{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:03:36Z","timestamp":1730322216646,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,25]]},"DOI":"10.1145\/3386164.3389079","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:30:15Z","timestamp":1591493415000},"page":"1-8","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["All-encompassing Review of Biometric Information Protection in Fingerprints Based Steganography"],"prefix":"10.1145","author":[{"given":"Mohammed Mahdi","family":"Hashim","sequence":"first","affiliation":[{"name":"Uruk University, Baghdad, Iraq"}]},{"given":"Ahmed Kamal","family":"Mohsin","sequence":"additional","affiliation":[{"name":"Computer Engineering Techniques, Al-esra University, Baghdad, Iraq"}]},{"given":"Mohd Shafry Mohd","family":"Rahim","sequence":"additional","affiliation":[{"name":"University Technology Malaysia, Johor Bahru, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2017.04.013"},{"key":"e_1_3_2_1_2_1","first-page":"124","article-title":"Fingerprint analysis using termination and bifurcation minutiae","volume":"2","author":"Awasthi Vipul","year":"2012","unstructured":"Awasthi , Vipul , Vanchha Awasthi , and Krishna Kumari Tiwari . \" Fingerprint analysis using termination and bifurcation minutiae .\" International Journal of Emerging Technology and Advanced Engineering 2 ( 2012 ): 124 -- 130 . Awasthi, Vipul, Vanchha Awasthi, and Krishna Kumari Tiwari. \"Fingerprint analysis using termination and bifurcation minutiae.\" International Journal of Emerging Technology and Advanced Engineering 2 (2012): 124--30.","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.03.018"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-015-0020-1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2018.11.043"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Cheng Kevin HM and Ajay Kumar. \"Contactless Biometric Identification using 3D Finger Knuckle Patterns.\" IEEE transactions on pattern analysis and machine intelligence (2019). Cheng Kevin HM and Ajay Kumar. \"Contactless Biometric Identification using 3D Finger Knuckle Patterns.\" IEEE transactions on pattern analysis and machine intelligence (2019).","DOI":"10.1109\/TPAMI.2019.2904232"},{"issue":"17","key":"e_1_3_2_1_7_1","article-title":"A REVIEW AND OPEN ISSUES OF DIVERSE TEXT WATERMARKING TECHNIQUES IN SPATIAL DOMAIN","volume":"96","author":"SPATIAL.","year":"2018","unstructured":"DOMAIN, WATERMARKING TECHNIQUES IN SPATIAL. \" A REVIEW AND OPEN ISSUES OF DIVERSE TEXT WATERMARKING TECHNIQUES IN SPATIAL DOMAIN .\" Journal of Theoretical and Applied Information Technology 96 , no. 17 ( 2018 ). DOMAIN, WATERMARKING TECHNIQUES IN SPATIAL. \"A REVIEW AND OPEN ISSUES OF DIVERSE TEXT WATERMARKING TECHNIQUES IN SPATIAL DOMAIN.\" Journal of Theoretical and Applied Information Technology 96, no. 17 (2018).","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE","author":"Garg Mayank","year":"2015","unstructured":"Garg , Mayank , Shashikant Gupta , and Pallavi Khatri . \" Fingerprint watermarking and steganography for ATM transaction using LSB-RSA and 3-DWT algorithm.\" In 2015 International Conference on Communication Networks (ICCN), pp. 246--251 . IEEE , 2015 . Garg, Mayank, Shashikant Gupta, and Pallavi Khatri. \"Fingerprint watermarking and steganography for ATM transaction using LSB-RSA and 3-DWT algorithm.\" In 2015 International Conference on Communication Networks (ICCN), pp. 246--251. IEEE, 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"a Steganographic paradigm.\" Master's thesis in Computer Science and Engineering","author":"Goel Piyush","year":"2008","unstructured":"Goel , Piyush . \"Data hiding in digital images : a Steganographic paradigm.\" Master's thesis in Computer Science and Engineering , Indian Institute of Technology Kharagpur ( 2008 ). Goel, Piyush. \"Data hiding in digital images: a Steganographic paradigm.\" Master's thesis in Computer Science and Engineering, Indian Institute of Technology Kharagpur (2008)."},{"key":"e_1_3_2_1_10_1","first-page":"328","volume-title":"Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)","author":"Gupta Himanshu","year":"2016","unstructured":"Gupta , Himanshu , and Nupur Sharma . \"A model for biometric security using visual cryptography.\" In 2016 5th International Conference on Reliability , Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) , pp. 328 -- 332 . IEEE, 2016 . Gupta, Himanshu, and Nupur Sharma. \"A model for biometric security using visual cryptography.\" In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), pp. 328--332. IEEE, 2016."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2012.06.04"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-319-98734-7_3","volume-title":"Iris and Retina.\" In Biometric-Based Physical and Cybersecurity Systems","author":"H\u00e1jek Josef","year":"2019","unstructured":"H\u00e1jek , Josef , and Martin Drahansk\u00fd . \"Recognition-Based on Eye Biometrics : Iris and Retina.\" In Biometric-Based Physical and Cybersecurity Systems , pp. 37 -- 102 . Springer , Cham , 2019 . H\u00e1jek, Josef, and Martin Drahansk\u00fd. \"Recognition-Based on Eye Biometrics: Iris and Retina.\" In Biometric-Based Physical and Cybersecurity Systems, pp. 37--102. Springer, Cham, 2019."},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"2019 7th International Conference on Mechatronics Engineering (ICOM)","author":"Hashim M. M.","year":"2019","unstructured":"Hashim , M. M. , Mustafa Sabah Taha , Azana Hafizah Mohd Aman , Aisha Hassan Abdalla Hashim , Mohd Shafry Mohd Rahim , and Shayla Islam . \"Securing Medical Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography .\" In 2019 7th International Conference on Mechatronics Engineering (ICOM) , pp. 1 -- 6 . IEEE, 2019 . Hashim, M. M., Mustafa Sabah Taha, Azana Hafizah Mohd Aman, Aisha Hassan Abdalla Hashim, Mohd Shafry Mohd Rahim, and Shayla Islam. \"Securing Medical Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography.\" In 2019 7th International Conference on Mechatronics Engineering (ICOM), pp. 1--6. IEEE, 2019."},{"issue":"4","key":"e_1_3_2_1_14_1","first-page":"3505","article-title":"Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats","volume":"7","author":"Hashim Mohammed Mahdi","year":"2018","unstructured":"Hashim , Mohammed Mahdi , Mohd Shafry Mohd Rahim , Fadil Abass Johi , Mustafa Sabah Taha , and Hassan Salman Hamad . \" Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats .\" International Journal of Engineering & Technology 7 , no. 4 ( 2018 b): 3505 -- 3514 . Hashim, Mohammed Mahdi, Mohd Shafry Mohd Rahim, Fadil Abass Johi, Mustafa Sabah Taha, and Hassan Salman Hamad. \"Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats.\" International Journal of Engineering & Technology 7, no. 4 (2018 b): 3505--3514.","journal-title":"International Journal of Engineering & Technology"},{"issue":"4","key":"e_1_3_2_1_15_1","first-page":"4008","article-title":"An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching","volume":"7","author":"Hashim Mohammed Mahdi","year":"2018","unstructured":"Hashim , Mohammed Mahdi , Mohd Shafry Mohd Rahim , Fadil Abass Johi , Mustafa Sabah Taha , Ali A . Al-Wan , and Nilam Nur Amir Sjarif . \" An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching .\" International Journal of Engineering & Technology 7 , no. 4 ( 2018 c): 4008 -- 4023 . Hashim, Mohammed Mahdi, Mohd Shafry Mohd Rahim, Fadil Abass Johi, Mustafa Sabah Taha, Ali A. Al-Wan, and Nilam Nur Amir Sjarif. \"An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching.\" International Journal of Engineering & Technology 7, no. 4 (2018 c): 4008--4023.","journal-title":"International Journal of Engineering & Technology"},{"issue":"4","key":"e_1_3_2_1_16_1","article-title":"A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN","volume":"96","author":"ALWAN.","year":"2018","unstructured":"HASHIM, MOHAMMED, MOHD RAHIM, MOHD SHAFRY, and ALI ABDULRAHEEM ALWAN. \" A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN .\" Journal of Theoretical & Applied Information Technology 96 , no. 4 ( 2018 a). HASHIM, MOHAMMED, MOHD RAHIM, MOHD SHAFRY, and ALI ABDULRAHEEM ALWAN. \"A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN.\" Journal of Theoretical & Applied Information Technology 96, no. 4 (2018 a).","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"e_1_3_2_1_17_1","volume-title":"Springer","author":"Hong Lin","year":"1997","unstructured":"Hong , Lin , Anil Jain , Sharath Pankanti , and Ruud Bolle . \" Identity authentication using fingerprints.\" In International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 103--110 . Springer , Berlin, Heidelberg , 1997 . Hong, Lin, Anil Jain, Sharath Pankanti, and Ruud Bolle. \"Identity authentication using fingerprints.\" In International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 103--110. Springer, Berlin, Heidelberg, 1997."},{"key":"e_1_3_2_1_18_1","first-page":"1621","volume-title":"Guangzhou","author":"Hussain M. A.","year":"2013","unstructured":"Hussain , M. A. \" Simple encryption encoding for data hiding and security applications.\" In The 3rd International Conference on Multimedia Technology, Published by Atlantis Press , Guangzhou , China , pp. 1621 -- 1628 . 2013 . Hussain, M. A. \"Simple encryption encoding for data hiding and security applications.\" In The 3rd International Conference on Multimedia Technology, Published by Atlantis Press, Guangzhou, China, pp. 1621--1628. 2013."},{"key":"e_1_3_2_1_19_1","volume-title":"Mohammad Faysal Islam, and Kamal Shahrabi. \"Enhanced information security employing orthogonal code, steganography, and joint transform correlation.\" In Optical Pattern Recognition XXIV","author":"Islam M. Nazrul","year":"2013","unstructured":"Islam , M. Nazrul , Mohammad Faysal Islam, and Kamal Shahrabi. \"Enhanced information security employing orthogonal code, steganography, and joint transform correlation.\" In Optical Pattern Recognition XXIV , vol. 8748 , p. 87480K. International Society for Optics and Photonics , 2013 . Islam, M. Nazrul, Mohammad Faysal Islam, and Kamal Shahrabi. \"Enhanced information security employing orthogonal code, steganography, and joint transform correlation.\" In Optical Pattern Recognition XXIV, vol. 8748, p. 87480K. International Society for Optics and Photonics, 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.07.161"},{"issue":"1","key":"e_1_3_2_1_21_1","article-title":"An introduction to biometric recognition","volume":"14","author":"Jain Anil K","year":"2004","unstructured":"Jain , Anil K . , Arun Ross , and Salil Prabhakar . \" An introduction to biometric recognition .\" IEEE Transactions on circuits and systems for video technology 14 , no. 1 ( 2004 ). Jain, Anil K., Arun Ross, and Salil Prabhakar. \"An introduction to biometric recognition.\" IEEE Transactions on circuits and systems for video technology 14, no. 1 (2004).","journal-title":"IEEE Transactions on circuits and systems for video technology"},{"key":"e_1_3_2_1_22_1","first-page":"557","volume-title":"Theories, Applications and Future Directions-Volume II","author":"Jaswal Gaurav","year":"2019","unstructured":"Jaswal , Gaurav , Amit Kaul , and Ravinder Nath . \" Multimodal Biometric Authentication System Using Hand Shape , Palm Print , and Hand Geometry .\" In Computational Intelligence : Theories, Applications and Future Directions-Volume II , pp. 557 -- 570 . Springer , Singapore , 2019 . Jaswal, Gaurav, Amit Kaul, and Ravinder Nath. \"Multimodal Biometric Authentication System Using Hand Shape, Palm Print, and Hand Geometry.\" In Computational Intelligence: Theories, Applications and Future Directions-Volume II, pp. 557--570. Springer, Singapore, 2019."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3739-x"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/3239576.3239599","volume-title":"Proceedings of the 2nd International Conference on Advances in Image Processing","author":"Khoo Yik-Herng","year":"2018","unstructured":"Khoo , Yik-Herng , Bok-Min Goi , Tong-Yuen Chai , Yen-Lung Lai , and Zhe Jin . \"Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint .\" In Proceedings of the 2nd International Conference on Advances in Image Processing , pp. 6 -- 10 . ACM, 2018 . Khoo, Yik-Herng, Bok-Min Goi, Tong-Yuen Chai, Yen-Lung Lai, and Zhe Jin. \"Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint.\" In Proceedings of the 2nd International Conference on Advances in Image Processing, pp. 6--10. ACM, 2018."},{"issue":"1","key":"e_1_3_2_1_25_1","first-page":"31","article-title":"Feature extraction techniques and minutiae-based fingerprint recognition process","volume":"1","author":"Kocharyan Davit","year":"2001","unstructured":"Kocharyan , Davit , and Hakob Sarukhanyan . \" Feature extraction techniques and minutiae-based fingerprint recognition process .\" The International Journal of Multimedia Technology 1 , no. 1 ( 2001 ): 31 -- 35 . Kocharyan, Davit, and Hakob Sarukhanyan. \"Feature extraction techniques and minutiae-based fingerprint recognition process.\" The International Journal of Multimedia Technology 1, no. 1 (2001): 31--35.","journal-title":"The International Journal of Multimedia Technology"},{"key":"e_1_3_2_1_26_1","unstructured":"Li Sheng Xin Chen Zhigao Zheng Zhenxin Qian Guorui Feng and Xinpeng Zhang. \"Data hiding in Fingerprint Minutiae Template for Privacy Protection.\" arXiv preprint arXiv:1710.00516 (2017). Li Sheng Xin Chen Zhigao Zheng Zhenxin Qian Guorui Feng and Xinpeng Zhang. \"Data hiding in Fingerprint Minutiae Template for Privacy Protection.\" arXiv preprint arXiv:1710.00516 (2017)."},{"issue":"22","key":"e_1_3_2_1_27_1","article-title":"IMAGE STEGANOGRAPHY BASED ON ODD\/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION","volume":"95","author":"Mahdi Hashim M. O. H. A. M. M. E. D.","year":"2017","unstructured":"Mahdi Hashim , M. O. H. A. M. M. E. D. , Mohd Rahim , and Mohd Shafry . \" IMAGE STEGANOGRAPHY BASED ON ODD\/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION .\" Journal Of Theoretical & Applied Information Technology 95 , no. 22 ( 2017 ). Mahdi Hashim, M. O. H. A. M. M. E. D., Mohd Rahim, and Mohd Shafry. \"IMAGE STEGANOGRAPHY BASED ON ODD\/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION.\" Journal Of Theoretical & Applied Information Technology 95, no. 22 (2017).","journal-title":"Journal Of Theoretical & Applied Information Technology"},{"key":"e_1_3_2_1_28_1","first-page":"57","volume-title":"Handbook of fingerprint recognition","year":"2009","unstructured":"Maltoni D, Maio D, Jain AK, Prabhakar S ( 2009 b) Handbook of fingerprint recognition , 2 nd edn. Spinger-Verlag Limited , London , pp 57 -- 95 . Maltoni D, Maio D, Jain AK, Prabhakar S (2009b) Handbook of fingerprint recognition, 2nd edn. Spinger-Verlag Limited, London, pp 57--95.","edition":"2"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/978-3-319-98734-7_9","article-title":"Facets and Promises of Gait Biometric Recognition","author":"Mason James Eric","year":"2019","unstructured":"Mason , James Eric , Issa Traore , and Isaac Woungang . \" Facets and Promises of Gait Biometric Recognition .\" In Biometric-Based Physical and Cybersecurity Systems , pp. 233 -- 253 . Springer, Cham, 2019 . Mason, James Eric, Issa Traore, and Isaac Woungang. \"Facets and Promises of Gait Biometric Recognition.\" In Biometric-Based Physical and Cybersecurity Systems, pp. 233--253. Springer, Cham, 2019.","journal-title":"Biometric-Based Physical and Cybersecurity Systems"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies7020034"},{"key":"e_1_3_2_1_31_1","first-page":"242","volume-title":"International Conference on Digital Information and Communication Technology and Its Applications","author":"Mehmandoust Saeed","year":"2011","unstructured":"Mehmandoust , Saeed , and Asadollah Shahbahrami . \"A Comparison between Different Fingerprint Matching Techniques .\" In International Conference on Digital Information and Communication Technology and Its Applications , pp. 242 -- 253 . Springer, Berlin, Heidelberg , 2011 . Mehmandoust, Saeed, and Asadollah Shahbahrami. \"A Comparison between Different Fingerprint Matching Techniques.\" In International Conference on Digital Information and Communication Technology and Its Applications, pp. 242--253. Springer, Berlin, Heidelberg, 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.002"},{"key":"e_1_3_2_1_33_1","volume-title":"ACM","author":"Misbahuddin Mohammed","year":"2015","unstructured":"Misbahuddin , Mohammed , and C. S. Sreeja . \" A secure image-based authentication scheme employing DNA crypto and steganography.\" In Proceedings of the Third International Symposium on Women in Computing and Informatics, pp. 595--601 . ACM , 2015 . Misbahuddin, Mohammed, and C. S. Sreeja. \"A secure image-based authentication scheme employing DNA crypto and steganography.\" In Proceedings of the Third International Symposium on Women in Computing and Informatics, pp. 595--601. ACM, 2015."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-319-92627-8_6","article-title":"Introduction to iris presentation attack detection","author":"Morales Aythami","year":"2019","unstructured":"Morales , Aythami , Julian Fierrez , Javier Galbally , and Marta Gomez-Barrero . \" Introduction to iris presentation attack detection .\" In Handbook of Biometric Anti-Spoofing , pp. 135 -- 150 . Springer, Cham, 2019 . Morales, Aythami, Julian Fierrez, Javier Galbally, and Marta Gomez-Barrero. \"Introduction to iris presentation attack detection.\" In Handbook of Biometric Anti-Spoofing, pp. 135--150. Springer, Cham, 2019.","journal-title":"Handbook of Biometric Anti-Spoofing"},{"key":"e_1_3_2_1_35_1","volume-title":"Zahoor Jan, and Rashid Jalal Qureshi. \"A secure cyclic steganographic technique for color images using randomization.\" arXiv preprint arXiv:1502.07808","author":"Muhammad Khan","year":"2015","unstructured":"Muhammad , Khan , Jamil Ahmad , Naeem Ur Rehman , Zahoor Jan, and Rashid Jalal Qureshi. \"A secure cyclic steganographic technique for color images using randomization.\" arXiv preprint arXiv:1502.07808 ( 2015 ). Muhammad, Khan, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, and Rashid Jalal Qureshi. \"A secure cyclic steganographic technique for color images using randomization.\" arXiv preprint arXiv:1502.07808 (2015)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Nagar Abhishek Karthik Nandakumar and Anil K. Jain. \"Multibiometric cryptosystems based on feature-level fusion.\" IEEE transactions on information forensics and security 7 no. 1 (2012): 255--268. Nagar Abhishek Karthik Nandakumar and Anil K. Jain. \"Multibiometric cryptosystems based on feature-level fusion.\" IEEE transactions on information forensics and security 7 no. 1 (2012): 255--268.","DOI":"10.1109\/TIFS.2011.2166545"},{"key":"e_1_3_2_1_37_1","volume-title":"IEEE","author":"Nosrati Masoud","year":"2017","unstructured":"Nosrati , Masoud . \" Exact requirements engineering for developing business process models.\" In 2017 3th International Conference on Web Research (ICWR), pp. 140--147 . IEEE , 2017 . Nosrati, Masoud. \"Exact requirements engineering for developing business process models.\" In 2017 3th International Conference on Web Research (ICWR), pp. 140--147. IEEE, 2017."},{"key":"e_1_3_2_1_38_1","first-page":"229","volume-title":"Sinem Aslan, Francesco De Carli, Amesefe Delase Afua, A. S. M. Shihavuddin, and Amine Nait-Ali. \"Biometrics from Cellular Imaging.\" In Biometrics under Biomedical Considerations","author":"Othmani Alice Ahlem","year":"2019","unstructured":"Othmani , Alice Ahlem , Sreetama Basu , Amulya Nidhi Shrivastava , Sinem Aslan, Francesco De Carli, Amesefe Delase Afua, A. S. M. Shihavuddin, and Amine Nait-Ali. \"Biometrics from Cellular Imaging.\" In Biometrics under Biomedical Considerations , pp. 229 -- 252 . Springer , Singapore , 2019 . Othmani, Alice Ahlem, Sreetama Basu, Amulya Nidhi Shrivastava, Sinem Aslan, Francesco De Carli, Amesefe Delase Afua, A. S. M. Shihavuddin, and Amine Nait-Ali. \"Biometrics from Cellular Imaging.\" In Biometrics under Biomedical Considerations, pp. 229--252. Springer, Singapore, 2019."},{"key":"e_1_3_2_1_39_1","first-page":"521","volume-title":"\"Performance Improvement in Preprocessing Phase of Fingerprint Recognition.\" In Information and Communication Technology for Intelligent Systems","author":"Patel Meghna B","year":"2019","unstructured":"Patel , Meghna B . , Satyen M . Parikh , and Ashok R . Patel . \"Performance Improvement in Preprocessing Phase of Fingerprint Recognition.\" In Information and Communication Technology for Intelligent Systems , pp. 521 -- 530 . Springer , Singapore , 2019 . Patel, Meghna B., Satyen M. Parikh, and Ashok R. Patel. \"Performance Improvement in Preprocessing Phase of Fingerprint Recognition.\" In Information and Communication Technology for Intelligent Systems, pp. 521--530. Springer, Singapore, 2019."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2434151"},{"key":"e_1_3_2_1_41_1","volume-title":"1--176","author":"Patra Arpita","year":"2006","unstructured":"Patra , Arpita . \"Development of efficient methods for face recognition and multimodal biometry.\" Indian Institute Of Technology Madras ( 2006 ): 1--176 . Patra, Arpita. \"Development of efficient methods for face recognition and multimodal biometry.\" Indian Institute Of Technology Madras (2006): 1--176."},{"key":"e_1_3_2_1_42_1","volume-title":"IOP Publishing","author":"Praseetha V. M.","year":"2018","unstructured":"Praseetha , V. M. , Ayush Dattagupta , R. Suma , and S. Vadivel . \" Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining.\" In IOP Conference Series: Materials Science and Engineering, vol. 396, no. 1, p. 012026 . IOP Publishing , 2018 . Praseetha, V. M., Ayush Dattagupta, R. Suma, and S. Vadivel. \"Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining.\" In IOP Conference Series: Materials Science and Engineering, vol. 396, no. 1, p. 012026. IOP Publishing, 2018."},{"key":"e_1_3_2_1_43_1","volume-title":"IEEE","author":"Seleym Ashraf","year":"2013","unstructured":"Seleym , Ashraf . \" A high-rate chaotic secured covert channel based on multiple embedding in images.\" In 2013 8th International Conference on Computer Engineering & Systems (ICCES), pp. 286--292 . IEEE , 2013 . Seleym, Ashraf. \"A high-rate chaotic secured covert channel based on multiple embedding in images.\" In 2013 8th International Conference on Computer Engineering & Systems (ICCES), pp. 286--292. IEEE, 2013."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Subhedar Mansi S. and Vijay H. Mankar. \"High capacity image steganography based on discrete wavelet transform and singular value decomposition.\" In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies p. 63. ACM 2014. Subhedar Mansi S. and Vijay H. Mankar. \"High capacity image steganography based on discrete wavelet transform and singular value decomposition.\" In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies p. 63. ACM 2014.","DOI":"10.1145\/2677855.2677918"},{"issue":"1","key":"e_1_3_2_1_45_1","first-page":"1","article-title":"Multimodal biometric authentication algorithm at score level fusion using hybrid optimization","volume":"2","author":"Sujatha E.","year":"2018","unstructured":"Sujatha , E. , and A. Chilambuchelvan Nil. \" Multimodal biometric authentication algorithm at score level fusion using hybrid optimization .\" Wireless Communication Technology 2 , no. 1 ( 2018 ): 1 . Sujatha, E., and A. Chilambuchelvan Nil. \"Multimodal biometric authentication algorithm at score level fusion using hybrid optimization.\" Wireless Communication Technology 2, no. 1 (2018): 1.","journal-title":"Wireless Communication Technology"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/978-3-319-98734-7_10","article-title":"Online Signature-Based Biometric Recognition","author":"Tanwar Sudeep","year":"2019","unstructured":"Tanwar , Sudeep , Mohammad S . Obaidat , Sudhanshu Tyagi , and Neeraj Kumar . \" Online Signature-Based Biometric Recognition .\" In Biometric-Based Physical and Cybersecurity Systems , pp. 255 -- 285 . Springer, Cham, 2019 . Tanwar, Sudeep, Mohammad S. Obaidat, Sudhanshu Tyagi, and Neeraj Kumar. \"Online Signature-Based Biometric Recognition.\" In Biometric-Based Physical and Cybersecurity Systems, pp. 255--285. Springer, Cham, 2019.","journal-title":"Biometric-Based Physical and Cybersecurity Systems"},{"key":"e_1_3_2_1_47_1","first-page":"1","volume-title":"2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA)","author":"Tekade Priyanka","year":"2017","unstructured":"Tekade , Priyanka , and Priti Shende . \"Enhancement of Security through Fused Multimodal Biometric System .\" In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) , pp. 1 -- 5 . IEEE, 2017 . Tekade, Priyanka, and Priti Shende. \"Enhancement of Security through Fused Multimodal Biometric System.\" In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), pp. 1--5. IEEE, 2017."},{"key":"e_1_3_2_1_48_1","first-page":"215","article-title":"Utilizing voice biometrics","volume":"9","author":"Timem Joseph","year":"2015","unstructured":"Timem , Joseph , Donald Perry , Jenny Rosenberger , and David Karpey . \" Utilizing voice biometrics .\" U.S. Patent 9 , 215 ,321, issued December 15, 2015 . Timem, Joseph, Donald Perry, Jenny Rosenberger, and David Karpey. \"Utilizing voice biometrics.\" U.S. Patent 9,215,321, issued December 15, 2015.","journal-title":"U.S. Patent"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-018-1494-x"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Walter Charles and Rose Gamble. \"Gait-Based Identification Using Wearables in the Personal Fog.\" In Proceedings of the 52nd Hawaii International Conference on System Sciences. 2019. Walter Charles and Rose Gamble. \"Gait-Based Identification Using Wearables in the Personal Fog.\" In Proceedings of the 52nd Hawaii International Conference on System Sciences. 2019.","DOI":"10.24251\/HICSS.2019.867"},{"key":"e_1_3_2_1_51_1","volume-title":"IEEE","author":"Whitelam Cameron","year":"2013","unstructured":"Whitelam , Cameron , Nnamdi Osia , and Thirimachos Bourlai . \" Securing multimodal biometric data through watermarking and steganography.\" In 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 61--66 . IEEE , 2013 . Whitelam, Cameron, Nnamdi Osia, and Thirimachos Bourlai. \"Securing multimodal biometric data through watermarking and steganography.\" In 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 61--66. IEEE, 2013."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.01.026"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-319-61545-5_11","article-title":"Line Scan Palmprint Recognition System","author":"Zhang David","year":"2018","unstructured":"Zhang , David , Guangming Lu , and Lei Zhang . \" Line Scan Palmprint Recognition System .\" In Advanced Biometrics , pp. 235 -- 257 . Springer, Cham, 2018 . Zhang, David, Guangming Lu, and Lei Zhang. \"Line Scan Palmprint Recognition System.\" In Advanced Biometrics, pp. 235--257. Springer, Cham, 2018.","journal-title":"Advanced Biometrics"}],"event":{"name":"ISCSIC 2019: 2019 3rd International Symposium on Computer Science and Intelligent Control","acronym":"ISCSIC 2019","location":"Amsterdam Netherlands"},"container-title":["Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386164.3389079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T23:46:24Z","timestamp":1673739984000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386164.3389079"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"references-count":53,"alternative-id":["10.1145\/3386164.3389079","10.1145\/3386164"],"URL":"https:\/\/doi.org\/10.1145\/3386164.3389079","relation":{},"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"2020-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}