{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:49Z","timestamp":1773511249337,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Brain Pool Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT","award":["2021H1D3A2A01099396"],"award-info":[{"award-number":["2021H1D3A2A01099396"]}]},{"name":"Open Research Fund from the Guangdong Laboratory of Artificial Intelligence and Digital Economy","award":["GML-KF-24-29"],"award-info":[{"award-number":["GML-KF-24-29"]}]},{"name":"NRF grant funded by the Korean Government [Ministry of Science, ICT and Future Planning (MSIP)]","award":["NRF-2022R1A2C1010710"],"award-info":[{"award-number":["NRF-2022R1A2C1010710"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Instrum. Meas."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tim.2024.3485436","type":"journal-article","created":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T17:46:47Z","timestamp":1729705607000},"page":"1-16","source":"Crossref","is-referenced-by-count":2,"title":["WiFaKey: Generating Cryptographic Keys From Face in the Wild"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9782-6068","authenticated-orcid":false,"given":"Xingbo","family":"Dong","sequence":"first","affiliation":[{"name":"School of Electrical and Electronic Engineering, College of Engineering, Yonsei University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2556-9423","authenticated-orcid":false,"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Anhui Provincial International Joint Research Center for Advanced Technology in Medical Imaging, Anhui Provincial Key Laboratory of Secure Artificial Intelligence, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6592-726X","authenticated-orcid":false,"given":"Yen Lung","family":"Lai","sequence":"additional","affiliation":[{"name":"Anhui Provincial International Joint Research Center for Advanced Technology in Medical Imaging, Anhui Provincial Key Laboratory of Secure Artificial Intelligence, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4501-7992","authenticated-orcid":false,"given":"Zhe","family":"Jin","sequence":"additional","affiliation":[{"name":"Anhui Provincial International Joint Research Center for Advanced Technology in Medical Imaging, Anhui Provincial Key Laboratory of Secure Artificial Intelligence, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5510-7046","authenticated-orcid":false,"given":"Junduan","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, South China Normal University, Foshan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9023-7252","authenticated-orcid":false,"given":"Wenxiong","family":"Kang","sequence":"additional","affiliation":[{"name":"School of Automation Science and Engineering and the School of Future Technology, South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5063-9484","authenticated-orcid":false,"given":"Andrew Beng Jin","family":"Teoh","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, College of Engineering, Yonsei University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3115212"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2028772"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374457-9.00025-1"},{"key":"ref4","volume-title":"General Data Protection Regulation (GDPR)","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3083970"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2997558"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2874245"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_60"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.048"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2037989"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3223141"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884092"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102539"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2804949"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401904"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref22","article-title":"Face transformer for recognition","author":"Zhong","year":"2021","journal-title":"arXiv:2103.14803"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01819"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01400"},{"key":"ref25","first-page":"1","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces Real-Life Images, Detection, Alignment, Recognit.","author":"Huang"},{"key":"ref26","article-title":"Cross-age LFW: A database for studying cross-age face recognition in unconstrained environments","author":"Zheng","year":"2017","journal-title":"arXiv:1708.08197"},{"key":"ref27","first-page":"7","article-title":"Cross-pose LFW: A database for studying cross-pose face recognition in unconstrained environments","volume":"5","author":"Zheng","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477558"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.250"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2002.1004130"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EUVIP.2010.5699103"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2007.4426824"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711456"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844182"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10334-x"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2018.5156"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484391"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/34.927464"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2011.5929223"},{"key":"ref42","article-title":"SHA-3 standard: Permutation-based hash and extendable-output functions","author":"Dworkin","year":"2015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451291"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.122"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057683"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056404"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852251"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006751"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3078488"},{"key":"ref50","volume-title":"Multiplexing and Channel Coding, Release 16","year":"2019"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00322"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01035"},{"key":"ref54","article-title":"Biometric decision landscapes","author":"Daugman","year":"2000"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00087"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3009590"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698601"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3442198"},{"key":"ref59","first-page":"1559","article-title":"Facial template protection via lattice-based fuzzy extractors","volume":"2021","author":"Zhang","year":"2021","journal-title":"Cryptol. ePrint Arch."},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2019.8739177"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3228494"},{"key":"ref62","article-title":"Reconstruct face from features using GAN generator as a distribution constraint","author":"Dong","year":"2022","journal-title":"arXiv:2206.04295"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG52210.2021.9548290"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2827389"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"}],"container-title":["IEEE Transactions on Instrumentation and Measurement"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/19\/10367905\/10731948.pdf?arnumber=10731948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T01:58:25Z","timestamp":1732672705000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10731948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/tim.2024.3485436","relation":{},"ISSN":["0018-9456","1557-9662"],"issn-type":[{"value":"0018-9456","type":"print"},{"value":"1557-9662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}