{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:43Z","timestamp":1725771283570},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_47","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"530-539","source":"Crossref","is-referenced-by-count":3,"title":["A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement"],"prefix":"10.1007","author":[{"given":"Quist-Aphetsi","family":"Kester","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Nana","sequence":"additional","affiliation":[]},{"given":"Anca Christine","family":"Pascu","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Gire","sequence":"additional","affiliation":[]},{"given":"Jojo Moses","family":"Eghan","sequence":"additional","affiliation":[]},{"given":"Nii Narku","family":"Quaynnor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Koga, Y., Yamazaki, Y., Ichino, M.: A study on the surveillance system using soft biometric information. In: 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE), October 1-4, pp. 262\u2013266 (2013), doi:10.1109\/GCCE.2013.6664819","DOI":"10.1109\/GCCE.2013.6664819"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Hae-M. Moon, C., Won, P.S.B.: The Multi-Modal Human Identification Based on Smartcard in Video Surveillance System. In: 2010 IEEE\/ACM Int\u2019l Conference on & Int\u2019l Conference on Cyber, Physical and Social Computing (CPSCom), Green Computing and Communications (GreenCom), December 18-20, pp. 691\u2013698 (2010), doi:10.1109\/GreenCom-CPSCom.2010.74","DOI":"10.1109\/GreenCom-CPSCom.2010.74"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Khan, M.K., Zhang, J.: Enhancing the transmission security of content-based hidden biometric data. In: Proceedings of the Third international conference on Advances in Neural Networks, Chengdu, China, May 28-June 01 (2006)","DOI":"10.1007\/11760191_32"},{"key":"47_CR4","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/HPDC.2001.945188","volume-title":"10th IEEE International Symposium on High Performance Distributed Computing","author":"K. Czajkowski","year":"2001","unstructured":"Czajkowski, K., Fitzgerald, S., Foster, I., Kesselman, C.: Grid Information Services for Distributed Resource Sharing. In: 10th IEEE International Symposium on High Performance Distributed Computing, pp. 181\u2013184. IEEE Press, New York (2001)"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Goel, A., Chandra, N.: A Technique for Image Encryption Based on Explosive n*n Block Displacement Followed by Inter-pixel Displacement of RGB Attribute of a Pixel. In: 2012 International Conference on Communication Systems and Network Technologies (CSNT), May 11-13, pp. 884\u2013888 (2012), doi:10.1109\/CSNT.2012.190","DOI":"10.1109\/CSNT.2012.190"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Kester, Q., Koumadi, K.M.: Cryptographie technique for image encryption based on the RGB pixel displacement. In: 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), October 25-27, pp. 74\u201377 (2012), doi:10.1109\/ICASTech.2012.6381069","DOI":"10.1109\/ICASTech.2012.6381069"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Zhu, G., Wang, W., Zhang, X., Wang, M.: Digital image encryption algorithm based on pixels. In: 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), vol. 1., October 29-31, pp. 769\u2013772 (2010), doi:10.1109\/ICICISYS.2010.5658790","DOI":"10.1109\/ICICISYS.2010.5658790"},{"issue":"8","key":"47_CR8","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z. Zhi","year":"2006","unstructured":"Zhi, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Transactions on Image Processing\u00a015(8), 2441\u20132453 (2006), doi:10.1109\/TIP.2006.875249","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"47_CR9","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-ifs:20080066","volume":"2","author":"F. Liu","year":"2008","unstructured":"Liu, F., Wu, C.-K., Lin, X.-J.: Colour visual cryptography schemes. Information Security, IET\u00a02(4), 151\u2013165 (2008), doi:10.1049\/iet-ifs:20080066","journal-title":"Information Security, IET"},{"issue":"1","key":"47_CR10","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/TIP.2010.2056376","volume":"20","author":"I. Kang","year":"2011","unstructured":"Kang, I., Arce, G.R., Lee, H.-K.: Color Extended Visual Cryptography Using Error Diffusion. IEEE Transactions on Image Processing\u00a020(1), 132\u2013145 (2011), doi:10.1109\/TIP.2010.2056376","journal-title":"IEEE Transactions on Image Processing"},{"issue":"2","key":"47_CR11","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.jvcir.2011.11.003","volume":"23","author":"F. Liu","year":"2012","unstructured":"Liu, F., Guo, T., Wu, C., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Comun. Image Represent.\u00a023(2), 331\u2013342 (2012), doi:10.1016\/j.jvcir.2011.11.003","journal-title":"J. Vis. Comun. Image Represent."},{"issue":"3","key":"47_CR12","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1023\/A:1019939020426","volume":"27","author":"W.-G. Tzeng","year":"2002","unstructured":"Tzeng, W.-G., Hu, C.-M.: A New Approach for Visual Cryptography. Des. Codes Cryptography\u00a027(3), 207\u2013227 (2002), doi:10.1023\/A:1019939020426","journal-title":"Des. Codes Cryptography"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Gao, W., Tian, Y., Huang, T., Yang, Q.: Vlogging: A survey of videoblogging technology on the web. ACM Comput. Surv.\u00a042(4), Article 15, 57 pages (2010), doi:10.1145\/1749603.1749606","DOI":"10.1145\/1749603.1749606"},{"issue":"2","key":"47_CR14","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1023\/A:1025520709481","volume":"21","author":"S.C. Hui","year":"2003","unstructured":"Hui, S.C., Wang, F.: Remote Video Monitoring Over the WWW. Multimedia Tools Appl.\u00a021(2), 73\u2013195 (2003), doi:10.1023\/A:1025520709481","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"47_CR15","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.jnca.2006.06.001","volume":"30","author":"M. Esteve","year":"2007","unstructured":"Esteve, M., Palau, C.E., Martnez-Nohales, J., Molina, B.: A video streaming application for urban traffic management. J. Netw. Comput. Appl.\u00a030(2), 479\u2013498 (2007), doi:10.1016\/j.jnca.2006.06.001","journal-title":"J. Netw. Comput. Appl."},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Turnbull, B., Slay, J.: Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process. In: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007, p. 267a (January 2007), doi:10.1109\/HICSS.2007.617","DOI":"10.1109\/HICSS.2007.617"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Aisha Al-Abdallah, A., Asma Al-Emadi, A., Mona Al-Ansari, M., Nassma Mohandes, N., Malluhi, Q.: Real-time traffic surveillance using ZigBee. In: 2010 International Conference on Computer Design and Applications (ICCDA), June 25-27, vol.\u00a01, pp. V1-550\u2013V1-554 (2010), doi:10.1109\/ICCDA.2010.5540694","DOI":"10.1109\/ICCDA.2010.5540694"},{"key":"47_CR18","doi-asserted-by":"crossref","unstructured":"Zamin, N.: Information Extraction for Counter-Terrorism: A Survey. In: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, COMPUTATIONWORLD 2009, November 15-20, pp. 520\u2013526 (2009), doi:10.1109\/ComputationWorld.2009.105","DOI":"10.1109\/ComputationWorld.2009.105"},{"key":"47_CR19","doi-asserted-by":"crossref","unstructured":"Park, H., Ham, Y.-H., Park, S.-J., Woo, J.-M., Lee, J.-B.: Large Data Transport for Real-Time Services in Sensor Networks. In: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, COMPUTATIONWORLD 2009, November 15-20, pp. 404\u2013408 (2009), doi:10.1109\/ComputationWorld.2009.97","DOI":"10.1109\/ComputationWorld.2009.97"},{"key":"47_CR20","doi-asserted-by":"crossref","unstructured":"Papalilo, E., Freisleben, B.: Combining incomparable public session keys and certificateless public key cryptography for securing the communication between grid participants. In: Meersman, R. (ed.) OTM 2007, Part II. LNCS, vol.\u00a04804, pp. 1264\u20131279. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-76843-2_8"},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Bansal, R., Sehgal, P., Bedi, P.: Securing fingerprint images using a hybrid technique. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI 2012), pp. 557\u2013565. ACM, New York (2012), doi:10.1145\/2345396.2345488","DOI":"10.1145\/2345396.2345488"},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M.: Preventing history forgery with secure provenance. Trans. Storage\u00a05(4), Article 12, 43 pages (2009), doi:10.1145\/1629080.1629082","DOI":"10.1145\/1629080.1629082"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:06:59Z","timestamp":1558850819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_47","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}