{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:45:06Z","timestamp":1773153906002,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_30","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"763-776","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Survey of Security and Privacy Issues on Biometric System"],"prefix":"10.1007","author":[{"given":"Priyanka","family":"Datta","sequence":"first","affiliation":[]},{"given":"Shanu","family":"Bhardwaj","sequence":"additional","affiliation":[]},{"given":"S. N.","family":"Panda","sequence":"additional","affiliation":[]},{"given":"Sarvesh","family":"Tanwar","sequence":"additional","affiliation":[]},{"given":"Sumit","family":"Badotra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"1","key":"30_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4\u201320. \nhttps:\/\/doi.org\/10.1109\/TCSVT.2003.818349\n\n.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"30_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/6294.899930","volume":"3","author":"S Liu","year":"2001","unstructured":"Liu, S., & Silverman, M. (2001). Practical guide to biometric security technology. IT Professional, 3(1), 27\u201332. \nhttps:\/\/doi.org\/10.1109\/6294.899930\n\n.","journal-title":"IT Professional"},{"issue":"3","key":"30_CR3","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"RM Bolle","year":"2001","unstructured":"Bolle, R. M. (2001). Enhancing security. IBM Systems, 40(3), 614\u2013634. \nhttps:\/\/doi.org\/10.1147\/sj.403.0614\n\n.","journal-title":"IBM Systems"},{"issue":"2","key":"30_CR4","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","volume":"1","author":"S Prabhakar","year":"2003","unstructured":"Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security & Privacy Magazine, 1(2), 33\u201342. \nhttps:\/\/doi.org\/10.1109\/MSECP.2003.1193209\n\n.","journal-title":"IEEE Security & Privacy Magazine"},{"key":"30_CR5","doi-asserted-by":"publisher","unstructured":"Juels, A., Molnar, D., & Wagner, D. (2005). Security and privacy issues in E-passports. Security and privacy for emerging areas in communications networks, 2005. In SecureComm 2005. First International Conference on (pp. 74\u201388). \nhttps:\/\/doi.org\/10.1109\/securecomm.2005.59","DOI":"10.1109\/securecomm.2005.59"},{"issue":"6","key":"30_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MAES.2006.1662038","volume":"21","author":"M Faundez-Zanuy","year":"2006","unstructured":"Faundez-Zanuy, M. (2006). Biometric security technology. IEEE Aerospace and Electronic Systems Magazine, 21(6), 15\u201326. \nhttps:\/\/doi.org\/10.1109\/MAES.2006.1662038\n\n.","journal-title":"IEEE Aerospace and Electronic Systems Magazine"},{"issue":"1","key":"30_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIFS.2010.2098872","volume":"6","author":"L Lai","year":"2011","unstructured":"Lai, L., Ho, S. W., & Poor, H. V. (2011). Privacy\u2013Security trade-offs in biometric security systems\u2014Part I: Single use case. IEEE Transactions on Information Forensics and Security, 6(1), 122\u2013139. \nhttps:\/\/doi.org\/10.1109\/TIFS.2010.2098872\n\n.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"30_CR8","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390\u20131397. \nhttps:\/\/doi.org\/10.1109\/TPDS.2010.206\n\n.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"3","key":"30_CR9","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys and Tutorials, 17(3), 1268\u20131293. \nhttps:\/\/doi.org\/10.1109\/COMST.2014.2386915\n\n.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/ACCESS.2016.2535120","volume":"4","author":"I Natgunanathan","year":"2016","unstructured":"Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., & Yearwood, J. (2016). Protection of privacy in biometric data. IEEE Access, 4, 880\u2013892. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2016.2535120\n\n.","journal-title":"IEEE Access"},{"issue":"4","key":"30_CR11","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/MSP.2017.2697179","volume":"34","author":"N Memon","year":"2017","unstructured":"Memon, N. (2017). How biometric authentication poses new challenges to our security and privacy [in the spotlight]. IEEE Signal Processing Magazine, 34(4), 194\u2013196. \nhttps:\/\/doi.org\/10.1109\/MSP.2017.2697179\n\n.","journal-title":"IEEE Signal Processing Magazine"},{"key":"30_CR12","doi-asserted-by":"publisher","unstructured":"Kumar, T., Braeken, A., Liyanage, M., & Ylianttila, M. (2017). Identity privacy preserving biometric based authentication scheme for Naked healthcare environment. IEEE International Conference on Communications. \nhttps:\/\/doi.org\/10.1109\/ICC.2017.7996966\n\n.","DOI":"10.1109\/ICC.2017.7996966"},{"issue":"2","key":"30_CR13","first-page":"907","volume":"4","author":"PW Jaronde","year":"2018","unstructured":"Jaronde, P. W., Muratkar, N. A., Bhoyar, P. P., Gaikwad, S. J., & Nagrale, R. B. (2018). Review on biometric security system for newborn baby. International Journal of Scientific Research in Science and Technology, 4(2), 907\u2013909.","journal-title":"International Journal of Scientific Research in Science and Technology"},{"issue":"c","key":"30_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2018.2804949","volume":"5971","author":"M Osadchy","year":"2018","unstructured":"Osadchy, M., & Dunkelman, O. (2018). It is all in the system\u2019s parameters: Privacy and security issues in transforming biometric raw data into binary strings. IEEE Transactions on Dependable and Secure Computing, 5971(c), 1\u201310. \nhttps:\/\/doi.org\/10.1109\/TDSC.2018.2804949\n\n.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"30_CR15","first-page":"2412","volume":"4","author":"S Srivastava","year":"2013","unstructured":"Srivastava, S., Agarwal, N., & Agarwal, R. (2013). Authenticating Indian E-health system through \u201cAadhaar\u201d A unique identification. International Journal of Scientific & Engineering Research, 4(6), 2412\u20132416.","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Kataria, A. N., Sharma, A. K., & Zaveri, T. H. (2013). A survey of automated biometric authentication techniques (pp. 1\u20136).","DOI":"10.1109\/NUiCONE.2013.6780190"},{"issue":"2","key":"30_CR17","first-page":"237","volume":"4","author":"T Hemalatha","year":"2014","unstructured":"Hemalatha, T., Krishna, D., Krishna, K. B., & Subhramanyam, V. B. (2014). Aadhar based electronic voting system and providing authentication. International Journal of Engineering and Advanced Technology, 4(2), 237\u2013240.","journal-title":"International Journal of Engineering and Advanced Technology"},{"issue":"4","key":"30_CR18","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s12553-017-0202-6","volume":"7","author":"P Dixon","year":"2017","unstructured":"Dixon, P. (2017). A failure to \u201cDo No Harm\u201d -- India\u2019s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S. Health and Technology, 7(4), 539\u2013567. \nhttps:\/\/doi.org\/10.1007\/s12553-017-0202-6\n\n.","journal-title":"Health and Technology"},{"issue":"4","key":"30_CR19","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1007\/s11277-014-2111-6","volume":"80","author":"F Wen","year":"2015","unstructured":"Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747\u20131760. \nhttps:\/\/doi.org\/10.1007\/s11277-014-2111-6\n\n.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"30_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1\u20135. \nhttps:\/\/doi.org\/10.1016\/j.jnca.2009.08.001\n\n.","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:07:40Z","timestamp":1577794060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_30","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}