iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3484274.3484292
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:43:44Z","timestamp":1730324624571,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["WUT:2021III029JC"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,13]]},"DOI":"10.1145\/3484274.3484292","type":"proceedings-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T23:17:06Z","timestamp":1637709426000},"page":"112-118","source":"Crossref","is-referenced-by-count":2,"title":["Face Template Protection through Residual Learning Based Error-Correcting Codes"],"prefix":"10.1145","author":[{"given":"Junwei","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Wuhan University of Technology, China"}]},{"given":"Delong","family":"Shang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Wuhan University of Technology, China"}]},{"given":"Huile","family":"Lang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Wuhan University of Technology, China"}]},{"given":"Guodong","family":"Ye","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Guangdong Ocean University, China"}]},{"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Wuhan University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2307002"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2018.5156"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0029"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Thao\u00a0M. Dang Lam Tran Thuc\u00a0Dinh Nguyen and Deokjai Choi. 2020. FEHash: Full entropy hash for face template protection. (2020) 3527\u20133536. https:\/\/doi.org\/10.1109\/CVPRW50498.2020.00413 Thao\u00a0M. Dang Lam Tran Thuc\u00a0Dinh Nguyen and Deokjai Choi. 2020. FEHash: Full entropy hash for face template protection. (2020) 3527\u20133536. https:\/\/doi.org\/10.1109\/CVPRW50498.2020.00413","DOI":"10.1109\/CVPRW50498.2020.00413"},{"volume-title":"Imagenet: A large-scale hierarchical image database.","year":"2009","author":"Deng Jia","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2170422"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2038760"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.927464"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Marta Gomez-Barrero Christian Rathgeb Javier Galbally Julian Fierrez and Christoph Busch. 2014. Protected facial biometric templates based on local Gabor patterns and adaptive bloom filters. (2014) 4483\u20134488. https:\/\/doi.org\/10.1109\/ICPR.2014.767 Marta Gomez-Barrero Christian Rathgeb Javier Galbally Julian Fierrez and Christoph Busch. 2014. Protected facial biometric templates based on local Gabor patterns and adaptive bloom filters. (2014) 4483\u20134488. https:\/\/doi.org\/10.1109\/ICPR.2014.767","DOI":"10.1109\/ICPR.2014.767"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. (2016) 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90 Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. (2016) 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Santosh\u00a0Kumar Jami Srinivasa\u00a0Rao Chalamala and Arun\u00a0Kumar Jindal. 2019. Biometric template protection through adversarial learning. (2019) 1\u20136. https:\/\/doi.org\/10.1109\/ICCE.2019.8661905 Santosh\u00a0Kumar Jami Srinivasa\u00a0Rao Chalamala and Arun\u00a0Kumar Jindal. 2019. Biometric template protection through adversarial learning. (2019) 1\u20136. https:\/\/doi.org\/10.1109\/ICCE.2019.8661905","DOI":"10.1109\/ICCE.2019.8661905"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Arun\u00a0Kumar Jindal Srinivasa\u00a0Rao Chalamala and Santosh\u00a0Kumar Jami. 2019. Securing face templates using deep convolutional neural network and random projection. (2019) 1\u20136. https:\/\/doi.org\/10.1109\/ICCE.2019.8662094 Arun\u00a0Kumar Jindal Srinivasa\u00a0Rao Chalamala and Santosh\u00a0Kumar Jami. 2019. Securing face templates using deep convolutional neural network and random projection. (2019) 1\u20136. https:\/\/doi.org\/10.1109\/ICCE.2019.8662094","DOI":"10.1109\/ICCE.2019.8662094"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2933-6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2091637"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Arun Kumar\u00a0Jindal Srinivas Chalamala and Santosh Kumar\u00a0Jami. 2018. Face template protection using deep convolutional neural network. (2018) 575\u20135758. https:\/\/doi.org\/10.1109\/CVPRW.2018.00087 Arun Kumar\u00a0Jindal Srinivas Chalamala and Santosh Kumar\u00a0Jami. 2018. Face template protection using deep convolutional neural network. (2018) 575\u20135758. https:\/\/doi.org\/10.1109\/CVPRW.2018.00087","DOI":"10.1109\/CVPRW.2018.00087"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Patrick Lacharme Estelle Cherrier and Christophe Rosenberger. 2013. Preimage attack on BioHashing. (2013) 1\u20138. https:\/\/doi.org\/10.5220\/0004524103630370 Patrick Lacharme Estelle Cherrier and Christophe Rosenberger. 2013. Preimage attack on BioHashing. (2013) 1\u20138. https:\/\/doi.org\/10.5220\/0004524103630370","DOI":"10.5220\/0004524103630370"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.1.1.38-42"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.92"},{"key":"e_1_3_2_1_22_1","unstructured":"Min Lin Qiang Chen and Shuicheng Yan. 2014. Network in network. (2014). http:\/\/arxiv.org\/abs\/1312.4400 Min Lin Qiang Chen and Shuicheng Yan. 2014. Network in network. (2014). http:\/\/arxiv.org\/abs\/1312.4400"},{"volume-title":"Support Vector Machines and 3D Face Models. Journal of Advances in Information Technology","year":"2020","author":"Augusto\u00a0Cadena Moreano Jos\u00e9","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Rohit\u00a0Kumar Pandey Yingbo Zhou Bhargava\u00a0Urala Kota and Venu Govindaraju. 2016. Deep secure encoding for face template protection. (2016) 77\u201383. https:\/\/doi.org\/10.1109\/CVPRW.2016.17 Rohit\u00a0Kumar Pandey Yingbo Zhou Bhargava\u00a0Urala Kota and Venu Govindaraju. 2016. Deep secure encoding for face template protection. (2016) 77\u201383. https:\/\/doi.org\/10.1109\/CVPRW.2016.17","DOI":"10.1109\/CVPRW.2016.17"},{"key":"e_1_3_2_1_25_1","article-title":"A dynamic unconstrained feature matching algorithm for face recognition","volume":"11","author":"Patil G","year":"2020","journal-title":"Journal of Advances in Information Technology"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Nalini\u00a0K Ratha. 2010. Privacy protection in high security biometrics applications. (2010) 62\u201369. https:\/\/doi.org\/10.1007\/978-3-642-12595-9_9 Nalini\u00a0K Ratha. 2010. Privacy protection in high security biometrics applications. (2010) 62\u201369. https:\/\/doi.org\/10.1007\/978-3-642-12595-9_9","DOI":"10.1007\/978-3-642-12595-9_9"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001417560043"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-017-0723-3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2002.1004130"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Veeru Talreja Matthew\u00a0C. Valenti and Nasser\u00a0M. Nasrabadi. 2019. Zero-shot deep hashing and neural network based error correction for face template protection. (2019) 1\u201310. https:\/\/doi.org\/10.1109\/BTAS46853.2019.9185979 Veeru Talreja Matthew\u00a0C. Valenti and Nasser\u00a0M. Nasrabadi. 2019. Zero-shot deep hashing and neural network based error correction for face template protection. (2019) 1\u201310. https:\/\/doi.org\/10.1109\/BTAS46853.2019.9185979","DOI":"10.1109\/BTAS46853.2019.9185979"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2042645"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.11.005"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2017.01.009"}],"event":{"name":"ICCCV'21: 2021 4th International Conference on Control and Computer Vision","acronym":"ICCCV'21","location":"Macau China"},"container-title":["2021 4th International Conference on Control and Computer Vision"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484274.3484292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T23:19:58Z","timestamp":1638919198000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484274.3484292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,13]]},"references-count":34,"alternative-id":["10.1145\/3484274.3484292","10.1145\/3484274"],"URL":"https:\/\/doi.org\/10.1145\/3484274.3484292","relation":{},"subject":[],"published":{"date-parts":[[2021,8,13]]}}}