{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:59:33Z","timestamp":1726045173339},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030269715"},{"type":"electronic","value":"9783030269722"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26972-2_14","type":"book-chapter","created":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T10:02:41Z","timestamp":1569060161000},"page":"275-297","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Framework for Secure Selfie-Based Biometric Authentication in the Cloud"],"prefix":"10.1007","author":[{"given":"Veeru","family":"Talreja","sequence":"first","affiliation":[]},{"given":"Terry","family":"Ferrett","sequence":"additional","affiliation":[]},{"given":"Matthew C.","family":"Valenti","sequence":"additional","affiliation":[]},{"given":"Arun","family":"Ross","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,22]]},"reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1049\/iet-bmt.2014.0038","volume":"4","author":"F Alonso-Fernandez","year":"2015","unstructured":"Alonso-Fernandez F, Bigun J (2015) Near-infrared and visible-light periocular recognition with gabor features using frequency-adaptive automatic eye detection. IET Biom 4(2):74\u201389","journal-title":"IET Biom"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.patrec.2014.10.011","volume":"57","author":"S Barra","year":"2015","unstructured":"Barra S et al (2015) Ubiquitous iris recognition by means of mobile devices. Pattern Recognit Lett 57:66\u201373","journal-title":"Pattern Recognit Lett"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Beimborn D, Miletzki T, Wenzel S (2011) Platform as a service (PaaS). Bus & Inf Syst Eng 3(6)","DOI":"10.1007\/s12599-011-0183-3"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Bharadi VA, D\u2019silva GM (2015) Online signature recognition using software as a service (SAAS) model on public cloud. In: International conference on computer, communication and automated, pp 65\u201372","DOI":"10.1109\/ICCUBEA.2015.208"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Bommagani AS, Valenti MC, Ross A (2014) A framework for secure cloud-empowered mobile biometrics. In: Proceeding of IEEE military communications conference, pp 255\u2013261","DOI":"10.1109\/MILCOM.2014.47"},{"key":"14_CR6","volume-title":"The ND-IRIS-0405 iris image dataset","author":"KW Bowyer","year":"2010","unstructured":"Bowyer KW, Flynn PJ (2010) The ND-IRIS-0405 iris image dataset. University of Notre Dame, CVRL"},{"key":"14_CR7","unstructured":"Bradski G (2000) The opencv library. Dr. Dobb\u2019s J Softw Tools Prof Program 25(11):120\u2013123 (2000)"},{"issue":"6","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1016\/j.eswa.2012.10.002","volume":"40","author":"AM Canuto","year":"2013","unstructured":"Canuto AM, Pintro F, Xavier-Junior JC (2013) Investigating fusion approaches in multi-biometric cancellable recognition. Expert Syst Appl 40(6):1971\u20131980","journal-title":"Expert Syst Appl"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop, CCSW \u201910. ACM, New York, NY, USA, pp 1\u20136. \n                    https:\/\/doi.org\/10.1145\/1866835.1866837","DOI":"10.1145\/1866835.1866837"},{"key":"14_CR10","unstructured":"Das R (2013) Biometrics in the cloud. Keesing J Doc Identity, 21\u201323"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"de\u00a0Freitas\u00a0Pereira T, Marcel S (2015) Periocular biometrics in mobile environment. In: Proceeding of biometrics: theory, applications and systems (BTAS), pp 1\u20137","DOI":"10.1109\/BTAS.2015.7358785"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11608288_61","volume-title":"Advances in Biometrics","author":"Dae Sik Jeong","year":"2005","unstructured":"Jeong DS, et al (2006) Iris recognition in mobile phone based on adaptive gabor filter. In: Proceeding of international conference on biometrics (ICB), pp 457\u2013463"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.patrec.2014.09.014","volume":"57","author":"Raghavender Reddy Jillela","year":"2015","unstructured":"Jillela RR, Ross A (2015) Segmenting iris images in the visible spectrum with applications in mobile biometrics. Pattern Recognit Lett 57(C):4\u201316","journal-title":"Pattern Recognition Letters"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Juels A, Sudan M (2002) A fuzzy vault scheme. In: Proceeding IEEE international symposium on information theory, p 408. \n                    https:\/\/doi.org\/10.1109\/ISIT.2002.1023680","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceeding 6th ACM conference on computer and communications security, pp 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"issue":"1","key":"14_CR16","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.procs.2010.04.051","volume":"1","author":"JS Kang","year":"2010","unstructured":"Kang JS (2010) Mobile iris recognition systems: an emerging biometric technology. Procedia Comput Sci 1(1):475\u2013484","journal-title":"Procedia Comput Sci"},{"issue":"7","key":"14_CR17","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1016\/j.patcog.2005.10.025","volume":"39","author":"A Kong","year":"2006","unstructured":"Kong A, Cheung KH, Zhang D, Kamel M, You J (2006) An analysis of biohashing and its variants. Pattern Recognit 39(7):1359\u20131368","journal-title":"Pattern Recognit"},{"issue":"6","key":"14_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MC.2008.185","volume":"41","author":"G Lawton","year":"2008","unstructured":"Lawton G (2008) Developing software online with platform-as-a-service technology. Computer 41(6):13\u201315","journal-title":"Computer"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T (2011) The NIST definition of cloud computing. In: Recommendations of the national institute of standards and technology, special publication pp 800\u2013145","DOI":"10.6028\/NIST.SP.800-145"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Nagar A, Nandakumar K, Jain AK (2008) Securing fingerprint template: fuzzy vault with minutiae descriptors. In: Proceeding 19th international conference on pattern recognition. \n                    https:\/\/doi.org\/10.1109\/ICPR.2008.4761459","DOI":"10.1109\/ICPR.2008.4761459"},{"issue":"1","key":"14_CR21","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2011.2166545","volume":"7","author":"A Nagar","year":"2012","unstructured":"Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255\u2013268. \n                    https:\/\/doi.org\/10.1109\/TIFS.2011.2166545","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Nandakumar K, Jain AK (2008) Multibiometric template security using fuzzy vault. In: Proceeding IEEE international conference on biometrics: theory, applications and systems","DOI":"10.1109\/BTAS.2008.4699352"},{"issue":"4","key":"14_CR23","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K Nandakumar","year":"2007","unstructured":"Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2(4):744\u2013757. \n                    https:\/\/doi.org\/10.1109\/TIFS.2007.908165","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"14_CR24","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2015.2434151","volume":"32","author":"VM Patel","year":"2015","unstructured":"Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Process Mag 32(5):54\u201365. \n                    https:\/\/doi.org\/10.1109\/MSP.2015.2434151","journal-title":"IEEE Signal Process Mag"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Raghavendra R, Busch C (2016) Learning deeply coupled autoencoders for smartphone based robust periocular verification. In: 23rd international conference on image processing (ICIP). IEEE","DOI":"10.1109\/ICIP.2016.7532372"},{"issue":"5","key":"14_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MSP.2013.2261691","volume":"30","author":"S Rane","year":"2013","unstructured":"Rane S, Wang Y, Draper SC, Ishwar P (2013) Secure biometrics: concepts, authentication architectures, and challenges. IEEE Signal Process Mag 30(5):51\u201364. \n                    https:\/\/doi.org\/10.1109\/MSP.2013.2261691","journal-title":"IEEE Signal Process Mag"},{"issue":"4","key":"14_CR27","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561\u2013572. \n                    https:\/\/doi.org\/10.1109\/TPAMI.2007.1004","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"14_CR28","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S0969-4765(16)30050-9","volume":"2016","author":"J Rose","year":"2016","unstructured":"Rose J (2016) Biometrics as a service: the next giant leap? Biom Technol Today 2016(3):7\u20139","journal-title":"Biom Technol Today"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Stojmenovic M (2012) Mobile cloud computing for biometric applications. In: 15th international conference on network-based information system, pp 654\u2013659","DOI":"10.1109\/NBiS.2012.147"},{"issue":"3","key":"14_CR30","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1109\/TIFS.2007.902022","volume":"2","author":"Y Sutcu","year":"2007","unstructured":"Sutcu Y, Li Q, Memon N (2007) Protecting biometric templates with sketch: theory and practice. IEEE Trans Inf Forensics Secur 2(3):503\u2013512","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Sutcu Y, Li Q, Memon N (2007) Secure biometric templates from fingerprint-face features. In: Proceeding IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2007.383385"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Talreja V, Ferrett T, Valenti MC, Ross A (2018) Biometrics-as-a-service: a framework to promote innovative biometric recognition in the cloud. In: Proceeding IEEE international conference on consumer electronics (ICCE)","DOI":"10.1109\/ICCE.2018.8326075"},{"key":"14_CR33","doi-asserted-by":"publisher","unstructured":"Talreja V, Valenti MC, Nasrabadi NM (2017) Multibiometric secure system based on deep learning. In: Proceeding IEEE global conference on signal and information processing, pp 298\u2013302. \n                    https:\/\/doi.org\/10.1109\/GlobalSIP.2017.8308652","DOI":"10.1109\/GlobalSIP.2017.8308652"},{"issue":"6","key":"14_CR34","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1016\/j.patcog.2007.12.002","volume":"41","author":"AB Teoh","year":"2008","unstructured":"Teoh AB, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recognit 41(6):2034\u20132044","journal-title":"Pattern Recognit"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Th\u00f6nes J (2015) Microservices. IEEE Softw 32(1), 116, 113\u2013115","DOI":"10.1109\/MS.2015.11"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Woodard DL, Pundlik S, Miller P, Jillela R, Ross A (2010) On the fusion of periocular and iris biometrics in non-ideal imagery. In: 20th international conference on pattern recognition (ICPR). IEEE, pp 201\u2013204","DOI":"10.1109\/ICPR.2010.58"},{"key":"14_CR37","unstructured":"Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: Proceeding IEEE international conference on pattern recognition, pp 1\u20134"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Selfie Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26972-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T10:05:22Z","timestamp":1569060322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-26972-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030269715","9783030269722"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26972-2_14","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"type":"print","value":"2191-6586"},{"type":"electronic","value":"2191-6594"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"22 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}