{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:16:45Z","timestamp":1761977805322,"version":"build-2065373602"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,16]]},"DOI":"10.1109\/qrs-c65679.2025.00025","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:10:04Z","timestamp":1761930604000},"page":"119-126","source":"Crossref","is-referenced-by-count":0,"title":["Multimodal Biometric Template Protection based on Deep Binary Encoding"],"prefix":"10.1109","author":[{"given":"Amber","family":"Hayat","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Delhi,Amar Nath &#x0026; Shashi Khosla School of Information Technology,New Delhi,India"}]},{"given":"Veeravalli","family":"Jasmitha","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Delhi,Amar Nath &#x0026; Shashi Khosla School of Information Technology,New Delhi,India"}]},{"given":"Dase","family":"Chaitraja","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Delhi,Amar Nath &#x0026; Shashi Khosla School of Information Technology,New Delhi,India"}]},{"given":"Vireshwar","family":"Kumar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Delhi,Amar Nath &#x0026; Shashi Khosla School of Information Technology,New Delhi,India"}]},{"given":"Ashok","family":"Kumar Bhateja","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Delhi,Amar Nath &#x0026; Shashi Khosla School of Information Technology,New Delhi,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.127646"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103876"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT61001.2024.10725431"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199799"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09314-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2015.58"},{"key":"ref8","first-page":"279","article-title":"Iris recognition based on multichannel gabor filtering","volume-title":"Proc. Fifth Asian Conf. Computer Vision","volume":"1","author":"Ma"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s20195523"},{"article-title":"Deep learning in the field of biometric template protection: An overview","year":"2023","author":"Rathgeb","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78110-0_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-03148-x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0291084"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18541-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/8112209"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s42044-022-00115-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2024.103869"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v13i1.6605"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04700-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_880"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16683-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3230212"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-5166-6_54"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-022-04456-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3205413"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-020-01873-x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9377901"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1086-8_27"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01046-6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s12596-024-01893-z"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2024.106006"},{"volume-title":"Multimodal-Cancelable-Template","key":"ref35"},{"article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","volume-title":"Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition","author":"Huang","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"}],"event":{"name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","start":{"date-parts":[[2025,7,16]]},"location":"Hangzhou, China","end":{"date-parts":[[2025,7,20]]}},"container-title":["2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11216429\/11216154\/11216557.pdf?arnumber=11216557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:12:13Z","timestamp":1761977533000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11216557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,16]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/qrs-c65679.2025.00025","relation":{},"subject":[],"published":{"date-parts":[[2025,7,16]]}}}