{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T06:33:35Z","timestamp":1724135615031},"reference-count":38,"publisher":"Institution of Engineering and Technology (IET)","issue":"13","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET image process"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1049\/iet-ipr.2019.0072","type":"journal-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T02:17:33Z","timestamp":1565317053000},"page":"2516-2528","source":"Crossref","is-referenced-by-count":18,"title":["Incorporating iris, fingerprint and face biometric for fraud prevention in e\u2010passports using fuzzy vault"],"prefix":"10.1049","volume":"13","author":[{"given":"Katarzyna","family":"Bobkowska","sequence":"first","affiliation":[{"name":"Department of Geodesy, Faculty of Civil and Environmental EngineeringGdansk University of TechnologyGdanskPoland"}]},{"given":"Khaled","family":"Nagaty","sequence":"additional","affiliation":[{"name":"Computer Science Department, Faculty of Informatics and Computer ScienceThe British University in EgyptCairoEgypt"}]},{"given":"Marek","family":"Przyborski","sequence":"additional","affiliation":[{"name":"Department of Geodesy, Faculty of Civil and Environmental EngineeringGdansk University of TechnologyGdanskPoland"}]}],"member":"265","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"key":"e_1_2_10_2_1","unstructured":"2016 Proc. Int. Conf.: SGEM2016 Sofia Bulgaria K Bobkowska A Janowski M Przyborski A new method of persons identification based on comparative analysis of 3d face models 767 774"},{"key":"e_1_2_10_3_1","unstructured":"2016 Proc. Int. Conf. Geodetic Congress (Geomatics) Baltic Gdansk K Bobkowska A Janowski M Przyborski Analysis of high resolution clouds of points as a source of biometric data 15 21"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.14"},{"key":"e_1_2_10_6_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-50673-9_9","volume-title":"Human factors in forensic face identification","author":"White D","year":"2017"},{"key":"e_1_2_10_7_1","unstructured":"2007 Proc. Int. Conf on Document Analysis and Recognition (ICDAR) Parana Brazil L. Schomaker Advances in writer identification and verification 1268 1273"},{"key":"e_1_2_10_8_1","unstructured":"2005 IEEE First Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks Athens Greece A. Juels D. David Molnar D. David Wagner Security and privacy issues in e\u2010passports"},{"key":"e_1_2_10_9_1","unstructured":"PattinsonN.: \u2018Securing and enhancing the privacy of the e\u2010passport with contactless electronic chips\u2019. Available at: pattison@axalto.com"},{"key":"e_1_2_10_10_1","unstructured":"JacobsB.: \u2018Biometry in passports\u2019. Availble at:http:\/\/www.sos.cs.ru.nl\/research\/society\/passport\/index.html"},{"key":"e_1_2_10_11_1","volume-title":"Tech. Rep. TR\u201003110","author":"BSI","year":"2006"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2008.05.008"},{"key":"e_1_2_10_13_1","unstructured":"2010 2nd Int. Workshop on Security and Communication Networks (IWSCN) Karlstad Sweden M. Abid S. Kanade D. Petrovska\u2010Delacretaz Iris based authentication mechanism for e\u2010passports"},{"issue":"2","key":"e_1_2_10_14_1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2011.37","article-title":"Securing e\u2010passports with elliptic curves","volume":"9","author":"Chabanne H.","year":"2011","journal-title":"IEEE Secur. Priv."},{"key":"e_1_2_10_15_1","first-page":"14","article-title":"An e\u2010passport system with multi\u2010stage authentication: a casestudy of the security of Sri Lanka's e\u2010passport","volume":"18","author":"Wimalasiri B","year":"2018","journal-title":"Global J. Comput. Sci. Technol."},{"key":"e_1_2_10_16_1","first-page":"24","article-title":"Comparison of various biometric methods","volume":"2","author":"Saini R","year":"2014","journal-title":"Int. J. Eng. Sci. Technol."},{"issue":"5","key":"e_1_2_10_17_1","first-page":"6115","article-title":"Review on image steganography","volume":"6","author":"Pandit A.S.","year":"2016","journal-title":"Int. J. Eng. Sci."},{"key":"e_1_2_10_18_1","unstructured":"2014 Proc. Int. Conf. on Issues and Challenges in Intelligent Computing Techniques (ICICT) Ghaziabad India N Akhtar S Khan P. Johri An improved inverted LSB image steganography 749 755"},{"issue":"7","key":"e_1_2_10_19_1","first-page":"363","article-title":"A secure image steganography based on RSA algorithm and hash\u2010LSB technique","volume":"3","author":"Kumar A","year":"2013","journal-title":"Proc. Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"issue":"20","key":"e_1_2_10_20_1","first-page":"15","article-title":"A steganography technique for hiding image in an image using LSB method for 24 bit color image","volume":"64","author":"Rawat D","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2014.04.014"},{"key":"e_1_2_10_22_1","unstructured":"2009 Proc. IEEE Region 10 Annual Int. Conf. (TENCON) Singapore R Bakhteri M.K.. Hani Biometric encryption using fingerprint fuzzy vault for FPGA\u2010based embedded systems"},{"issue":"2","key":"e_1_2_10_23_1","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s10845-012-0656-3","article-title":"A practical implementation of fuzzy fingerprint vault for smart cards","volume":"25","author":"Moon D","year":"2014","journal-title":"J. Intell. Manuf."},{"key":"e_1_2_10_24_1","unstructured":"2013 Proc. IEEE Int. Conf. on Signal Processing Communications and Computing (ICSPCC) KunMing China T.H. Nguyen Y Wang T.N. Nguyen A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm 1 6"},{"key":"e_1_2_10_25_1","unstructured":"2013 Proc. IEEE Int. Conf. on Technologies for Homeland Security (HST 2013) Waltham USA C Whitelam N Osia T. Bourlai Securing multimodal biometric data through watermarking and steganography 61 66"},{"issue":"23","key":"e_1_2_10_26_1","doi-asserted-by":"crossref","first-page":"4026","DOI":"10.1016\/j.ijleo.2015.07.161","article-title":"Robust information security system using steganography, orthogonal code and joint transform correlation","volume":"126","author":"Islam M.N.","year":"2015","journal-title":"Optik"},{"key":"e_1_2_10_27_1","unstructured":"2009 Proc. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR 2009) Miami USA N Agrawal M. Savvides Biometric data hiding: a 3 factor authentication approach to verify identity with a single image using steganography encryption and matching 85 92"},{"key":"e_1_2_10_28_1","first-page":"1","article-title":"A hybrid encryption\/hiding method for secure transmission of biometric data in multimodal authentication system","volume":"77","author":"Tarif E.B.","year":"2017","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"e_1_2_10_29_1","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10462-016-9459-9","article-title":"A new data hiding method based on chaos embedded genetic algorithm for color image","volume":"46","author":"Dogan L.","year":"2016","journal-title":"Artif. Intell. Rev."},{"key":"e_1_2_10_30_1","unstructured":"Karolinska: \u2018Directed Emotional Faces (KDFE)\u2019. Available at:http:\/\/kdfe.se"},{"key":"e_1_2_10_31_1","unstructured":"2005 Int. Conf. on Audio\u2010and Video\u2010Based Biometric Person Authentication Heidelberg Berlin U Uludag S Pankanti A.K.. Jain Fuzzy vault for fingerprints 310 319"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420018837"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"e_1_2_10_34_1","first-page":"I\u2010511","article-title":"Rapid object detection using a boosted cascade of simple features","volume":"1","author":"Viola P","year":"2001","journal-title":"Comput. Vis. Pattern Recognit."},{"key":"e_1_2_10_35_1","unstructured":"NarayananA.: \u2018Fingerprint minutiae extraction\u2019 2011. Available at:https:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/31926\u2010fingerprint\u2010minutiaeextraction\/content\/Fingerprint_Minutiae_Extraction\/Minutiae_Extraction.m"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"e_1_2_10_37_1","unstructured":"2004 Int. Conf. on Intelligent Sensing and Information Chennai India M. Vatsa R. Singh P. Gupta Comparison of iris recognition algorithms"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1117\/3.353798"},{"key":"e_1_2_10_39_1","first-page":"168","volume-title":"Document and image compression","author":"Hamzaoui R.","year":"2006"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2019.0072","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ipr.2019.0072","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2019.0072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T01:39:37Z","timestamp":1614735577000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ipr.2019.0072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":38,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["10.1049\/iet-ipr.2019.0072"],"URL":"https:\/\/doi.org\/10.1049\/iet-ipr.2019.0072","archive":["Portico"],"relation":{},"ISSN":["1751-9659","1751-9667"],"issn-type":[{"value":"1751-9659","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,23]]}}}