{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:21:52Z","timestamp":1705958512749},"reference-count":32,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","license":[{"start":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T00:00:00Z","timestamp":1614729600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T00:00:00Z","timestamp":1614729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Biometrics"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1049\/bme2.12016","type":"journal-article","created":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T08:15:00Z","timestamp":1614759300000},"page":"260-274","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Generation of cancellable locality sampled codes from facial images"],"prefix":"10.1049","volume":"10","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9989-3464","authenticated-orcid":false,"given":"Debanjan","family":"Sadhya","sequence":"first","affiliation":[{"name":"ABV\u2010Indian Institute of Information Technology and Management Gwalior Gwalior India"}]},{"given":"Utkarsh","family":"Utsav","sequence":"additional","affiliation":[{"name":"ABV\u2010Indian Institute of Information Technology and Management Gwalior Gwalior India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5026-5416","authenticated-orcid":false,"given":"Zahid","family":"Akhtar","sequence":"additional","affiliation":[{"name":"State University of New York Polytechnic Institute Utica NY USA"}]}],"member":"265","published-online":{"date-parts":[[2021,3,3]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2384735"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0012"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2535120"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2434151"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0035"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2907014"},{"key":"e_1_2_9_11_1","unstructured":"Kannala J. Rahtu E.:Bsif: binarized statistical image features. InProceedings of the 21st international conference on pattern recognition (ICPR2012) pp.1363\u20131366(2012). IEEE"},{"key":"e_1_2_9_12_1","first-page":"1","article-title":"Cancelable biometrics: a comprehensive survey","author":"Manisha","year":"2019","journal-title":"Artif. Intell. Rev."},{"key":"e_1_2_9_13_1","doi-asserted-by":"crossref","unstructured":"Savvides M. Kumar B.V. Khosla P.K.:Cancelable biometric filters for face recognition. InProceedings of the 17th International Conference on Pattern Recognition 2004. ICPR 2004 vol.3 pp.922\u2013925(2004). IEEE","DOI":"10.1109\/ICPR.2004.1334679"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.10.025"},{"key":"e_1_2_9_15_1","unstructured":"Lacharme P. Cherrier E. Rosenberger C.:Preimage attack on biohashing. In2013 International Conference on Security and Cryptography (SECRYPT) pp.1\u20138.(2013). IEEE"},{"key":"e_1_2_9_16_1","doi-asserted-by":"crossref","unstructured":"Rathgeb C. Breitinger F. Busch C.:Alignment\u2010free cancelable iris biometric templates based on adaptive bloom filters. In2013 International Conference on Biometrics (ICB) pp.1\u20138(2013)","DOI":"10.1109\/ICB.2013.6612976"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.767"},{"key":"e_1_2_9_18_1","unstructured":"Hermans J. Mennink B. Peeters R.:When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system. In2014 International Conference of the Biometrics Special Interest Group (BIOSIG) pp.1\u20136(2014). IEEE"},{"key":"e_1_2_9_19_1","doi-asserted-by":"crossref","unstructured":"Bringer J. Morel C. Rathgeb C.:Security analysis of bloom filter\u2010based iris biometric template protectionin2015 International Conference on Biometrics (ICB) pp.527\u2013534(2015). IEEE","DOI":"10.1109\/ICB.2015.7139069"},{"key":"e_1_2_9_20_1","doi-asserted-by":"crossref","unstructured":"Jeong M. et\u00a0al.:Changeable biometrics for appearance based face recognition. In2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference pp.1\u20135(2006). IEEE","DOI":"10.1109\/BCC.2006.4341629"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.01.001"},{"key":"e_1_2_9_22_1","doi-asserted-by":"crossref","unstructured":"Kim Y. Toh K.\u2010A.:A method to enhance face biometric security. In2007 First IEEE International Conference on Biometrics: Theory Applications and Systems pp.1\u20136(2007). IEEE","DOI":"10.1109\/BTAS.2007.4401913"},{"key":"e_1_2_9_23_1","doi-asserted-by":"crossref","unstructured":"Sutcu Y. Sencar H.T. Memon N.:A secure biometric authentication scheme based on robust hashing. InProceedings of the 7th workshop on Multimedia and security pp.111\u2013116(2005). ACM","DOI":"10.1145\/1073170.1073191"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077829.3077833"},{"key":"e_1_2_9_25_1","doi-asserted-by":"crossref","unstructured":"Saito Y. et\u00a0al.:An efficient random unitary matrix for biometric template protection. In2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS) pp.366\u2013370(2016)","DOI":"10.1109\/SCIS-ISIS.2016.0082"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2855669"},{"key":"e_1_2_9_27_1","doi-asserted-by":"crossref","unstructured":"Charikar M.S.:Similarity estimation techniques from rounding algorithms. InProceedings of the Thiry\u2010Fourth Annual ACM Symposium on Theory of Computing STOC \u201902 pp.380\u2013388.Association for Computing Machinery New York NY USA)(2002)","DOI":"10.1145\/509907.509965"},{"key":"e_1_2_9_28_1","volume-title":"The AR face database","author":"Martinez A. M.","year":"1998"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"e_1_2_9_30_1","doi-asserted-by":"crossref","unstructured":"Rosenberger C. Brun L.:Similarity\u2010based matching for face authentication. In2008 19th International Conference on Pattern Recognition pp.1\u20134(2008). IEEE","DOI":"10.1109\/ICPR.2008.4761860"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.02.027"},{"issue":"1","key":"e_1_2_9_32_1","first-page":"14","article-title":"An illumination invariant face recognition by selection of DCT coefficients","volume":"10","author":"Thamizharasi A.","year":"2016","journal-title":"Int. J. Image Process"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"}],"container-title":["IET Biometrics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/bme2.12016","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/bme2.12016","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/bme2.12016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T05:49:14Z","timestamp":1677908954000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/bme2.12016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,3]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10.1049\/bme2.12016"],"URL":"https:\/\/doi.org\/10.1049\/bme2.12016","archive":["Portico"],"relation":{},"ISSN":["2047-4938","2047-4946"],"issn-type":[{"value":"2047-4938","type":"print"},{"value":"2047-4946","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,3]]},"assertion":[{"value":"2020-06-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}