{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:27:12Z","timestamp":1725852432142},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_27","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"323-336","source":"Crossref","is-referenced-by-count":1,"title":["A Commutative Encryption and Reversible Watermarking for Fingerprint Image"],"prefix":"10.1007","author":[{"given":"Vaibhav B.","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Dhruv","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Mehul S.","family":"Raval","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"unstructured":"Fingerprint database: Fvc 2000 (2000). \n                      http:\/\/bias.csr.unibo.it\/fvc2000\/databases.asp","key":"27_CR1"},{"unstructured":"Fingerprint database: Fvc 2002 (2002). \n                      http:\/\/bias.csr.unibo.it\/fvc2002\/databases.asp","key":"27_CR2"},{"unstructured":"Fingerprint database: Fvc 2004 (2004). \n                      http:\/\/bias.csr.unibo.it\/fvc2004\/databases.asp","key":"27_CR3"},{"unstructured":"Unique identification authority of india - uidai (2012). \n                      http:\/\/uidai.gov.in\/","key":"27_CR4"},{"doi-asserted-by":"crossref","unstructured":"Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting IRIS images through asymmetric digital watermarking. In: 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp. 192\u2013197. IEEE (2007)","key":"27_CR5","DOI":"10.1109\/AUTOID.2007.380618"},{"issue":"4","key":"27_CR6","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-23678-5_2","volume-title":"Computer Analysis of Images and Patterns","author":"R Huber","year":"2011","unstructured":"Huber, R., St\u00f6gner, H., Uhl, A.: Semi-fragile watermarking in biometric systems: template self-embedding. In: Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A., Kropatsch, W. (eds.) CAIP 2011, Part II. LNCS, vol. 6855, pp. 34\u201341. Springer, Heidelberg (2011)"},{"unstructured":"Jain, A.K., Kumar, A.: Biometrics of next generation: An overview. Second Generation Biometrics (2010)","key":"27_CR8"},{"doi-asserted-by":"crossref","unstructured":"Joshi, V.B., Raval, M.S., Gupta, D., Rege, P.P., Parulkar, S.: A multiple reversible watermarking technique for fingerprint authentication. Multimedia Syst., 1\u201312 (2015)","key":"27_CR9","DOI":"10.1007\/s00530-015-0465-6"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/978-3-540-30548-4_72","volume-title":"Advances in Biometric Person Authentication","author":"MK Khan","year":"2004","unstructured":"Khan, M.K., Zhang, J.-S., Tian, L.: Protecting biometric data for personal identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629\u2013638. Springer, Heidelberg (2004)"},{"issue":"3","key":"27_CR11","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/s11042-011-0974-z","volume":"64","author":"C Li","year":"2013","unstructured":"Li, C., Wang, Y., Ma, B., Zhang, Z.: Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimedia Tools Appl. 64(3), 757\u2013776 (2013)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"27_CR12","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"unstructured":"NSTC, Committee on Technology, Committee on Homeland, National Security, Subcommittee on Biometrics: Fingerprint recognition (2006). \n                      http:\/\/www.biometrics.gov\/documents\/fingerprintrec.pdf","key":"27_CR13"},{"unstructured":"Raval, M.S.: A secure steganographic technique for blind steganalysis resistance. In: Seventh International Conference on Advances in Pattern Recognition, 2009. ICAPR 2009, pp. 25\u201328. IEEE (2009)","key":"27_CR14"},{"doi-asserted-by":"crossref","unstructured":"Schmidt, G.: Relational mathematics, no. 132 in encyclopedia of mathematics and its applications (2010)","key":"27_CR15","DOI":"10.1017\/CBO9780511778810"},{"unstructured":"Wang, D.S., Li, J.P., Wen, X.Y.: Biometric image integrity authentication based on SVD and fragile watermarking. In: Congress on Image and Signal Processing, 2008. CISP 2008. vol. 5, pp. 679\u2013682. IEEE (2008)","key":"27_CR16"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sign. Process. 94, 118\u2013127 (2014)","journal-title":"Sign. Process."},{"issue":"4","key":"27_CR18","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. Sign. Process. Lett. IEEE 18(4), 255\u2013258 (2011)","journal-title":"Sign. Process. Lett. IEEE"},{"issue":"2","key":"27_CR19","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"27_CR20","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1002\/sec.742","volume":"6","author":"X Zhang","year":"2013","unstructured":"Zhang, X.: Commutative reversible data hiding and encryption. Secur. Commun. Netw. 6(11), 1396\u20131403 (2013)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T22:51:20Z","timestamp":1559429480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}