{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T03:28:20Z","timestamp":1720754900954},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100017691","name":"Guangxi Key Research and Development Program","doi-asserted-by":"publisher","award":["2020AAA001","2022BAA050"],"id":[{"id":"10.13039\/501100017691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672398","61806151"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing Municipality","doi-asserted-by":"publisher","award":["CSTC2021JCYJ-MSXMX0002","CSTC2021JCYJ-MSXMX1146"],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012669","name":"Natural Science Foundation Project of Chongqing","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012669","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013142","name":"Key Research and Development Project of Hainan Province","doi-asserted-by":"publisher","award":["ZDYF2021GXJS014"],"id":[{"id":"10.13039\/501100013142","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.jisa.2023.103684","type":"journal-article","created":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T12:08:55Z","timestamp":1703592535000},"page":"103684","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["An effective iris biometric privacy protection scheme with renewability"],"prefix":"10.1016","volume":"80","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0355-4274","authenticated-orcid":false,"given":"Wiraj Udara","family":"Wickramaarachchi","sequence":"first","affiliation":[]},{"given":"Dongdong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Junwei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jianwen","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103684_bib0001","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.patrec.2015.12.013","article-title":"50 years of biometric research: accomplishments, challenges, and opportunities","volume":"79","author":"Jain","year":"2016","journal-title":"Pattern Recognit Lett"},{"issue":"5","key":"10.1016\/j.jisa.2023.103684_bib0002","doi-asserted-by":"crossref","DOI":"10.3390\/sym13050910","article-title":"Towards better performance for protected iris biometric system with confidence matrix","volume":"13","author":"Chai","year":"2021","journal-title":"Symmetry"},{"issue":"5","key":"10.1016\/j.jisa.2023.103684_bib0003","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","article-title":"Biometric template protection: bridging the performance gap between theory and practice","volume":"32","author":"Nandakumar","year":"2015","journal-title":"IEEE Signal Process Mag"},{"key":"10.1016\/j.jisa.2023.103684_bib0004","series-title":"ISO\/IEC 24745:2022 information security, cybersecurity and privacy protection \u2014 biometric information protection","year":"2022"},{"key":"10.1016\/j.jisa.2023.103684_bib0005","series-title":"Proceedings of the 2016 international conference on signal and information processing (IConSIP)","first-page":"1","article-title":"A variant of cancelable iris biometric based on BioHashing","author":"Meetei","year":"2016"},{"key":"10.1016\/j.jisa.2023.103684_bib0006","series-title":"Media forensics and security ii","first-page":"237","article-title":"Biometric template transformation: a security analysis","author":"Nagar","year":"2010"},{"key":"10.1016\/j.jisa.2023.103684_bib0007","doi-asserted-by":"crossref","first-page":"86392","DOI":"10.1109\/ACCESS.2021.3089078","article-title":"On the practicality of local ranking-based cancelable iris recognition","volume":"9","author":"Ouda","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103684_bib0008","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.future.2020.01.056","article-title":"An efficient novel approach for iris recognition based on stylometric features and machine learning techniques","volume":"107","author":"Adamovi\u0107","year":"2020","journal-title":"Future Gener Comput Syst"},{"issue":"sup1","key":"10.1016\/j.jisa.2023.103684_bib0009","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1080\/02564602.2018.1520153","article-title":"Data hiding in iris image for privacy protection","volume":"35","author":"Li","year":"2018","journal-title":"IETE Techn Rev"},{"key":"10.1016\/j.jisa.2023.103684_bib0010","doi-asserted-by":"crossref","DOI":"10.1155\/2018\/4519548","article-title":"Iris template protection based on local ranking","volume":"2018","author":"Zhao","year":"2018","journal-title":"Secur Commun Netw"},{"key":"10.1016\/j.jisa.2023.103684_bib0011","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.cose.2016.10.004","article-title":"A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping","volume":"65","author":"Dwivedi","year":"2017","journal-title":"Comput Secur"},{"key":"10.1016\/j.jisa.2023.103684_bib0012","series-title":"Proceedings of the 2018 26th European signal processing conference (EUSIPCO)","first-page":"2360","article-title":"Privacy-preserving indexing of iris-codes with cancelable bloom filter-based search structures","author":"Drozdowski","year":"2018"},{"key":"10.1016\/j.jisa.2023.103684_bib0013","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/OJCS.2021.3138332","article-title":"A privacy-preserving biometric authentication system with binary classification in a zero knowledge proof protocol","volume":"3","author":"Tran","year":"2022","journal-title":"IEEE Open J Comput Soc"},{"issue":"27","key":"10.1016\/j.jisa.2023.103684_bib0014","doi-asserted-by":"crossref","first-page":"19215","DOI":"10.1007\/s11042-020-08680-5","article-title":"Privacy-preserving iris authentication using fully homomorphic encryption","volume":"79","author":"Morampudi","year":"2020","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10.1016\/j.jisa.2023.103684_bib0015","doi-asserted-by":"crossref","first-page":"3703","DOI":"10.1007\/s11042-020-08663-6","article-title":"A novel cancellable Iris template generation based on salting approach","volume":"80","author":"Asaker","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2023.103684_bib0016","article-title":"A cancelable biometric authentication system based on feature-adaptive random projection","volume":"58","author":"Yang","year":"2021","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"10.1016\/j.jisa.2023.103684_bib0017","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/s12083-020-01046-6","article-title":"Cancelable Iris template for secure authentication based on random projection and double random phase encoding","volume":"14","author":"Rajasekar","year":"2021","journal-title":"Peer Peer Netw Appl"},{"issue":"3","key":"10.1016\/j.jisa.2023.103684_bib0018","first-page":"2521","article-title":"Cancelable Iris recognition system based on comb filter","volume":"79","author":"Soliman","year":"2019","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10.1016\/j.jisa.2023.103684_bib0019","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1049\/iet-bmt.2015.0111","article-title":"Biometric template protection based on Bloom filters and honey templates","volume":"6","author":"Martiri","year":"2017","journal-title":"IET Biometrics"},{"key":"10.1016\/j.jisa.2023.103684_bib0020","series-title":"Proceedings of the 2013 international conference on biometrics (ICB)","first-page":"1","article-title":"Alignment-free cancelable iris biometric templates based on adaptive bloom filters","author":"Rathgeb","year":"2013"},{"issue":"8","key":"10.1016\/j.jisa.2023.103684_bib0021","first-page":"5810","article-title":"A cancelable biometric identification scheme based on bloom filter and format-preserving encryption","volume":"34","author":"Bansal","year":"2022","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"5","key":"10.1016\/j.jisa.2023.103684_bib0022","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1049\/bme2.12075","article-title":"Hybrid biometric template protection: resolving the agony of choice between bloom filters and homomorphic encryption","volume":"11","author":"Bassit","year":"2022","journal-title":"IET Biometrics"},{"key":"10.1016\/j.jisa.2023.103684_bib0023","series-title":"Proceedings of the 2016 1st India international conference on information processing (IICIP)","first-page":"1","article-title":"Iris recognition using 2-D Gabor filter and XOR-SUM code","author":"Vyas","year":"2016"},{"key":"10.1016\/j.jisa.2023.103684_bib0024","series-title":"Proceedings of the 2019 IEEE 4th international conference on image, vision and computing (ICIVC)","first-page":"421","article-title":"Effective privacy-preserving iris recognition","author":"Wickramaarachchi","year":"2019"},{"issue":"16","key":"10.1016\/j.jisa.2023.103684_bib0025","doi-asserted-by":"crossref","first-page":"23217","DOI":"10.1007\/s11042-022-12655-z","article-title":"Block - XOR based cancellable template protection scheme for multi-instance iris biometric system","volume":"81","author":"Rafiq","year":"2022","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10.1016\/j.jisa.2023.103684_bib0026","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1007\/s11277-019-06688-1","article-title":"A novel privacy protection scheme for iris identification","volume":"109","author":"Lei","year":"2019","journal-title":"Wireless Pers Commun"},{"key":"10.1016\/j.jisa.2023.103684_bib0027","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ins.2017.04.026","article-title":"A novel cancelable iris recognition system based on feature learning techniques","volume":"406\u2013407","author":"Umer","year":"2017","journal-title":"Inf Sci"},{"issue":"7","key":"10.1016\/j.jisa.2023.103684_bib0028","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1016\/j.patcog.2005.10.025","article-title":"An analysis of BioHashing and its variants","volume":"39","author":"Kong","year":"2006","journal-title":"Pattern Recognit"},{"issue":"1","key":"10.1016\/j.jisa.2023.103684_bib0029","first-page":"1381","article-title":"The Construction of confidence bits to improve protected iris recognition system","volume":"11","author":"Chai","year":"2019","journal-title":"Int J Adv Soft Comput Appl"},{"issue":"11","key":"10.1016\/j.jisa.2023.103684_bib0030","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/34.244676","article-title":"High confidence visual recognition of persons by a test of statistical independence","volume":"15","author":"Daugman","year":"1993","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10.1016\/j.jisa.2023.103684_bib0031","unstructured":"J. Cruzan, \u201cLogistic functions,\u201d xaktly.com, 2012. https:\/\/xaktly.com\/LogisticFunctions.html (accessed May 11, 2022)."}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002685?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002685?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T03:45:39Z","timestamp":1705031139000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623002685"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":31,"alternative-id":["S2214212623002685"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103684","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An effective iris biometric privacy protection scheme with renewability","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103684","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103684"}}