{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:07:58Z","timestamp":1743052078387,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_12","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T10:37:20Z","timestamp":1414233440000},"page":"112-121","source":"Crossref","is-referenced-by-count":14,"title":["A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud"],"prefix":"10.1007","author":[{"given":"Tapalina","family":"Bhattasali","sequence":"first","affiliation":[]},{"given":"Khalid","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]},{"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-79104-1_5","volume-title":"Information Security Practice and Experience","author":"Q. Tang","year":"2008","unstructured":"Tang, Q., Bringer, J., Chabanne, H., Pointcheval, D.: A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.\u00a04991, pp. 56\u201370. Springer, Heidelberg (2008)"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A.K. Jain","year":"2006","unstructured":"Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security\u00a01(2), 125\u2013143 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"12_CR3","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TIFS.2009.2033228","volume":"4","author":"T. Ignatenko","year":"2009","unstructured":"Ignatenko, T., Willems, F.M.J.: Biometric Systems: Privacy and Secrecy As-pects. IEEE Transactions on Information Forensics and Security\u00a04(4), 956\u2013973 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"12_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.5120\/3383-4691","volume":"28","author":"K. Arora","year":"2011","unstructured":"Arora, K., Garg, P.: A Quantitative Survey of Various Fingerprint Enhancement Techniques. International Journal of Computer Applications\u00a028(5), 24\u201328 (2011)","journal-title":"International Journal of Computer Applications"},{"key":"12_CR5","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-642-27245-5_18","volume-title":"Computer Information Systems \u2013 Analysis and Technologies","author":"K. Surmacz","year":"2011","unstructured":"Surmacz, K., Saeed, K.: Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor. In: Chaki, N., Cortesi, A. (eds.) CISIM 2011. CCIS, vol.\u00a0245, pp. 137\u2013144. Springer, Heidelberg (2011)"},{"issue":"6","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1016\/j.patcog.2006.11.007","volume":"40","author":"M. Liu","year":"2007","unstructured":"Liu, M., Jiang, X., Kot, A.C.: Efficient Fingerprint Search based on Database Clustering. Elsevier Journal, Pattern Recognition\u00a040(6), 1793\u20131803 (2007)","journal-title":"Elsevier Journal, Pattern Recognition"},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TIFS.2009.2021692","volume":"4","author":"H. Xu","year":"2009","unstructured":"Xu, H., Veldhuis, R.N.J., Bazen, A.M., Kevenaar, T.A.M., Akkermans, T.A.H.M., Gokberk, B.: Fingerprint Verification using Spectral Minutiae Repre-sentations. IEEE Transactions on Information Forensics and Security\u00a04(3), 397\u2013409 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1016\/j.asoc.2010.08.003","volume":"11","author":"M. Karnan","year":"2010","unstructured":"Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: A review. Elsevier Journal of Applied Soft Computing\u00a011(2), 1565\u20131573 (2010)","journal-title":"Elsevier Journal of Applied Soft Computing"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-319-04483-5_29","volume-title":"Distributed Computing and Internet Technology","author":"D. Rudrapal","year":"2014","unstructured":"Rudrapal, D., Das, S., Debbarma, S.: Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol.\u00a08337, pp. 287\u2013292. Springer, Heidelberg (2014)"},{"key":"12_CR10","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-17610-4_22","volume-title":"Security Technology, Disaster Recovery and Business Continuity","author":"C. Hegde","year":"2010","unstructured":"Hegde, C., Prabhu, H.R., Sagar, D.S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Human Authentication Based on ECG Waves Using Radon Transform. In: Kim, T.-H., Fang, W.-C., Khan, M.K., Arnett, K.P., Kang, H.-J., \u015al\u0119zak, D. (eds.) SecTech\/DRBC 2010. CCIS, vol.\u00a0122, pp. 197\u2013206. Springer, Heidelberg (2010)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Gurkan, H., Guz, U., Yarman, B.S.: Modeling of Electrocardiogram Signals using Predefined Signature and Envelope Vector Sets. EURASIP Journal on Advances in Signal Processing, Springer Open Journal, 1\u201312 (2007)","DOI":"10.1155\/2007\/12071"},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.cmpb.2013.11.017","volume":"113","author":"H.P. Silva Da","year":"2014","unstructured":"Da Silva, H.P., Louren\u00e7o, A., Fred, A.L.N., Raposo, N., De-Sousa, M.A.: Check Your Biosignals Here: A New Dataset for Off-The-Person ECG Biomet-rics. Elsevier Journal, Computer Methods and Programs in Biomedicine\u00a0113(2), 503\u2013514 (2014)","journal-title":"Elsevier Journal, Computer Methods and Programs in Biomedicine"},{"issue":"14","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1016\/j.patrec.2012.03.010","volume":"33","author":"Y.N. Singha","year":"2012","unstructured":"Singha, Y.N., Singh, S.K., Gupta, P.: Fusion of Electrocardiogram with Unobtru-sive Biometrics: An Efficient Individual Authentication System. Elsevier Journal, Pattern Recognition Letters\u00a033(14), 1932\u20131941 (2012)","journal-title":"Elsevier Journal, Pattern Recognition Letters"},{"issue":"1","key":"12_CR14","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1504\/IJBM.2013.050733","volume":"5","author":"Y. Isobe","year":"2013","unstructured":"Isobe, Y., Ohki, T., Komatsu, N.: Security Performance Evaluation for Biometric Template Protection Techniques. International Journal of Biometrics\u00a05(1), 53\u201372 (2013)","journal-title":"International Journal of Biometrics"},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H. Gao","year":"2006","unstructured":"Gao, H., Zhang, Y., Liang, S., Li, D.: A New Chaotic Algorithm for Image En-cryption. Elsevier Journal, Chaos, Solitons and Fractals\u00a029(2), 393\u2013399 (2006)","journal-title":"Elsevier Journal, Chaos, Solitons and Fractals"},{"issue":"4","key":"12_CR16","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K. Nandakumar","year":"2007","unstructured":"Nandakumar, K., Jain, A., Pankanti, S.: Fingerprint-based Fuzzy Vault: Imple-mentation and Performance. IEEE Transactions on Information Forensics and Security\u00a02(4), 744\u2013757 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2010.2043188","volume":"5","author":"M. Upmanyu","year":"2010","unstructured":"Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.V.: Blind Authen-tication: A Secure Crypto- Biometric Verification Protocol. IEEE Transactions on Information Forensics and Security\u00a05(2), 255\u2013268 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1109\/TC.2013.25","volume":"63","author":"Y. Sui","year":"2014","unstructured":"Sui, Y., Zou, X., Du, E.Y., Li, F.: Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method. IEEE Transactions on Computers\u00a063(4), 902\u2013916 (2014)","journal-title":"IEEE Transactions on Computers"},{"issue":"11","key":"12_CR19","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"A.T.B. Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number. Elsevier Journal, Pattern Recognition\u00a037(11), 2245\u20132255 (2004)","journal-title":"Elsevier Journal, Pattern Recognition"},{"issue":"4","key":"12_CR20","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"N.K. Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a029(4), 561\u2013572 (2007)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"12_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C.T. Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An Efficient Biometrics based Remote User Authentication Scheme using Smart Cards. Elsevier Journal, Journal of Network and Com-puter Applications\u00a033(1), 1\u20135 (2010)","journal-title":"Elsevier Journal, Journal of Network and Com-puter Applications"},{"issue":"4","key":"12_CR22","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"C.I. Fan","year":"2009","unstructured":"Fan, C.I., Lin, Y.H.: Provably Secure Remote Truly Three-Factor Authentication Scheme with Privacy Protection on Biometrics. IEEE Transactions on Informa-tion Forensics and Security\u00a04(4), 933\u2013945 (2009)","journal-title":"IEEE Transactions on Informa-tion Forensics and Security"},{"issue":"3","key":"12_CR23","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1049\/iet-ifs.2011.0348","volume":"7","author":"H.L. Yeh","year":"2013","unstructured":"Yeh, H.L., Chen, T.H., Hu, K.J., Shih, W.K.: Robust Elliptic Curve Cryptogra-phy-based Three Factor User Authentication Providing Privacy of Biometric Data. IET Information Security\u00a07(3), 247\u2013252 (2013)","journal-title":"IET Information Security"},{"issue":"8","key":"12_CR24","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X. Huang","year":"2011","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. IEEE Transactions on Parallel and Distributed Systems\u00a022(8), 1390\u20131397 (2011)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Monaco, J.V., Bakelman, N., Cha, S., Tappert, C.C.: Developing A Keystroke Biometric System for Continual Authentication of Computer Users. In: Proceedings of European Intelligence and Security Informatics Conference, EISIC 2012, pp. 210\u2013216 (2012)","DOI":"10.1109\/EISIC.2012.58"},{"key":"12_CR26","unstructured":"Bio Password White Paper: Authentication Solutions through Keystroke Dynamics (2007), \n                    \n                      http:\/\/www.infosecurityproductsguide.com\/technology\/2007\/BioPassword_Authentication_Solutions_WhitepaperFinal.pdf"},{"issue":"10","key":"12_CR27","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.1109\/TUFFC.921","volume":"55","author":"S. Wang","year":"2008","unstructured":"Wang, S., Lee, W.N., Provost, J., Jianwen, L., Konofagou, E.E.: A Composite High-Frame-Rate System for Clinical Cardiovascular Imaging. IEEE Transaction on Ultrasonics, Ferroelectrics and Frequency Control\u00a055(10), 2221\u20132233 (2008)","journal-title":"IEEE Transaction on Ultrasonics, Ferroelectrics and Frequency Control"},{"issue":"2","key":"12_CR28","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10845-012-0656-3","volume":"25","author":"D. Moon","year":"2014","unstructured":"Moon, D., Chung, Y., Seo, C., Kim, S.Y., Kim, J.N.: A Practical Implementation of Fuzzy Fingerprint Vault for Smart Cards. Springer, Journal of Intelligent Manufacturing\u00a025(2), 293\u2013302 (2014)","journal-title":"Springer, Journal of Intelligent Manufacturing"},{"issue":"1","key":"12_CR29","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2011.2166545","volume":"7","author":"A. Nagar","year":"2012","unstructured":"Nagar, A., Nandakumar, K., Jain, A.K.: Multibiometric Cryptosystems Based on Feature-Level Fusion. IEEE Transactions on Information Forensics and Security\u00a07(1), 255\u2013268 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T06:01:41Z","timestamp":1559023301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}