{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:35Z","timestamp":1750308575854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Project of Beijing Municipal Education Commission","award":["No. SQKM201810009005"],"award-info":[{"award-number":["No. SQKM201810009005"]}]},{"name":"Science and Technology Innovation Service Capacity Building Project","award":["No. PXM2017-014212-000002"],"award-info":[{"award-number":["No. PXM2017-014212-000002"]}]},{"name":"High Innovation Program of Beijing","award":["No.2015000026833ZK04"],"award-info":[{"award-number":["No.2015000026833ZK04"]}]},{"name":"Beijing Natural Science Foundation","award":["No.4162022"],"award-info":[{"award-number":["No.4162022"]}]},{"name":"National Natural Foundation of China","award":["No. 61503005"],"award-info":[{"award-number":["No. 61503005"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,20]]},"DOI":"10.1145\/3175684.3175705","type":"proceedings-article","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T12:47:13Z","timestamp":1523278033000},"page":"141-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Facial Feature Based Secure Information Transmission"],"prefix":"10.1145","author":[{"given":"Chen","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science, North China University of Technology, Beijing, China"}]},{"given":"Yanjie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, North China University of Technology, Beijing, China"}]},{"given":"Simon","family":"Fong","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Macau, Macau, China"}]},{"given":"Chenhui","family":"Duan","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, School of Information and Electronics, Beijing, China"}]},{"given":"Wei","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science, North China University of Technology, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.08.024"},{"key":"e_1_3_2_1_2_1","unstructured":"Wu Z Tian L Li P etal 2016. Generating stable biometric keys for flexible cloud computing authentication using finger vein{J}. Information Sciences.  Wu Z Tian L Li P et al. 2016. Generating stable biometric keys for flexible cloud computing authentication using finger vein{J}. Information Sciences."},{"volume-title":"Biometric encryption{M}\/\/ Encyclopedia of Cryptography and Security","author":"Cavoukian A","key":"e_1_3_2_1_3_1","unstructured":"Cavoukian A , Stoiaov A. 2011. Biometric encryption{M}\/\/ Encyclopedia of Cryptography and Security . Springer US , 90--98. Cavoukian A, Stoiaov A. 2011. Biometric encryption{M}\/\/ Encyclopedia of Cryptography and Security. Springer US, 90--98."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Zhou Y Zhao B Han J etal 2017. An effective scheme for biometric cryptosystems{C}\/\/IEEE International Conference on Computer and Communications. IEEE.  Zhou Y Zhao B Han J et al. 2017. An effective scheme for biometric cryptosystems{C}\/\/IEEE International Conference on Computer and Communications. IEEE.","DOI":"10.1109\/CompComm.2016.7924701"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.01.002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"61","article-title":"Efficient Cancellable Biometric Key Generation Scheme for Cryptography","volume":"11","author":"Sunil V. K.","year":"2010","unstructured":"Sunil V. K. Gaddam and Manohar Lal. 2010 . Efficient Cancellable Biometric Key Generation Scheme for Cryptography . International Journal of Network Security , 11 ( 2 ): 61 -- 69 . Sunil V. K. Gaddam and Manohar Lal. 2010. Efficient Cancellable Biometric Key Generation Scheme for Cryptography. International Journal of Network Security,11(2):61--69.","journal-title":"International Journal of Network Security"},{"volume-title":"Electronics & Vision","author":"Andalib A S","key":"e_1_3_2_1_8_1","unstructured":"Andalib A S , Abdulla-Al-Shami M. 2013. A novel key generation scheme for biometric cryptosystems using fingerprint minutiae{C}\/\/International Conference on Informatics , Electronics & Vision . IEEE :1--6. Andalib A S, Abdulla-Al-Shami M. 2013. A novel key generation scheme for biometric cryptosystems using fingerprint minutiae{C}\/\/International Conference on Informatics, Electronics & Vision. IEEE:1--6."},{"key":"e_1_3_2_1_9_1","volume-title":"An Image Encryption Scheme Based on the Keys Generated by Biological Features and the Rijndael Algorithm. COMPUTER ENGINEERING AND SCIENCE","author":"Zhao Gang","year":"2009","unstructured":"Zhao Gang , Tang Zhen, Li Jian -ping. 2009. An Image Encryption Scheme Based on the Keys Generated by Biological Features and the Rijndael Algorithm. COMPUTER ENGINEERING AND SCIENCE . 2009 , 31(12):9--12. Zhao Gang, Tang Zhen, Li Jian-ping. 2009. An Image Encryption Scheme Based on the Keys Generated by Biological Features and the Rijndael Algorithm. COMPUTER ENGINEERING AND SCIENCE. 2009, 31(12):9--12."},{"issue":"13","key":"e_1_3_2_1_10_1","first-page":"177","article-title":"Face recognition based on Gabor feature and support vector guided dictionary learning","volume":"52","author":"Zhang Jianming","year":"2016","unstructured":"Zhang Jianming , Zhou Wei, Wu Honglin . 2016 . Face recognition based on Gabor feature and support vector guided dictionary learning . Computer Engineering and Applications , 52 ( 13 ): 177 -- 182 . Zhang Jianming, Zhou Wei, Wu Honglin. 2016. Face recognition based on Gabor feature and support vector guided dictionary learning. Computer Engineering and Applications, 52(13):177--182.","journal-title":"Computer Engineering and Applications"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2535254"}],"event":{"name":"BDIOT2017: International Conference on Big Data and Internet of Thing","acronym":"BDIOT2017","location":"London United Kingdom"},"container-title":["Proceedings of the International Conference on Big Data and Internet of Thing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3175684.3175705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:49Z","timestamp":1750273489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175705"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"references-count":11,"alternative-id":["10.1145\/3175684.3175705","10.1145\/3175684"],"URL":"https:\/\/doi.org\/10.1145\/3175684.3175705","relation":{},"subject":[],"published":{"date-parts":[[2017,12,20]]},"assertion":[{"value":"2017-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}