{"id":"https://openalex.org/W4416199260","doi":"https://doi.org/10.1186/s42400-025-00373-6","title":"A face template protection scheme based on chaotic map, error correction code and locality sensitive hashing","display_name":"A face template protection scheme based on chaotic map, error correction code and locality sensitive hashing","publication_year":2025,"publication_date":"2025-11-13","ids":{"openalex":"https://openalex.org/W4416199260","doi":"https://doi.org/10.1186/s42400-025-00373-6"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00373-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00373-6","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00373-6","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00373-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082779748","display_name":"Jinyuan Liu","orcid":"https://orcid.org/0000-0002-5471-5621"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]},{"id":"https://openalex.org/I168337820","display_name":"Chongqing University of Science and Technology","ror":"https://ror.org/03n3v6d52","country_code":"CN","type":"education","lineage":["https://openalex.org/I168337820"]},{"id":"https://openalex.org/I4210139215","display_name":"People's Government of Shaanxi Province","ror":"https://ror.org/03f546a26","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210139215"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinyuan Liu","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","Dazhou Key Laboratory of Government Data Security, Dazhou, 635000, China","School of Computer Science an Engineering, Chongqing University of Science and Technology, Chongqing, 401331, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"Dazhou Key Laboratory of Government Data Security, Dazhou, 635000, China","institution_ids":["https://openalex.org/I4210139215"]},{"raw_affiliation_string":"School of Computer Science an Engineering, Chongqing University of Science and Technology, Chongqing, 401331, China","institution_ids":["https://openalex.org/I168337820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052330166","display_name":"Yong Wang","orcid":"https://orcid.org/0000-0002-5247-043X"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Wang","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100366608","display_name":"Kun Wang","orcid":"https://orcid.org/0000-0001-7937-6155"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Wang","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100355525","display_name":"Zhuo Liu","orcid":"https://orcid.org/0000-0002-4013-5378"},"institutions":[{"id":"https://openalex.org/I4210087731","display_name":"Guizhou Education University","ror":"https://ror.org/002x6f380","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210087731"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuo Liu","raw_affiliation_strings":["School of Mathematics and Big Data, Guizhou Education University, Guiyang, 550018, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Big Data, Guizhou Education University, Guiyang, 550018, China","institution_ids":["https://openalex.org/I4210087731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082779748"],"corresponding_institution_ids":["https://openalex.org/I10535382","https://openalex.org/I168337820","https://openalex.org/I4210139215"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41248269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.6074000000953674,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.6074000000953674,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10057","display_name":"Face and Expression Recognition","score":0.11270000040531158,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.09229999780654907,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6312999725341797},{"id":"https://openalex.org/keywords/locality","display_name":"Locality","score":0.5859000086784363},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5575000047683716},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5554999709129333},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5508000254631042},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5436000227928162},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5343999862670898},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.5210000276565552},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.5156999826431274},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4745999872684479}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8003000020980835},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6312999725341797},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.5859000086784363},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5575000047683716},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5554999709129333},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5508000254631042},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5436000227928162},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5343999862670898},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.5210000276565552},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.5156999826431274},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4745999872684479},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.47130000591278076},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47110000252723694},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.43720000982284546},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4138000011444092},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3950999975204468},{"id":"https://openalex.org/C74270461","wikidata":"https://www.wikidata.org/wiki/Q1625299","display_name":"Locality-sensitive hashing","level":4,"score":0.35580000281333923},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35179999470710754},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3343000113964081},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.305400013923645},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30059999227523804},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2987000048160553},{"id":"https://openalex.org/C42276685","wikidata":"https://www.wikidata.org/wiki/Q795705","display_name":"BCH code","level":3,"score":0.29649999737739563},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29420000314712524},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28760001063346863},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2874999940395355},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2752000093460083},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C74370796","wikidata":"https://www.wikidata.org/wiki/Q15924863","display_name":"Signature recognition","level":3,"score":0.25949999690055847},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C150807984","wikidata":"https://www.wikidata.org/wiki/Q1992074","display_name":"Bit array","level":3,"score":0.25540000200271606}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00373-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00373-6","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00373-6","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:20ddc9848bbe4259920d0e6592420e4a","is_oa":true,"landing_page_url":"https://doaj.org/article/20ddc9848bbe4259920d0e6592420e4a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-14 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00373-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00373-6","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00373-6","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1871489870","display_name":null,"funder_award_id":"62272077","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2080136458","display_name":null,"funder_award_id":"cstc2021jcyj","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3126295818","display_name":null,"funder_award_id":"KJQN20230","funder_id":"https://openalex.org/F4320324805","funder_display_name":"Chongqing Municipal Education Commission"},{"id":"https://openalex.org/G3239092656","display_name":null,"funder_award_id":"cstc20","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5830261330","display_name":null,"funder_award_id":"jcyj-","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G657796369","display_name":null,"funder_award_id":"cstc2021jcyj-msxmX0557","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323172","display_name":"Natural Science Foundation of Chongqing","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324805","display_name":"Chongqing Municipal Education Commission","ror":"https://ror.org/031nm5713"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416199260.pdf","grobid_xml":"https://content.openalex.org/works/W4416199260.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W2056956712","https://openalex.org/W2083657195","https://openalex.org/W2111251300","https://openalex.org/W2150283722","https://openalex.org/W2475576463","https://openalex.org/W2755909956","https://openalex.org/W2793220310","https://openalex.org/W2793532186","https://openalex.org/W2798724621","https://openalex.org/W2804462675","https://openalex.org/W2883747428","https://openalex.org/W2891497694","https://openalex.org/W2941417170","https://openalex.org/W2953209524","https://openalex.org/W2963577021","https://openalex.org/W2963656031","https://openalex.org/W3002624958","https://openalex.org/W3010452742","https://openalex.org/W3033525260","https://openalex.org/W3035128681","https://openalex.org/W3036556627","https://openalex.org/W3045909547","https://openalex.org/W3049194808","https://openalex.org/W3121554117","https://openalex.org/W3126601808","https://openalex.org/W3159559944","https://openalex.org/W3161872650","https://openalex.org/W3169959898","https://openalex.org/W3173324345","https://openalex.org/W3186503362","https://openalex.org/W3201550447","https://openalex.org/W4229378653","https://openalex.org/W4297509773","https://openalex.org/W4321374265","https://openalex.org/W4386075507","https://openalex.org/W4386171875","https://openalex.org/W4388744484","https://openalex.org/W4390517532","https://openalex.org/W4392402387","https://openalex.org/W4400645442","https://openalex.org/W4404446697"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Face":[1],"recognition":[2,21],"has":[3,11,177],"been":[4],"widely":[5],"used":[6,141],"in":[7,19],"many":[8],"fields":[9],"and":[10,32,73,86,89,99,170,180,182],"become":[12],"an":[13],"important":[14,48],"identification":[15],"method.":[16],"The":[17,77],"templates":[18],"face":[20,60,190],"systems":[22],"are":[23,127],"associated":[24],"with":[25],"the":[26,42,51,90,106,118,124,135,144,150,156,175,189],"facial":[27],"biometric":[28,100,166],"features":[29],"of":[30,53,82,94],"users,":[31],"once":[33],"leaked,":[34],"it":[35,45],"will":[36],"pose":[37],"a":[38,58,104],"persistent":[39],"threat":[40],"to":[41,49,116,133,142,164],"users.":[43],"Therefore,":[44],"is":[46,64,110,153],"particularly":[47],"protect":[50],"security":[52],"templates.":[54],"In":[55],"this":[56],"work,":[57],"novel":[59],"template":[61],"protection":[62],"scheme":[63,78,176],"proposed":[65,157],"by":[66,112,129,155],"combining":[67],"chaotic":[68,114],"map,":[69],"error":[70,130],"correction":[71,131],"code":[72,132],"locality":[74,161],"sensitive":[75,162],"hashing.":[76],"utilizes":[79],"two":[80,95],"sets":[81],"parameters:":[83],"global":[84],"keys":[85,126,146],"user":[87,125,145],"keys,":[88],"generated":[91],"data":[92],"consists":[93],"parts:":[96],"storage":[97,136],"key":[98],"template.":[101,167,191],"When":[102],"generating":[103],"template,":[105],"extracted":[107],"feature":[108],"vector":[109,152],"permuted":[111,151],"using":[113],"sequences":[115],"disrupt":[117],"correlation":[119],"between":[120],"different":[121],"dimensions.":[122],"Then,":[123],"processed":[128,154],"generate":[134,165],"key,":[137],"which":[138],"can":[139,183],"be":[140],"recover":[143],"during":[147],"authentication.":[148],"Finally,":[149],"random":[158],"number":[159],"based":[160],"hashing":[163],"Experimental":[168],"results":[169],"theoretical":[171],"analysis":[172],"show":[173],"that":[174],"good":[178],"accuracy":[179],"security,":[181],"effectively":[184],"resist":[185],"various":[186],"attacks":[187],"on":[188]},"counts_by_year":[],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-11-13T00:00:00"}
