{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:00Z","timestamp":1740122820863,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"28-29","license":[{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11042-021-10936-7","type":"journal-article","created":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T08:02:54Z","timestamp":1624608174000},"page":"36059-36091","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["S-DCTNet: Security-oriented biometric feature extraction technique"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8989-6656","authenticated-orcid":false,"given":"Mohamed Yassine","family":"Haouam","sequence":"first","affiliation":[]},{"given":"Abdallah","family":"Meraoumia","sequence":"additional","affiliation":[]},{"given":"Lakhdar","family":"Laimeche","sequence":"additional","affiliation":[]},{"given":"Issam","family":"Bendib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,25]]},"reference":[{"key":"10936_CR1","doi-asserted-by":"crossref","unstructured":"Abdellatef E, Ismail NA, Abd Elrahman SE, Ismail KN, Rihan M, Abd ElSamie FE (2019) Cancelable multi-biometric recognition system based on deep learning. In: The visual computer international journal of computer graphics, Springer Link","DOI":"10.1007\/s00371-019-01715-5"},{"key":"10936_CR2","doi-asserted-by":"crossref","unstructured":"Azzouz A, Duhr R, Hasler M (1984) Bifurcation diagram for a piecewise-linear circuit. EEE Trans Circ Syst 31(6)","DOI":"10.1109\/TCS.1984.1085540"},{"issue":"3","key":"10936_CR3","doi-asserted-by":"publisher","first-page":"033008","DOI":"10.1117\/1.JEI.27.3.033008","volume":"27","author":"H Bendjenna","year":"2018","unstructured":"Bendjenna H, Meraoumia A, Chergui O (2018) Pattern recognition system: From classical methods to deep learning techniques. J Electron Imaging 27(3):033008","journal-title":"J Electron Imaging"},{"key":"10936_CR4","doi-asserted-by":"crossref","unstructured":"Bhatnagar G, Wu QMJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. Proceedings of the IEEE Transactions on Instrumentation and Measurement 61(4)","DOI":"10.1109\/TIM.2011.2179330"},{"issue":"2","key":"10936_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s00530-013-0323-3","volume":"20","author":"G Bhatnagar","year":"2014","unstructured":"Bhatnagar G, Wu QMJ (2014) Enhancing the transmission security of biometric images using chaotic encryp-tion. Multimed Syst 20(2):203\u2013214","journal-title":"Multimed Syst"},{"issue":"3","key":"10936_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/2968215","volume":"49","author":"J Blasco","year":"2016","unstructured":"Blasco J, Chen TM, Tapiador J, Peris-Lopez P (2016) A survey of wearable biometric recognition systems. ACM Comput Surv 49(3):43","journal-title":"ACM Comput Surv"},{"issue":"164","key":"10936_CR7","doi-asserted-by":"publisher","first-page":"124","DOI":"10.3390\/sym11020164","volume":"11","author":"T-Y Chai","year":"2019","unstructured":"Chai T-Y, Goi B-M, Tay Y-H, Jin Z (2019) A new design for Alignment-Free chaffed cancelable iris key binding scheme. Symmetry 2019 11(164):124. https:\/\/doi.org\/10.3390\/sym11020164","journal-title":"Symmetry 2019"},{"key":"10936_CR8","doi-asserted-by":"crossref","unstructured":"Coelho DF, Cintra RJ, Dimitrov VS (2018) Efficient computation of the 8-point DCT via summation by parts. In: J Signal Process Syst, vol 90, pp 1\u201310","DOI":"10.1007\/s11265-017-1270-6"},{"issue":"2","key":"10936_CR9","first-page":"331","volume":"15","author":"TK Dang","year":"2018","unstructured":"Dang TK, Huynh VQP, Truong QH (2018) A hybrid template protection approach using secure sketch and ann for strong biometric key generation with revocability guarantee. Int Arab J Inf Technol (IAJIT 15(2):331\u2013340","journal-title":"Int Arab J Inf Technol (IAJIT"},{"issue":"3","key":"10936_CR10","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1049\/iet-bmt.2015.0029","volume":"5","author":"TK Dang","year":"2016","unstructured":"Dang TK, Truong QC, Bao Le TT, Truong H (2016) Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biom 5(3):229\u2013235. https:\/\/doi.org\/10.1049\/iet-bmt.2015.0029","journal-title":"IET Biom"},{"key":"10936_CR11","doi-asserted-by":"crossref","unstructured":"Dang T, Truong Q, Le T, Truong H (2016) Cancelable fuzzy vault with periodic transformation for biometric template protection. IET Biomet 5 (3):229\u2013235","DOI":"10.1049\/iet-bmt.2015.0029"},{"key":"10936_CR12","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/j.cose.2016.10.004","volume":"65","author":"R Dwivedi","year":"2017","unstructured":"Dwivedi R, Dey S, Singh R et al (2017) A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Comput. Secur 65:373\u2013386","journal-title":"Comput. Secur"},{"key":"10936_CR13","doi-asserted-by":"crossref","unstructured":"Fu C, Li W-J, Meng Z-Y, Wang T, Li P-X (2013) A symmetric image encryption scheme using chaotic baker map and lorenz system. In: Ninth international conference on computational intelligence and security, Leshan. China","DOI":"10.1109\/CIS.2013.158"},{"key":"10936_CR14","doi-asserted-by":"crossref","unstructured":"Hamad N, Rahman M, Islam S (2017) Novel re-mote authentication protocol using heart-signals with chaos cryptography. In: International conference on informat- ics, health & technology (ICIHT). Riyadh, Saudi Arabia, pp 1\u20137","DOI":"10.1109\/ICIHT.2017.7899143"},{"key":"10936_CR15","unstructured":"Hong Kong Polytechnic University (PolyU) (2013) Multispectral palmprint database. In: http:\/\/www.comp.polyu.edu.hk\/~biometrics"},{"key":"10936_CR16","doi-asserted-by":"crossref","unstructured":"Hsiao HI, Lee J (2013) A novel fingerprint image encryption algorithm based on chaos using APFM nonlinear adaptive filter. In: Proceedings of the IEEE 17th International Symposium on Consumer Electronics (ISCE \u201913). Hsinchu, Taiwan, pp 95\u201396","DOI":"10.1109\/ISCE.2013.6570271"},{"key":"10936_CR17","doi-asserted-by":"crossref","unstructured":"Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. In: EURASIP Journal on advances in signal processing, p 113","DOI":"10.1155\/2008\/579416"},{"key":"10936_CR18","doi-asserted-by":"crossref","unstructured":"Jang YK, Cho NL (2019) Deep face image retrieval for cancelable biometric authentication. In: Proceedings of the 16th IEEE international conference on advanced video and signal based surveillance (AVSS)","DOI":"10.1109\/AVSS.2019.8909878"},{"key":"10936_CR19","doi-asserted-by":"publisher","unstructured":"Jeong JY, Ik RJ (2019) Efficient cancelable iris template generation for wearable sensors. In: Security and communication networks, hindawi, volume 2019, article ID 7473591. https:\/\/doi.org\/10.1155\/2019\/7473591, pp 1\u201313","DOI":"10.1155\/2019\/7473591"},{"key":"10936_CR20","doi-asserted-by":"crossref","unstructured":"Jindal AK, Chalamala S, Jami SK (2018) Face template protection using deep convolutional neural network. In: IEEE\/CVF Conference on computer vision and pattern recognition workshops (CVPRW)","DOI":"10.1109\/CVPRW.2018.00087"},{"key":"10936_CR21","doi-asserted-by":"crossref","unstructured":"Kurban OC, Yildirim T, Bilgic A (2017) A multi-biometric recognition system based on deep features of face and gesture energy image. In: INISTA, pp 361\u2013364","DOI":"10.1109\/INISTA.2017.8001186"},{"key":"10936_CR22","doi-asserted-by":"crossref","unstructured":"Li X, Jiang Y, Chen M, Li F (2018) Research on iris image encryption based on deep learning. EURASIP Journal on Image and Video Processing (126)","DOI":"10.1186\/s13640-018-0358-7"},{"key":"10936_CR23","doi-asserted-by":"publisher","first-page":"11947","DOI":"10.1007\/s11042-019-08446-8","volume":"79","author":"H Li","year":"2020","unstructured":"Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme based on randomized cuckoo hashing and MinHash. Multimed tools appl 79:11947\u201311971. https:\/\/doi.org\/10.1007\/s11042-019-08446-8","journal-title":"Multimed tools appl"},{"key":"10936_CR24","doi-asserted-by":"publisher","first-page":"2257","DOI":"10.1007\/s00500-017-2487-9","volume":"22","author":"Y Liu","year":"2017","unstructured":"Liu Y, Ling J, Liu Z, Shen J, Gao C (2017) Finger vein secure biometric template generation based on deep learning. Soft Comput 22:2257\u20132265","journal-title":"Soft Comput"},{"key":"10936_CR25","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of Applied Cryptography. CRC Press, Boca Raton"},{"key":"10936_CR26","doi-asserted-by":"crossref","unstructured":"Nanni L, Ghidoni S, Brahnam S (2017) Handcrafted vs. nonhandcrafted features for computer vision classification. In: Pattern recognition, vol 71, pp 158\u2013172","DOI":"10.1016\/j.patcog.2017.05.025"},{"key":"10936_CR27","doi-asserted-by":"crossref","unstructured":"Ng CJ, Teoh ABJ (2015) DCTNet. A simple learning-free approach for face recognition. In: IEEE signal and information processing association annual summit and Conf. (APSIPA \u201915), pp 761\u2013768","DOI":"10.1109\/APSIPA.2015.7415375"},{"key":"10936_CR28","doi-asserted-by":"crossref","unstructured":"Phartchayanusit V, Rongviriyapanish S (2018) Safety property analysis of service-oriented IoT based on interval timed coloured petri nets. In: 15th international joint conference on computer science and software engineering (JCSSE)","DOI":"10.1109\/JCSSE.2018.8457326"},{"key":"10936_CR29","doi-asserted-by":"publisher","first-page":"11152","DOI":"10.1109\/ACCESS.2020.2965165","volume":"8","author":"W Ponce-Hernandez","year":"2020","unstructured":"Ponce-Hernandez W, Blanco-Gonzalo R, Liu-Jimenez J, Sanchez-Reillo R (2020) Fuzzy vault scheme based on Fixed-Length templates applied to dynamic signature verification. IEEE Access 8:11152\u201311164","journal-title":"IEEE Access"},{"key":"10936_CR30","doi-asserted-by":"crossref","unstructured":"Rajab H, Cinkelr T (2018) Iot based smart cities. In: International symposium on networks, computers and communications (ISNCC) Rome, Italy","DOI":"10.1109\/ISNCC.2018.8530997"},{"issue":"3","key":"10936_CR31","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614\u2013634","journal-title":"IBM Syst J"},{"key":"10936_CR32","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Gomez-Barrero M, Busch C, Galbally J, Fierrez J (2015) Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: 3rd international workshop on biometrics and forensics (IWBF)","DOI":"10.1109\/IWBF.2015.7110225"},{"key":"10936_CR33","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. In: EURASIP journal on information security","DOI":"10.1186\/1687-417X-2011-3"},{"key":"10936_CR34","doi-asserted-by":"crossref","unstructured":"Salami MJ, Eltahir W, Ali H (2011) Design and evaluation of a pressure based typing biometric authentication system. In: Riaz Z (ed) Biometric systems design and applications InTech, pp 235\u2013262","DOI":"10.5772\/17542"},{"key":"10936_CR35","doi-asserted-by":"crossref","unstructured":"Sallehuddin AFH, Ahmad MI, Ngadiran R, Isa MNM (2016) Score level normalization and fusion of iris recognition. In: 3rd international conference on electronic design (ICED). Phuket, Thailand, pp 464\u2013469","DOI":"10.1109\/ICED.2016.7804689"},{"key":"10936_CR36","doi-asserted-by":"publisher","unstructured":"Sarkar A, Singh BK (2018) Cryptographic key generation from cancelable fingerprint templates. In: 4th international conference on recent advances in information technology (RAIT), dhanbad, india. https:\/\/doi.org\/10.1109\/RAIT.2018.8389007, pp 1\u20136","DOI":"10.1109\/RAIT.2018.8389007"},{"key":"10936_CR37","doi-asserted-by":"crossref","unstructured":"Shahna K, Mohamed A (2018) An image encryption technique using logistic map and Z-Order curve. In: IEEE International conference on emerging trends and innovations in engineering and technological research (ICETIETR). Ernakulam, India, pp 1\u20136","DOI":"10.1109\/ICETIETR.2018.8529138"},{"key":"10936_CR38","doi-asserted-by":"crossref","unstructured":"Sujitha V, Chitra DA (2019) Novel technique for multi biometric cryptosystem using fuzzy vault. Int J Med Syst 43(112)","DOI":"10.1007\/s10916-019-1220-x"},{"key":"10936_CR39","doi-asserted-by":"crossref","unstructured":"Talreja V, Valenti MC, Nasrabadi NM (2017) Multibiometric secure system based on deep learning. In: IEEE Global conference on signal and information processing (global SIP)","DOI":"10.1109\/GlobalSIP.2017.8308652"},{"issue":"6","key":"10936_CR40","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: Issues and challenges. Proc IEEE 92(6):948\u2013960","journal-title":"Proc IEEE"},{"issue":"8","key":"10936_CR41","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1016\/j.patcog.2014.01.016","volume":"47","author":"J Unar","year":"2014","unstructured":"Unar J, Seng W, Abbasi A (2014) A review of biometric technology along with trends and prospects. Patt Recognit 47(8):2673\u20132688","journal-title":"Patt Recognit"},{"issue":"4","key":"10936_CR42","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1049\/iet-bmt.2018.5018","volume":"8","author":"GS Walia","year":"2018","unstructured":"Walia GS, Rishi S, Asthana R, Kumar A, Gupta A (2018) Secure multimodal biometric system based on diffused graphs and optimal score fusion. IET Biometrics 8(4):231\u2013242","journal-title":"IET Biometrics"},{"key":"10936_CR43","doi-asserted-by":"crossref","unstructured":"Wang P, Gao H, Cheng M, Ma X (2010) A new image encryption algorithm based on hyperchaotic mapping. In: International Conference on Computer Application and System Modeling (ICCASM). Taiyuan, China","DOI":"10.1109\/ICCASM.2010.5620122"},{"key":"10936_CR44","first-page":"6429","volume":"5","author":"X Wu","year":"2020","unstructured":"Wu X, Zhu B, Hu Y, Ran Y (2020) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. EEE Access 5:6429\u20136436","journal-title":"EEE Access"},{"issue":"5","key":"10936_CR45","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TIFS.2016.2636090","volume":"12","author":"J Yu","year":"2017","unstructured":"Yu J, Zhang B, Kuang Z, Lin D, Fan J (2017) iPrivacy: Image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans Inf Forens Secur 12(5):1005\u20131016","journal-title":"IEEE Trans Inf Forens Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10936-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10936-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10936-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T17:36:23Z","timestamp":1638293783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10936-7"}},"subtitle":["An effective pathway to secure and reliable biometric systems"],"short-title":[],"issued":{"date-parts":[[2021,6,25]]},"references-count":45,"journal-issue":{"issue":"28-29","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["10936"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10936-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,6,25]]},"assertion":[{"value":"29 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}