{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:05:36Z","timestamp":1742911536594,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030878719"},{"type":"electronic","value":"9783030878726"}],"license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87872-6_15","type":"book-chapter","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T04:02:39Z","timestamp":1632196959000},"page":"146-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["StegoPass \u2013 Utilization of Steganography to Produce a Novel Unbreakable Biometric Based Password Authentication Scheme"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1643-8018","authenticated-orcid":false,"given":"Konstantinos","family":"Karampidis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6770-0376","authenticated-orcid":false,"given":"Euangelos","family":"Linardos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2815-3477","authenticated-orcid":false,"given":"Ergina","family":"Kavallieratou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,22]]},"reference":[{"key":"15_CR1","unstructured":"Number of connected devices worldwide (2030). https:\/\/www.statista.com\/statistics\/802690\/worldwide-connected-devices-by-access-technology\/. Accessed 13 June 2021"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3038924","volume":"50","author":"R Ramachandra","year":"2017","unstructured":"Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. 50(1), 1\u201337 (2017). https:\/\/doi.org\/10.1145\/3038924","journal-title":"ACM Comput. Surv."},{"key":"15_CR3","volume-title":"Biometric Authentication Under Threat: Liveness Detection Hacking","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Ma, B., Ma, H.C.: Biometric Authentication Under Threat: Liveness Detection Hacking. Black hat, Las Vegas (2019)"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3232849","volume":"51","author":"A Czajka","year":"2018","unstructured":"Czajka, A., Bowyer, K.W.: Presentation attack detection for iris recognition: An assessment of the state-of-the-art. ACM Comput. Surv. 51, 1\u201335 (2018). https:\/\/doi.org\/10.1145\/3232849","journal-title":"ACM Comput. Surv."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1049\/iet-bmt.2013.0020","volume":"3","author":"C Sousedik","year":"2014","unstructured":"Sousedik, C., Busch, C.: Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biometr. 3, 219\u2013233 (2014). https:\/\/doi.org\/10.1049\/iet-bmt.2013.0020","journal-title":"IET Biometr."},{"key":"15_CR6","unstructured":"ISO - ISO\/IEC 30107\u20131: Information technology \u2014 Biometric presentation attack detection \u2014 Part 1: Framework (2016). https:\/\/www.iso.org\/standard\/53227.html. Accessed 13 Jan 2021"},{"key":"15_CR7","unstructured":"Koops, B.-J.: Crypto Law Survey. http:\/\/www.cryptolaw.org\/cls2.htm#busigov. Accessed 7 Dec 2017"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"012071","DOI":"10.1088\/1757-899X\/551\/1\/012071","volume":"551","author":"M Lebcir","year":"2019","unstructured":"Lebcir, M., Awang, S.: A review on type of attacks on fingerprint image and watermarking techniques. IOP Conf. Ser. Mater. Sci. Eng. 551, 012071 (2019). https:\/\/doi.org\/10.1088\/1757-899X\/551\/1\/012071","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/J.JISA.2018.04.005","volume":"40","author":"K Karampidis","year":"2018","unstructured":"Karampidis, K., Kavallieratou, E., Papadourakis, G.: A review of image steganalysis techniques for digital forensics. J. Inf. Secur. Appl. 40, 217\u2013235 (2018). https:\/\/doi.org\/10.1016\/J.JISA.2018.04.005","journal-title":"J. Inf. Secur. Appl."},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1017\/S0956796808007004","volume":"19","author":"ME O\u2019Neill","year":"2009","unstructured":"O\u2019Neill, M.E.: The genuine sieve of eratosthenes. J. Funct. Program. 19, 95\u2013106 (2009). https:\/\/doi.org\/10.1017\/S0956796808007004","journal-title":"J. Funct. Program."},{"key":"15_CR11","unstructured":"Goodfellow, I.J.,et al.: Generative adversarial nets. In: International Conference on Neural Information Processing Systems (NIPS 2014). pp. 2672\u20132680, Montreal (2014)"},{"key":"15_CR12","unstructured":"Goodfellow, I.: NIPS 2016 Tutorial: Generative Adversarial Networks. (2016)"},{"key":"15_CR13","unstructured":"Kodali, N., Abernethy, J., Hays, J., Kira, Z.: On Convergence and Stability of GANs (2017)"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439723","volume":"54","author":"Z Wang","year":"2021","unstructured":"Wang, Z., She, Q., Ward, T.E.: Generative adversarial networks in computer vision: a survey and taxonomy. ACM Comput. Surv. 54, 1\u201338 (2021). https:\/\/doi.org\/10.1145\/3439723","journal-title":"ACM Comput. Surv."},{"key":"15_CR15","first-page":"5768","volume":"2017","author":"I Gulrajani","year":"2017","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.: Improved training of Wasserstein GANs. Adv. Neural. Inf. Process. Syst. 2017, 5768\u20135778 (2017)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"15_CR16","first-page":"700","volume":"2018","author":"M Lucic","year":"2017","unstructured":"Lucic, M., Kurach, K., Michalski, M., Gelly, S., Bousquet, O.: Are GANs created equal? A large-scale study. Adv. Neural. Inf. Process. Syst. 2018, 700\u2013709 (2017)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.cviu.2018.10.009","volume":"179","author":"A Borji","year":"2018","unstructured":"Borji, A.: Pros and cons of GAN evaluation measures. Comput. Vis. Image Underst. 179, 41\u201365 (2018)","journal-title":"Comput. Vis. Image Underst."},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 4396\u20134405. IEEE Computer Society (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00453","DOI":"10.1109\/CVPR.2019.00453"},{"key":"15_CR19","unstructured":"stegano PyPI. https:\/\/pypi.org\/project\/stegano\/. Accessed 13 June 2021"}],"container-title":["Advances in Intelligent Systems and Computing","14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87872-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T07:04:25Z","timestamp":1642835065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87872-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"ISBN":["9783030878719","9783030878726"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87872-6_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021,9,22]]},"assertion":[{"value":"22 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS - ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.iceuteconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}