenticated-orcid":false,"given":"Heng","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Intergrated Services Networks, School of Life Science and Technology, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4856-406X","authenticated-orcid":false,"given":"Zhicheng","family":"Cao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Intergrated Services Networks, School of Life Science and Technology, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2388-2806","authenticated-orcid":false,"given":"Liaojun","family":"Pang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Intergrated Services Networks, School of Life Science and Technology, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3430368"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9081188"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2827389"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897535"},{"key":"ref6","first-page":"12703","article-title":"Face reconstruction from facial templates by learning latent space of a generator network","volume-title":"Proc. 37th Conf. Neural Inf. Process. Syst.","volume":"36","author":"Shahreza"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref8","first-page":"1","article-title":"Biometric template security: Challenges and solutions","volume-title":"Proc. 13th Eur. Signal Process. Conf.","author":"Jain"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09767-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102144"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3228494"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339045"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00293"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3442198"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102539"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983250"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698601"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FG59268.2024.10581983"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.10.025"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.12.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2753172"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3144854"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3071262"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3369322"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2022.3140472"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01586"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3009590"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.3046620"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107958"},{"key":"ref38","article-title":"Fuzzy commitments offer insufficient protection to biometric templates produced by deep learning","author":"Keller","year":"2020","journal-title":"arXiv:2012.13293"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s19194122"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248024"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.119"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1364\/OE.451656"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref45","first-page":"1","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces Real-Life\u2019Images: Detect., Align., Recognit.","author":"Huang"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477558"},{"key":"ref47","volume-title":"CASIA Face Image Database Version 5.0 (CASIA-FaceV5)","year":"2016"},{"key":"ref48","volume-title":"The Fingerprint Verification Competition, The Biometric System Laboratory","year":"2016"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_6"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.01.039"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11096042\/11006874.pdf?arnumber=11006874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T21:34:32Z","timestamp":1764711272000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11006874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,1]]},"references-count":53,"journal-issue":{"issue":"15"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3571052","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,1]]}}}