{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:17:11Z","timestamp":1769059031929,"version":"3.49.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031283499","type":"print"},{"value":"9783031283505","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28350-5_8","type":"book-chapter","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:15:28Z","timestamp":1679879728000},"page":"95-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Sentinel: An Enhanced Multimodal Biometric Access Control System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4865-6653","authenticated-orcid":false,"given":"N.","family":"Krishna Khanth","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2367-4572","authenticated-orcid":false,"given":"Sharad","family":"Jain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8145-9304","authenticated-orcid":false,"given":"Suman","family":"Madan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,19]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Murugan, K.H.S., Jacintha, V., Shifani, S.A.: Security system using raspberry Pi. In: 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM), Chennai, pp. 863\u2013864 (2017)","DOI":"10.1109\/ICONSTEM.2017.8261326"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Wati, D.A.R., Abadianto, D.: Design of face detection and recognition system for smart home security application. In: 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, pp. 342\u2013347 (2017)","DOI":"10.1109\/ICITISEE.2017.8285524"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Sayem, I.M., Chowdhury, M.S.: Integrating face recognition security system with the internet of things. In: 2018 International Conference on Machine Learning and Data Engineering (iCMLDE), Sydney, Australia, pp. 14\u201318 (2018)","DOI":"10.1109\/iCMLDE.2018.00013"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Mantoro, T., Ayu, M.A., Suhendi: Multi-faces recognition process using haar cascades and eigenface methods. In: 2018 6th International Conference on Multimedia Computing and Systems (ICMCS), Rabat, pp. 1\u20135 (2018)","DOI":"10.1109\/ICMCS.2018.8525935"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Gusain, R., Jain, H., Pratap, S.: Enhancing bank security system using face recognition, iris scanner and palm vein technology. In: 2018 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Bhimtal, pp. 1\u20135 (2018)","DOI":"10.1109\/IoT-SIU.2018.8519850"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Gulzar, K., Sang, J., Tariq, O.: A cost effective method for automobile security based on detection and recognition of human face. In: 2017 2nd International Conference on Image, Vision and Computing (ICIVC), Chengdu, pp. 259\u2013263 (2017)","DOI":"10.1109\/ICIVC.2017.7984557"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Patoliya, J.J., Desai, M.M.: Face detection based ATM security system using embedded Linux platform. In: 2017 2nd International Conference for Convergence in Technology (I2CT), Mumbai, pp. 74\u201378 (2017)","DOI":"10.1109\/I2CT.2017.8226097"},{"key":"8_CR8","first-page":"1","volume":"11","author":"M Kim","year":"2015","unstructured":"Kim, M., Lee, D.G., Kim, K.-Y.: System architecture for real-time face detection on analog video camera. Int. J. Distrib. Sens. Netw. 11, 1\u201311 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Y., Chen, Z., Xu, L.: RFID system security using identity-based cryptography. In: 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, Jinggangshan, pp. 460\u2013464 (2010)","DOI":"10.1109\/IITSI.2010.52"},{"key":"8_CR10","unstructured":"Shaikh, S., Raskar, R., Pande, L., Khan, Z., Guja, S.P.: Threat detection in hostile environment with deep learning based on drone\u2019s vision. In: 2020 International Research Journal of Engineering and Technology (IRJET) (2020)"},{"key":"8_CR11","volume-title":"The Fast Fourier Transform and Its Applications","author":"E Oran Brigham","year":"1988","unstructured":"Oran Brigham, E.: The Fast Fourier Transform and Its Applications. Prentice-Hall Inc., Hoboken (1988)"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Li, R., Jiang, J.Y., Liu, J., Hsieh, C.C., Wang, W.: Automatic speaker recognition with limited data. In: Proceedings of the 13th International Conference on Web Search and Data Mining (WSDM 2020), pp. 340\u2013348. Association for Computing Machinery, New York 2020. https:\/\/doi.org\/10.1145\/3336191.3371802","DOI":"10.1145\/3336191.3371802"},{"key":"8_CR13","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-981-16-3071-2_23","volume-title":"International conference on innovative computing and communications","author":"S Madan","year":"2022","unstructured":"Madan, S., Bhardwaj, K., Gupta, S.: Critical analysis of big data privacy preservation techniques and challenges. In: Khanna, A., Gupta, D., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds.) International conference on innovative computing and communications. AISC, vol. 1394, pp. 267\u2013278. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-3071-2_23"},{"issue":"3\u20134","key":"8_CR14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1504\/IJAIP.2021.119022","volume":"20","author":"S Madan","year":"2021","unstructured":"Madan, S., Goswami, P.: Hybrid privacy preservation model for big data publishing on cloud. Int. J. Adv. Intell. Paradigms 20(3\u20134), 343\u2013355 (2021). https:\/\/doi.org\/10.1504\/IJAIP.2021.119022","journal-title":"Int. J. Adv. Intell. Paradigms"},{"key":"8_CR15","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-981-15-6876-3_44","volume-title":"Computational Methods and Data Engineering","author":"S Boopalan","year":"2021","unstructured":"Boopalan, S., Ramkumar, K., Ananthi, N., Goswami, P., Madan, S.: Implementing ciphertext policy encryption in cloud platform for patients\u2019 health information based on the attributes. In: Singh, V., Asari, V.K., Kumar, S., Patel, R.B. (eds.) Computational Methods and Data Engineering. AISC, vol. 1227, pp. 547\u2013560. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-6876-3_44"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Moon, M.M.H., Ghosh, D.K., Chisty, N.A., Jeb, M.A., Islam, M.M.: Design and implementation of a vault security system. In: 1st International Conference on Advances in Science, Engineering and Robotics Technology 2019 (ICASERT 2019) (2019)","DOI":"10.1109\/ICASERT.2019.8934658"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"3257","DOI":"10.1007\/s13369-020-04353-5","volume":"45","author":"V Puri","year":"2020","unstructured":"Puri, V., Kaur, P., Sachdeva, S.: Effective removal of privacy breaches in disassociated transactional datasets. Arab. J. Sci. Eng. 45, 3257\u20133272 (2020)","journal-title":"Arab. J. Sci. Eng."},{"key":"8_CR18","doi-asserted-by":"publisher","unstructured":"Madan, J., Madan, S.: Intelligent and personalized factoid question and answer system. In: 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 1\u20137 (2022). https:\/\/doi.org\/10.1109\/ICRITO56286.2022.9964818","DOI":"10.1109\/ICRITO56286.2022.9964818"}],"container-title":["Lecture Notes in Computer Science","Big Data Analytics in Astronomy, Science, and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28350-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T01:57:51Z","timestamp":1729130271000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28350-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031283499","9783031283505"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28350-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bigda2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/web-ext.u-aizu.ac.jp\/labs\/is-ds\/BDA2022-Aizu.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}