{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:37:40Z","timestamp":1743154660885,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030166595"},{"type":"electronic","value":"9783030166601"}],"license":[{"start":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T00:00:00Z","timestamp":1555200000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-16660-1_2","type":"book-chapter","created":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T16:06:56Z","timestamp":1555171616000},"page":"12-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Novel Authentication System for Personal and Domestic Network Systems Using Image Feature Comparison and Digital Signatures"],"prefix":"10.1007","author":[{"given":"Hrishikesh","family":"Narayanankutty","sequence":"first","affiliation":[]},{"given":"Chungath","family":"Srinivasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,14]]},"reference":[{"key":"2_CR1","first-page":"168","volume-title":"Communications in Computer and Information Science","author":"Aravind Ashok","year":"2012","unstructured":"Ashok, A., Poornachandran, P., Achuthan, K.: Secure authentication in multimodal biometric systems using cryptographic hash functions. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 168\u2013177. Springer, Heidelberg (2012)"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11744023_32","volume-title":"Computer Vision \u2013 ECCV 2006","author":"Herbert Bay","year":"2006","unstructured":"Bay, H., Tuytelaars, T., Van Gool, L.: Surf: speeded up robust features. In: European Conference on Computer Vision, pp. 404\u2013417. Springer, Heidelberg (2006)"},{"key":"2_CR3","unstructured":"Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: USENIX Security Symposium, vol. 13, p. 11 (2004)"},{"key":"2_CR4","unstructured":"Kaschte, B.: Biometric authentication systems today and in the future. University of Auckland (2005)"},{"issue":"4","key":"2_CR5","first-page":"744","volume":"3","author":"EA Kumar","year":"2014","unstructured":"Kumar, E.A., Bilandi, E.N.: A graphical password based authentication based system for mobile devices. Int. J. Comput. Sci. Mob. Comput. 3(4), 744\u2013754 (2014)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-0-387-35612-9_17","volume-title":"Advanced Communications and Multimedia Security","author":"V\u00e1clav Maty\u00e1\u0161","year":"2002","unstructured":"Maty\u00e1\u0161, V., \u0158\u00edha, Z.: Biometric authentication\u2013security and usability. In: Advanced Communications and Multimedia Security, pp. 227\u2013239. Springer, Heidelberg (2002)"},{"issue":"1","key":"2_CR8","first-page":"57","volume":"2","author":"SS Mudholkar","year":"2012","unstructured":"Mudholkar, S.S., Shende, P.M., Sarode, M.V.: Biometrics authentication technique for intrusion detection systems using fingerprint recognition. Int. J. Comput. Sci. Eng. Inf. Technol. (IJCSEIT) 2(1), 57\u201365 (2012)","journal-title":"Int. J. Comput. Sci. Eng. Inf. Technol. (IJCSEIT)"},{"key":"2_CR9","unstructured":"Nali, D., Thorpe, J.: Analyzing user choice in graphical passwords. School of Computer Science, Carleton University, Technical report, TR-04-01 (2004)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"176","DOI":"10.5201\/ipol.2015.69","volume":"5","author":"E Oyallon","year":"2015","unstructured":"Oyallon, E., Rabin, J.: An analysis of the surf method. Image Process. On Line 5, 176\u2013218 (2015)","journal-title":"Image Process. On Line"},{"key":"2_CR11","unstructured":"Pena, M.G.: A comparative study of three image matching algorithms: SIFT, SURF, and FAST. Utah State University (2011)"},{"key":"2_CR12","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Computer Security Applications Conference 21st Annual, pp. 10\u2013pp. IEEE (2005)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16660-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T08:08:19Z","timestamp":1567843699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16660-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,14]]},"ISBN":["9783030166595","9783030166601"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16660-1_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,14]]},"assertion":[{"value":"14 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA 2018","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vellore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}