{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:46:34Z","timestamp":1778694394228,"version":"3.51.4"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100014364","name":"Samsung Science and Technology Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014364","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004358","name":"Samsung","doi-asserted-by":"publisher","award":["202300000002564"],"award-info":[{"award-number":["202300000002564"]}],"id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Secure Multi-party Approximate Computation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1109\/tdsc.2025.3637307","type":"journal-article","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:06:58Z","timestamp":1764184018000},"page":"3477-3494","source":"Crossref","is-referenced-by-count":1,"title":["On the Reversibility of Locality-Sensitive Hashing-Based Biometric Template Protections"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1105-1607","authenticated-orcid":false,"given":"Seunghun","family":"Paik","sequence":"first","affiliation":[{"name":"Department of Mathematics &#x0026; Research Institute for Natural Sciences, Hanyang University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0789-1316","authenticated-orcid":false,"given":"Chanwoo","family":"Hwang","sequence":"additional","affiliation":[{"name":"Department of Mathematics &#x0026; Research Institute for Natural Sciences, Hanyang University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7767-4084","authenticated-orcid":false,"given":"Sunpill","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Mathematics &#x0026; Research Institute for Natural Sciences, Hanyang University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0547-5702","authenticated-orcid":false,"given":"Jae Hong","family":"Seo","sequence":"additional","affiliation":[{"name":"Department of Mathematics &#x0026; Research Institute for Natural Sciences, Hanyang University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"535","article-title":"Security analysis on locality-sensitive hashing-based biometric template protection schemes","volume-title":"Proc. Brit. Mach. Vis. Conf.","author":"Paik"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2827389"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00617"},{"key":"ref4","first-page":"12703","article-title":"Face reconstruction from facial templates by learning latent space of a generator network","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Shahreza"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68238-5_34"},{"key":"ref6","article-title":"Darker than black-box: Face reconstruction from similarity queries","author":"Razzhigaev","year":"2021"},{"key":"ref7","article-title":"Realistic face reconstruction from deep embeddings","volume-title":"Proc. NeurIPS 2021 Workshop Privacy Mach. Learn.","author":"Vendrow"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103026"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8469-5_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73226-3_23"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP49359.2023.10223034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01160"},{"key":"ref13","article-title":"ISO 24745-biometric template protection","volume-title":"Proc. 1st Int. Biometric Perform. Testing Conf.","author":"Busch"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2753172"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3144854"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.10.035"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2019.8739179"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS49078.2020.9118594"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3073802"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-023-00137-0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2977533"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0011277100003283"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.102060"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW52041.2021.00012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00164"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2499725"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2961349"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185997"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612976"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"ref35","first-page":"1225","article-title":"Practical and optimal LSH for angular distance","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Andoni"},{"key":"ref36","article-title":"Hypercube LSH for approximate near neighbors","volume-title":"Proc. 42nd Int. Symp. Math. Found. Comput. Sci.","author":"Laarhoven"},{"key":"ref37","first-page":"31186","article-title":"Falconn++: A locality-sensitive filtering approach for approximate nearest neighbor search","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Pham"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref40","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptol. ePrint Arch."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3139866"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3680017"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i20.30200"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185979"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3009590"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01586"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2024.3485436"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.111336"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00036"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00794"},{"key":"ref53","first-page":"6849","article-title":"FaceObfuscator: Defending deep learning-based privacy attacks with gradient descent-resistant features in face recognition","volume-title":"Proc. USENIX Secur. Symp.","author":"Jin"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3229587"},{"key":"ref55","article-title":"Synthesis and reconstruction of fingerprints using generative adversarial networks","author":"Bouzaglo","year":"2022"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2013.06.003"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304866"},{"key":"ref58","first-page":"8026","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Paszke"},{"key":"ref59","first-page":"1","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces \u2018Real-Life\u2019 Images: Detection, Alignment, Recognit.","author":"Huang"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00401"},{"key":"ref62","article-title":"Insightface: 2D and 3D face analysis project","author":"Guo","year":"2024"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"ref65","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014"},{"key":"ref66","article-title":"RetinaFace: Single-stage dense face localisation in the wild","author":"Deng","year":"2019"},{"key":"ref67","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"Radford","year":"2015"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01035"},{"key":"ref69","article-title":"SphereFace2: Binary classification is all you need for deep face recognition","author":"Wen","year":"2021"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3159732"},{"key":"ref71","article-title":"Face transformer for recognition","author":"Zhong","year":"2021"},{"key":"ref72","article-title":"Amazon rekognition","year":"2023"},{"key":"ref73","article-title":"Tencent cloud","year":"2024"},{"key":"ref74","article-title":"Opensphere","author":"Liu","year":"2023"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72913-3_14"},{"key":"ref76","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Ho"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG58226.2023.10346008"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_1"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00161"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11434575\/11269699.pdf?arnumber=11269699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T01:15:14Z","timestamp":1773710114000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11269699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":79,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3637307","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]}}}