{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:05:14Z","timestamp":1773655514756,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fgr.2006.94","type":"proceedings-article","created":{"date-parts":[[2006,4,28]],"date-time":"2006-04-28T07:05:46Z","timestamp":1146207946000},"page":"560-566","source":"Crossref","is-referenced-by-count":65,"title":["Robust Distance Measures for Face-Recognition Supporting Revocable Biometric Tokens."],"prefix":"10.1109","author":[{"given":"T.","family":"Boult","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1137\/S0036144598345802","article-title":"Robust parameter estimation in computer vision","volume":"41","author":"stewart","year":"1999","journal-title":"SIAM Review"},{"key":"14","article-title":"Symmetric hash functions for fingerprint minutiae","author":"tulyakov","year":"2004","journal-title":"Biometrics Consortium Conference"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1117\/12.542997","article-title":"Authentication invariant cancelable correlation filters for illumination tolerant face recognition","volume":"5404","author":"savvides","year":"2004","journal-title":"Proc of SPIE Biometric Technology for Human Identification"},{"key":"12","article-title":"Biometric encryption","author":"soutar","year":"1999","journal-title":"ICSA Guide to Cryptography"},{"key":"3","first-page":"1","article-title":"Computation of cryptographic keys from face biometrics","author":"goh","year":"2003","journal-title":"Int Fed Info Proc"},{"key":"2","first-page":"304","article-title":"The CSU Face Identification Eval. System: Its Purpose, Features, and Structure","author":"bohne","year":"0","journal-title":"ICVS 2003"},{"key":"1","first-page":"1100","article-title":"Vulnerabilities in biometric encryption systems","volume":"3546","author":"adler","year":"2005","journal-title":"LNCS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"7","year":"2005"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1999.0833"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1198\/004017004000000563"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1002\/0471725250","author":"huber","year":"1981","journal-title":"Robust Statistics"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-72201-1_10"}],"event":{"name":"7th International Conference on Automatic Face and Gesture Recognition (FGR06)","location":"Southampton, UK"},"container-title":["7th International Conference on Automatic Face and Gesture Recognition (FGR06)"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/10739\/33863\/01613078.pdf?arnumber=1613078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T01:07:21Z","timestamp":1497661641000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/1613078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/fgr.2006.94","relation":{},"subject":[]}}