{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T14:38:41Z","timestamp":1718894321794},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11042-017-4528-x","type":"journal-article","created":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T09:47:19Z","timestamp":1488361639000},"page":"26979-27000","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Biometric-based cryptography for digital content protection without any key storage"],"prefix":"10.1007","volume":"78","author":[{"given":"Gaurang","family":"Panchal","sequence":"first","affiliation":[]},{"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[]},{"given":"Subhas","family":"Barman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,1]]},"reference":[{"key":"4528_CR1","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"FH Abn","year":"2006","unstructured":"Abn FH, Andersen R, Daugman J (2006) IEEE Trans Comput 55:1081","journal-title":"IEEE Trans Comput"},{"key":"4528_CR2","first-page":"2145","volume":"5","author":"A Beng","year":"2008","unstructured":"Beng A, Teoh J, Toh K (2008) 3rd IEEE Conference on Industrial Electronics and Applications 5:2145","journal-title":"3rd IEEE Conference on Industrial Electronics and Applications"},{"key":"4528_CR3","unstructured":"Chang Y, Zhung W, Chen T (2004) . In: IEEE Intl. Conf. on Multimedia and Expo, p 2203"},{"key":"4528_CR4","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2010.2103940","volume":"6","author":"H Choi","year":"2011","unstructured":"Choi H, Choi K, Kim J (2011) IEEE Trans Inf Forensics Secur 6:338","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4528_CR5","doi-asserted-by":"crossref","unstructured":"Condurache A, Mertins A (2011) . In: IEEE 2011 International Conference on Digital Image Computing Techniques and Applications (DICTA), pp 487\u2013493","DOI":"10.1109\/DICTA.2011.88"},{"key":"4528_CR6","unstructured":"Dahake P, Nimbhorkar S (2015) . In: 2015 International Conference on Pervasive Computing (ICPC), pp 1\u20135"},{"key":"4528_CR7","unstructured":"Disk Encryption. \n http:\/\/windows.microsoft.com\/en-in\/windows-8\/using-device-encryption"},{"issue":"1","key":"4528_CR8","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.patcog.2007.04.016","volume":"41","author":"J Feng","year":"2008","unstructured":"Feng J (2008) Pattern Recogn 41(1):342","journal-title":"Pattern Recogn"},{"key":"4528_CR9","unstructured":"FVC2004 Fingerprint Databases. \n http:\/\/bias.csr.unibo.it\/fvc2004\/Downloads"},{"issue":"2","key":"4528_CR10","first-page":"61","volume":"11","author":"S Gaddam","year":"2010","unstructured":"Gaddam S, Lal M (2010) Intl J of Network Security 11(2):61","journal-title":"Intl J of Network Security"},{"issue":"2","key":"4528_CR11","first-page":"9","volume":"11","author":"S Gaddam","year":"2010","unstructured":"Gaddam S, Lal M (2010) Intl J of Network Security 11(2):9","journal-title":"Intl J of Network Security"},{"issue":"4","key":"4528_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1049\/iet-bmt.2013.0065","volume":"3","author":"C Gottschlich","year":"2014","unstructured":"Gottschlich C, Huckemann S (2014) IET Biom 3(4):291","journal-title":"IET Biom"},{"key":"4528_CR13","doi-asserted-by":"publisher","first-page":"7905","DOI":"10.1016\/j.eswa.2015.06.025","volume":"42","author":"M Haghighat","year":"2015","unstructured":"Haghighat M, Zonouz S, Abdel-mottaleb M (2015) Elsevier (Expert Systems With Applications) 42:7905","journal-title":"Elsevier (Expert Systems With Applications)"},{"issue":"9","key":"4528_CR14","first-page":"1081","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao F, Anderson R, Daugman J (2006) IEEE TC 55(9):1081","journal-title":"IEEE TC"},{"key":"4528_CR15","unstructured":"Import or export certificates and private keys. \n http:\/\/windows.microsoft.com\/en-in\/windows\/import-export-certificates-private-keys"},{"key":"4528_CR16","first-page":"168","volume":"5","author":"A Jain","year":"2005","unstructured":"Jain A, Ross A, Uludag U (2005) European Signal Processing Conference 5:168","journal-title":"European Signal Processing Conference"},{"key":"4528_CR17","unstructured":"Jaganathan P, Rajinikannan M (2011) . In: 2011 International Conference on Logic, Information, Control and Computation. Springer-Verlag, Berlin Heidelberg, pp 281\u2013288"},{"key":"4528_CR18","unstructured":"Jianjiang F, Zhou J (2011) . In: 2011 International Conference on and-Based Biometrics (ICHB), pp 1\u20136"},{"key":"4528_CR19","doi-asserted-by":"crossref","unstructured":"Johannesson R, Zigangirov K (1999) Fundamentals of Convolutional Coding, 1999th edn Wiley-IEEE Press","DOI":"10.1109\/9780470544693"},{"key":"4528_CR20","doi-asserted-by":"crossref","unstructured":"Kanade S, Camara D, Krichen E, Petrovska-Delacretaz D, Dorizzi B (2008) . In: Proceedings of the 6th Biometrics Symposium (BSYM 2008) (Tampa, Florida USA), pp 59\u201364","DOI":"10.1109\/BSYM.2008.4655523"},{"key":"4528_CR21","unstructured":"Kanade S, Petrovska-Delacretaz D, Bernadette D (2009) . In: Proceedings of the 3rd IEEE International Conference on Biometrics: Theory, applications, and systems (BTAS) (washington, DC), pp 1\u20137"},{"key":"4528_CR22","unstructured":"Kanade S, Petrovska-Delacretaz D, Dorizzi B (2010) . In: Proceedings of the 4th IEEE International Conference on Biometrics: Theory applications and systems (BTAS) (washington, DC), pp 1\u20137"},{"key":"4528_CR23","first-page":"0975","volume":"4","author":"M Kaur","year":"2010","unstructured":"Kaur M, Sofat S, Saraswat D (2010) Int J Comput Appl 4:0975","journal-title":"Int J Comput Appl"},{"key":"4528_CR24","first-page":"47","volume":"9","author":"KSN Lalithamani","year":"2009","unstructured":"Lalithamani KSN (2009) IEEE Intl Conf on Adv in Recent Techn in Comm and Computing 9:47","journal-title":"IEEE Intl Conf on Adv in Recent Techn in Comm and Computing"},{"key":"4528_CR25","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/TIFS.2012.2234740","volume":"8","author":"AKS Li","year":"2013","unstructured":"Li A K S (2013) IEEE Trans Inf Forensics Secur 8:350","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"4528_CR26","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TIFS.2015.2505630","volume":"11","author":"C Li","year":"2016","unstructured":"Li C, Hu J (2016) IEEE Trans Inf Forensics Secur 11(3):543","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4528_CR27","unstructured":"Maheshwari R, Gupta A, Chandra A (2015) . In: 2nd Intl, Conf. on Computing for Sustainable Global Development (INDIACom), pp 1247\u20131250"},{"key":"4528_CR28","unstructured":"Microsoft Operating System. \n http:\/\/www.microsoft.com\/en-us\/windows"},{"issue":"3","key":"4528_CR29","first-page":"8","volume":"1","author":"I Msiza","year":"2011","unstructured":"Msiza I, Malumedzha T, Betechuoh B (2011) International Journal of Machine Learning and Computing 1(3):8","journal-title":"International Journal of Machine Learning and Computing"},{"key":"4528_CR30","doi-asserted-by":"publisher","first-page":"8198","DOI":"10.1016\/j.eswa.2015.06.035","volume":"42","author":"M Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar M, Cruz-Hernandez C, Abundiz-Perez F, Lopez-gutierrez R (2015) Elsevier (Expert Systems with Applications) 42:8198","journal-title":"Elsevier (Expert Systems with Applications)"},{"key":"4528_CR31","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2011.2166545","volume":"7","author":"A Nagar","year":"2012","unstructured":"Nagar A, Nandakumar K, Jain A (2012) IEEE Trans Inf Forensics Secur 7:255","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4528_CR32","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.jisa.2013.11.001","volume":"18","author":"T Nguyen","year":"2013","unstructured":"Nguyen T, Wanga Y, Li R (2013) Journal of Information Security and Applications (Elsevier) 18:206","journal-title":"Journal of Information Security and Applications (Elsevier)"},{"issue":"1","key":"4528_CR33","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1049\/iet-bmt.2014.0026","volume":"4","author":"T Nguyen","year":"2015","unstructured":"Nguyen T, Wang Y, Ha Y, Li R (2015) IET Biom 4(1):29","journal-title":"IET Biom"},{"key":"4528_CR34","unstructured":"(2013) NIST Special Database 4 (Fingerprint). \n http:\/\/www.nist.gov\/srd\/nistsd4.cfm"},{"key":"4528_CR35","unstructured":"Password protect documents, workbooks, and presentations. \n https:\/\/support.office.com\/en-au\/article\/Password-protect-documents"},{"key":"4528_CR36","unstructured":"Patil S, Bhagat K, Bhosale S, Deshmukh M (2015) . In: 2015 IEEE Intl. Conf. on Pervasive Computing (ICPC), pp 1\u20134"},{"key":"4528_CR37","doi-asserted-by":"publisher","first-page":"6562","DOI":"10.1016\/j.eswa.2011.12.048","volume":"39","author":"L Peng","year":"2012","unstructured":"Peng L, Xin Y, Hua Q, Kai C, Eryun L, Jie T (2012) Elsevier (Expert Systems With Applications) 39:6562","journal-title":"Elsevier (Expert Systems With Applications)"},{"issue":"4","key":"4528_CR38","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"N Ratha","year":"2007","unstructured":"Ratha N, Chikkerur S, Connell J, Bolle R (2007) IEEE Trans Pattern Anal Mach Intell 29(4):561","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4528_CR39","unstructured":"Ross A, Nandakumar K, Jain A (2006) Handbook of Multibiometrics (Springer-Verlag)"},{"key":"4528_CR40","unstructured":"Saggaf A, Lahouari G, Acharya S (2012) . In: IEEE National Workshop on Information Assurance Research, pp 1\u20135"},{"issue":"1","key":"4528_CR41","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1049\/iet-bmt.2011.0010","volume":"1","author":"N Short","year":"2012","unstructured":"Short N, Abbott A, Hsiao M, Fox E (2012) IET Biom 1(1):82","journal-title":"IET Biom"},{"issue":"4","key":"4528_CR42","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1049\/iet-bmt.2013.0020","volume":"3","author":"C Sousedik","year":"2014","unstructured":"Sousedik C, Busch C (2014) IET Biom 3(4):219","journal-title":"IET Biom"},{"key":"4528_CR43","unstructured":"Stallings W (2008) Cryptography and Network Security: Principles and Practice (Pearson)"},{"key":"4528_CR44","unstructured":"Steganography. \n https:\/\/en.wikipedia.org\/wiki\/Steganography"},{"key":"4528_CR45","unstructured":"Stinson D (1995) Crypto theory and practice CRC press"},{"key":"4528_CR46","unstructured":"Stoianov A (2010) . In: Proceedings of the 8th Annual International Conference on Privacy Security and Trust (PST) (Ottawa, ON), pp 231\u2013235"},{"key":"4528_CR47","unstructured":"The Encrypting File Sytem (EFS). \n https:\/\/technet.microsoft.com\/en-us\/library\/cc700811.aspx"},{"key":"4528_CR48","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2010.2043188","volume":"5","author":"M Upmanyu","year":"2010","unstructured":"Upmanyu M, Namboodiri A, Srinathan K, Jawahar C (2010) IEEE Trans Inf Forensics Secur 5:255","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4528_CR49","unstructured":"Wicker SB, Bhargava VK (1994) Reed-Solomon Codes and their applications IEEE press marketing"},{"issue":"3","key":"4528_CR50","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1016\/j.patcog.2013.10.001","volume":"47","author":"W Yang","year":"2014","unstructured":"Yang W, Jiankun H, Song W, Stojmenovic M (2014) Pattern Recogn (Elsevier) 47(3):1309","journal-title":"Pattern Recogn (Elsevier)"},{"key":"4528_CR51","doi-asserted-by":"crossref","unstructured":"Zhang B, Zhang S, Zhang J, Jing X (2011) . In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp 664\u2013669","DOI":"10.1109\/ICBNMT.2011.6156019"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4528-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4528-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4528-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T09:15:09Z","timestamp":1568106909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4528-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,1]]},"references-count":51,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["4528"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4528-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,1]]},"assertion":[{"value":"30 November 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}