{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:01:25Z","timestamp":1772643685464,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Biom. Behav. Identity Sci."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/tbiom.2021.3100639","type":"journal-article","created":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T20:01:20Z","timestamp":1627502480000},"page":"333-348","source":"Crossref","is-referenced-by-count":39,"title":["Stable Hash Generation for Efficient Privacy-Preserving Face Identification"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1732-148X","authenticated-orcid":false,"given":"Daile","family":"Osorio-Roig","sequence":"first","affiliation":[{"name":"da\/sec&#x2014;Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1901-9468","authenticated-orcid":false,"given":"Christian","family":"Rathgeb","sequence":"additional","affiliation":[{"name":"da\/sec&#x2014;Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4758-339X","authenticated-orcid":false,"given":"Pawel","family":"Drozdowski","sequence":"additional","affiliation":[{"name":"da\/sec&#x2014;Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9159-2923","authenticated-orcid":false,"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[{"name":"da\/sec&#x2014;Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Eurodac Storage Capacity Increased","year":"2016"},{"key":"ref2","volume-title":"Smart Borders","year":"2018"},{"key":"ref3","volume-title":"DHS\u2019s Automated Biometric Identification System IDENT\u2014The Heart of Biometric Visitor Identification in the USA","year":"2019"},{"key":"ref4","volume-title":"Aadhaar Technology and Architecture: Principles, Design. Best Practices and Key Lessons","author":"Dalwai","year":"2014"},{"key":"ref5","volume-title":"Role of Biometric Technology in Aadhaar Enrollment","year":"2012"},{"key":"ref6","volume-title":"Automated Fingerprint Identification System (AFIS)\u2014A Short History","year":"2019"},{"key":"ref7","volume-title":"CODIS\u2014NDIS Statistics","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC-SAS.2014.6967573"},{"key":"ref9","volume-title":"ISO\/IEC JTC1 SC37 Biometrics: Information Technology\u2014Vocabulary\u2014Part 37: Biometrics","year":"2017"},{"key":"ref10","volume-title":"ISO\/IEC JTC1 SC37 Biometrics: Information Technology\u2014Biometric Performance Testing and Reporting\u2014Part 2: Testing Methodologies for Technology and Scenario Evaluation","year":"2006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2019.0076"},{"key":"ref12","volume-title":"Aadhaar Dashboard","year":"2021"},{"key":"ref13","article-title":"Biometric decision landscapes","author":"Daugman","year":"2000"},{"key":"ref14","volume-title":"Regulation of the European Parliament and of the Council on the Protection of Individuals With Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation)","year":"2016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref17","volume-title":"ISO\/IEC JTC1 SC27 Security Techniques: Information Technology\u2014Security Techniques\u2014Biometric Information Protection","year":"2011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09197-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107277"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908456"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999656"},{"key":"ref22","first-page":"1","article-title":"On the application of homomorphic encryption to face identification","volume-title":"Proc. Int. Conf. Biometr. Special Interest Group (BIOSIG)","author":"Drozdowski"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2691578"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3139866"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2727048"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"ref27","volume-title":"ISO\/IEC JTC1 SC37 Biometrics: Information Technology\u2014Biometric Performance Testing and Reporting\u2014Part 1: Principles and Framework","year":"2021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.11.005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"ref30","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces Real-Life Images Detection, Alignment, Recognit.","author":"Huang"},{"key":"ref31","first-page":"518","article-title":"Similarity search in high dimensions via hashing","volume-title":"Proc. VLDB","author":"Gionis"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2009.80"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2007242"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339027"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2423693"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2719282"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2753172"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/11553939_162"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"ref40","article-title":"On the reliability of cancelable biometrics: Revisit the irreversibility","author":"Dong","year":"2019"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW52041.2021.00012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00411"},{"key":"ref43","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511721656"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2582166"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2679100"},{"key":"ref53","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume-title":"Proc. 5th Berkeley Symp. Mathe. Stat. Probab.","volume":"1","author":"MacQueen"},{"key":"ref54","volume-title":"Clustering by Means of Medoids in Statistical Data Analysis Based on the L1\u2013Norm and Related Methods.(Y. Dodge, D\u00fc.) Reports of the Faculty of Mathematics and Informatics","author":"Kaufman","year":"1987"},{"key":"ref55","first-page":"465","article-title":"Computing Gaussian mixture models with EM using equivalence constraints","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"16","author":"Shental"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1126\/science.1136800"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00146-6"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.378"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048756"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_1"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref62","article-title":"Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations","author":"Cheon","year":"2016"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451291"},{"key":"ref64","volume-title":"Microsoft Seal (Release 3.2)","year":"2019"},{"key":"ref65","first-page":"1","article-title":"Efficiency analysis of post-quantum-secure face template protection schemes based on homomorphic encryption","volume-title":"Proc. Int. Conf. Biometr. Special Interest Group (BIOSIG)","author":"Kolberg"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2977215"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987255"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00700"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"}],"container-title":["IEEE Transactions on Biometrics, Behavior, and Identity Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8423754\/9833477\/09499112.pdf?arnumber=9499112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:01:01Z","timestamp":1705017661000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9499112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":70,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbiom.2021.3100639","relation":{},"ISSN":["2637-6407"],"issn-type":[{"value":"2637-6407","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}