{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:41:14Z","timestamp":1742960474663,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029306"},{"type":"electronic","value":"9783319029313"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-02931-3_60","type":"book-chapter","created":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T10:00:13Z","timestamp":1380967213000},"page":"527-534","source":"Crossref","is-referenced-by-count":0,"title":["A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data"],"prefix":"10.1007","author":[{"given":"Musheer","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"A. K.","family":"Mohapatra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","unstructured":"Jain, A.K., Pankanti, S., Bolle, R.: Biometrics: personal identification in networked society. Kluwer (1999)"},{"key":"60_CR2","doi-asserted-by":"publisher","first-page":"1749","DOI":"10.1016\/j.chaos.2005.12.015","volume":"32","author":"M.K. Khan","year":"2007","unstructured":"Khan, M.K., Zhang, J., Tian, L.: Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons & Fractals\u00a032, 1749\u20131759 (2007)","journal-title":"Chaos, Solitons & Fractals"},{"key":"60_CR3","doi-asserted-by":"publisher","first-page":"6562","DOI":"10.1016\/j.eswa.2011.12.048","volume":"39","author":"P. Li","year":"2012","unstructured":"Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications\u00a039, 6562\u20136574 (2012)","journal-title":"Expert Systems with Applications"},{"issue":"11","key":"60_CR4","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"A.T.B. Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recognition\u00a037(11), 2245\u20132255 (2004)","journal-title":"Pattern Recognition"},{"key":"60_CR5","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.1016\/j.eswa.2012.10.009","volume":"40","author":"Y. Imamverdiyev","year":"2013","unstructured":"Imamverdiyev, Y., Teoh, A.B.J., Kim, J.: Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Systems with Applications\u00a040, 1888\u20131901 (2013)","journal-title":"Expert Systems with Applications"},{"key":"60_CR6","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1016\/j.proeng.2012.06.133","volume":"48","author":"M. Ahmad","year":"2012","unstructured":"Ahmad, M., Ahmad, T.: A framework to protect patient digital medical imagery for secure telediagnosis. Procedia Engineering\u00a048, 1055\u20131066 (2012)","journal-title":"Procedia Engineering"},{"key":"60_CR7","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V. Patidar","year":"2009","unstructured":"Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Communication in Nonlinear Science and Numerical Simulation\u00a014, 3056\u20133075 (2009)","journal-title":"Communication in Nonlinear Science and Numerical Simulation"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Khan, M.K., Zhang, J.: Implementing templates security in remote biometric authentication systems. In: IEEE Conference Proceedings on CIS, vol.\u00a02, pp. 1396\u20131400 (2006)","DOI":"10.1109\/ICCIAS.2006.295290"},{"issue":"4","key":"60_CR9","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1016\/j.eswa.2009.10.043","volume":"37","author":"E. Maiorana","year":"2010","unstructured":"Maiorana, E.: Biometric cryptosystem using function based on-line signature recognition. Expert Systems with Applications\u00a037(4), 3454\u20133461 (2010)","journal-title":"Expert Systems with Applications"},{"key":"60_CR10","doi-asserted-by":"crossref","unstructured":"Wu, X., Wang, K., Zhang, D.: A cryptosystem based on palmprint feature. In: International Conference on Pattern Recognition, pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761117"},{"key":"60_CR11","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"R.M. May","year":"1967","unstructured":"May, R.M.: Simple mathematical model with very complicated dynamics. Nature\u00a0261, 459\u2013467 (1967)","journal-title":"Nature"},{"key":"60_CR12","doi-asserted-by":"crossref","unstructured":"Rukhin, A., et al.: A Statistical Test Suite for Random and Pseudo-random Number Generators for Cryptographic Applications. NIST Special Publication, 800\u2013822 (2001)","DOI":"10.6028\/NIST.SP.800-22"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02931-3_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T14:46:52Z","timestamp":1674830812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-02931-3_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319029306","9783319029313"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02931-3_60","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}