{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:48:58Z","timestamp":1743061738455,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813292901"},{"type":"electronic","value":"9789813292918"}],"license":[{"start":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:00:00Z","timestamp":1568937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-32-9291-8_2","type":"book-chapter","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T18:07:48Z","timestamp":1568916468000},"page":"13-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Remote Multimodal\u00a0Biometric\u00a0Authentication using Visual Cryptography"],"prefix":"10.1007","author":[{"given":"Harkeerat","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Pritee","family":"Khanna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology-EUROCRYPT\u201994, pp. 1\u201312. Springer (1995)","DOI":"10.1007\/BFb0053419"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.procs.2010.11.018","volume":"2","author":"T Monoth","year":"2010","unstructured":"Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143\u2013148 (2010)","journal-title":"Procedia Comput. Sci."},{"key":"2_CR3","unstructured":"Muhammed, R.P., et al.: A secured approach to visual cryptographic biometric template. ACEEE Int. J. Netw. Secur. 2 (2011)"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/TIFS.2010.2097252","volume":"6","author":"A Ross","year":"2011","unstructured":"Ross, A., Othman, A.: Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6, 70\u201381 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 113 (2008)","DOI":"10.1155\/2008\/579416"},{"key":"2_CR6","first-page":"32","volume":"2","author":"V Takur","year":"2012","unstructured":"Takur, V., Jaiswal, R., Sonawane, S., Nalavade, R., et al.: Biometric data security using recursive visual cryptography. Inf. Knowl. Manage. 2, 32\u201336 (2012)","journal-title":"Inf. Knowl. Manage."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Patil, S., Tajane, K., Sirdeshpande, J.: Enhancing security and privacy in biometrics based authentication system using multiple secret sharing. In: 2015 International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 190\u2013194. IEEE (2015)","DOI":"10.1109\/ICCUBEA.2015.42"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Nandakumar, K., Ratha, N., Pankanti, S., Darnell, S.: Secure one-time biometrie tokens for non-repudiable multi-party transactions. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/WIFS.2017.8267654"},{"key":"2_CR9","unstructured":"Biometrics Ideal Test: CASIA-FaceV5. http:\/\/biometrics.idealtest.org (2010)"},{"key":"2_CR10","unstructured":"The Hong Kong Polytechnic University: PolyU HRF. http:\/\/www.comp.polyu.edu.hk\/~biometrics\/HRF\/HRF.htm (2008)"},{"key":"2_CR11","unstructured":"Google. https:\/\/www.google.com"},{"key":"2_CR12","first-page":"75","volume":"17","author":"RW Floyd","year":"1976","unstructured":"Floyd, R.W.: An adaptive algorithm for spatial gray-scale. Proc. Soc. Inf. Disp. 17, 75\u201377 (1976)","journal-title":"Proc. Soc. Inf. Disp."},{"key":"2_CR13","first-page":"1691","volume":"9","author":"ZH Wang","year":"2013","unstructured":"Wang, Z.H., Pizzolatti, M., Chang, C.C.: Reversible visual secret sharing based on random-grids for two-image encryption. Int. J. Innov. Comput. Inf. Control 9, 1691\u20131701 (2013)","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1109\/TCSVT.2011.2133470","volume":"21","author":"TH Chen","year":"2011","unstructured":"Chen, T.H., Tsao, K.H.: User-friendly random-grid-based visual secret sharing. IEEE Trans. Circuits Syst. Video Technol. 21, 1693\u20131703 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TNN.2002.806629","volume":"14","author":"J Lu","year":"2003","unstructured":"Lu, J., Plataniotis, K.N., Venetsanopoulos, A.N.: Face recognition using kernel direct discriminant analysis algorithms. IEEE Trans. Neural Netw. 14, 117\u2013126 (2003)","journal-title":"IEEE Trans. Neural Netw."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1016\/S0167-8655(02)00376-8","volume":"24","author":"Y He","year":"2003","unstructured":"He, Y., Tian, J., Luo, X., Zhang, T.: Image enhancement and minutiae matching in fingerprint verification. Pattern Recognit. Lett. 24, 1349\u20131360 (2003)","journal-title":"Pattern Recognit. Lett."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of 3rd International Conference on Computer Vision and Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-32-9291-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T08:41:09Z","timestamp":1662194469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-32-9291-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,20]]},"ISBN":["9789813292901","9789813292918"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-32-9291-8_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,20]]},"assertion":[{"value":"20 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}