{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:33:07Z","timestamp":1772645587435,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"ERDF\u2014European Regional Development Fund through the Operational Programme for Competitiveness and Internationalization\u2014COMPETE 2020 Programme"},{"DOI":"10.13039\/501100001871","name":"National Funds through the Portuguese funding agency, FCT\u2014Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia;","doi-asserted-by":"publisher","award":["\u201cPOCI-01-0145-FEDER-030707\u201d"],"award-info":[{"award-number":["\u201cPOCI-01-0145-FEDER-030707\u201d"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"National Funds through the Portuguese funding agency, FCT\u2014Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia;","doi-asserted-by":"publisher","award":["\u201cSFRH\/BD\/137720\/2018.\u201d"],"award-info":[{"award-number":["\u201cSFRH\/BD\/137720\/2018.\u201d"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Biom. Behav. Identity Sci."],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1109\/tbiom.2020.3046620","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T20:42:02Z","timestamp":1608669722000},"page":"180-189","source":"Crossref","is-referenced-by-count":28,"title":["Secure Triplet Loss: Achieving Cancelability and Non-Linkability in End-to-End Deep Biometrics"],"prefix":"10.1109","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4956-5902","authenticated-orcid":false,"given":"Joao Ribeiro","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Miguel V.","family":"Correia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3760-2473","authenticated-orcid":false,"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.149"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.145"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185990"},{"key":"ref30","first-page":"1109","article-title":"Large scale online learning of image similarity through ranking","volume":"11","author":"chechik","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref37","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"Proc 3rd Int Conf Learn Represent"},{"key":"ref36","year":"2010","journal-title":"Normalized square euclidean distance"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1201\/9781351013437-11"},{"key":"ref34","first-page":"4278","article-title":"Inception-v4, inception-ResNet and the impact of residual connections on learning","author":"szegedy","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell (AAAI)"},{"key":"ref10","first-page":"173","article-title":"On the application of homomorphic encryption to face identification","author":"drozdowski","year":"2019","journal-title":"Proc Int Conf Biometr Special Interest Group (BIOSIG)"},{"key":"ref40","first-page":"9","article-title":"Sample estimate of the entropy of a random vector","volume":"23","author":"kozachenko","year":"1987","journal-title":"Problemy Peredachi Informatsii"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2360430"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995566"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(17)30138-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0045"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","article-title":"Biohashing: Two factor authentication featuring fingerprint data and tokenised random number","volume":"37","author":"teoh","year":"2004","journal-title":"Pattern Recognit"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1073170.1073191"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612976"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2015.7110225"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2016.7449672"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"ref27","first-page":"175","article-title":"Efficiency analysis of post-quantum-secure face template protection schemes based on homomorphic encryption","author":"kolberg","year":"2020","journal-title":"Proc Int Conf Biometr Special Interest Group (BIOSIG)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2849870"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.17"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.01.024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref8","first-page":"1","article-title":"Secure triplet loss for end-to-end deep biometrics","author":"pinto","year":"2020","journal-title":"Proc 8th Int Workshop Biometr Forensics (IWBF)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8308652"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1561\/0100000051","article-title":"Biometric security from an information-theoretical perspective","volume":"7","author":"ignatenko","year":"2012","journal-title":"Found Trends Commun Inf Theory"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.06.046"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.10.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26972-2_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553053"},{"key":"ref42","first-page":"176","article-title":"A comparison of multivariate mutual information estimators for feature selection","volume":"1","author":"doquire","year":"2012","journal-title":"Proc 1st Int Conf Pattern Recognit Appl Methods (ICPRAM)"},{"key":"ref24","article-title":"A fully homomorphic encryption scheme","author":"gentry","year":"2009"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066138"},{"key":"ref23","first-page":"1","article-title":"Secure face matching using fully homomorphic encryption","author":"boddeti","year":"2018","journal-title":"Proc IEEE Int Conf Biometr Theory Appl Syst (BTAS)"},{"key":"ref26","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133169"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"}],"container-title":["IEEE Transactions on Biometrics, Behavior, and Identity Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8423754\/9385568\/09302588.pdf?arnumber=9302588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:19Z","timestamp":1642003039000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9302588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":43,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbiom.2020.3046620","relation":{},"ISSN":["2637-6407"],"issn-type":[{"value":"2637-6407","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]}}}