{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:17:55Z","timestamp":1743099475895,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819610709"},{"type":"electronic","value":"9789819610716"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1071-6_14","type":"book-chapter","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:05:14Z","timestamp":1738901114000},"page":"145-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Triplet-Bio: A Secure Cloud-Edge Collaborative Biometric Authentication via\u00a0Two-Factor Secret Sharing"],"prefix":"10.1007","author":[{"given":"Hui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ying","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xingbo","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Qingguo","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s00530-022-00973-z","volume":"29","author":"Z Chen","year":"2023","unstructured":"Chen, Z., Chen, J., Ding, G., Huang, H.: A lightweight CNN-based algorithm and implementation on embedded system for real-time face recognition. Multimedia Syst. 29(1), 129\u2013138 (2023)","journal-title":"Multimedia Syst."},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/TIFS.2020.3009590","volume":"16","author":"G Mai","year":"2020","unstructured":"Mai, G., Cao, K., Lan, X., Yuen, P.C.: SecureFace: face template protection. IEEE Trans. Inf. Forensics Secur. 16, 262\u2013277 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Sun, S., Bian, W., Xie, D., Jie, B., Huang, Y.: Effective and secure two-factor multi-server authentication scheme without password. In: 3rd Information Communication Technologies Conference (ICTC), pp. 156\u2013161. IEEE (2022)","DOI":"10.1109\/ICTC55111.2022.9778443"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Kim, S., Jeong, Y., Kim, J., Kim, J., Lee, H.T., Seo, J.H.: Ironmask: modular architecture for protecting deep face template. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16125\u201316134 (2021)","DOI":"10.1109\/CVPR46437.2021.01586"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Yao, A., Li, G., Li, X., Jiang, F., Xu, J., Liu, X.: Differential privacy in edge computing-based smart city applications: security issues, solutions and future directions. Array 19 100293 (2023)","DOI":"10.1016\/j.array.2023.100293"},{"issue":"3","key":"14_CR6","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Manisha., Kumar, N.: Cancelable biometrics: a comprehensive survey. Artif. Intell. Rev. 53, 3403\u20133446 (2020)","DOI":"10.1007\/s10462-019-09767-8"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Sharma, S., Saini, A., Chaudhury, S.: A survey on biometric cryptosystems and their applications. Comput. Secur. 103458 (2023)","DOI":"10.1016\/j.cose.2023.103458"},{"issue":"4","key":"14_CR9","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561\u2013572 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, H., Li, X., Tan, S.-Y., Lee, M.J., Jin, Z.: Privacy-preserving biometric authentication: cryptanalysis and countermeasures. IEEE Trans. Dependable Secure Comput. 20(6), 5056\u20135069 (2023)","DOI":"10.1109\/TDSC.2023.3239611"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Shen, Z., Li, S., Zhao, X., Zou, J.: Increauth: incremental learning based behavioral biometric authentication on smartphones. IEEE Internet Things J. 11(1), 1589\u20131603 (2023)","DOI":"10.1109\/JIOT.2023.3289935"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Ryu, R., Yeom, S., Kim, S.-H., Herbert, D.: Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9, 34541\u201334557 (2021)","DOI":"10.1109\/ACCESS.2021.3061589"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"5413","DOI":"10.1109\/TIFS.2021.3128826","volume":"16","author":"H Zhang","year":"2021","unstructured":"Zhang, H., Bian, W., Jie, B., Xu, D., Zhao, J.: A complete user authentication and key agreement scheme using cancelable biometrics and PUF in multi-server environment. IEEE Trans. Inf. Forensics Secur. 16, 5413\u20135428 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Maurya, S., Bharti, J., Roy, B.: A survey on cancellable biometrics techniques. In: 2024 IEEE International Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1\u20137. IEEE (2024)","DOI":"10.1109\/SCEECS61402.2024.10482253"},{"issue":"11","key":"14_CR15","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"issue":"4","key":"14_CR16","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIFS.2017.2777787","volume":"13","author":"H Gunasinghe","year":"2017","unstructured":"Gunasinghe, H., Bertino, E.: Privbiomtauth: privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Trans. Inf. Forensics Secur. 13(4), 1042\u20131057 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2019.07.023","volume":"102","author":"H Kaur","year":"2020","unstructured":"Kaur, H., Khanna, P.: Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Futur. Gener. Comput. Syst. 102, 30\u201341 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"14_CR18","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2017","unstructured":"Jin, Z., Hwang, J.Y., Lai, Y.-L., Kim, S., Teoh, A.B.J.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans. Inf. Forensics Secur. 13(2), 393\u2013407 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"107277","DOI":"10.1016\/j.patcog.2020.107277","volume":"103","author":"X Dong","year":"2020","unstructured":"Dong, X., Kim, S., Jin, Z., Hwang, J.Y., Cho, S., Teoh, A.B.J.: Open-set face identification with index-of-max hashing by learning. Pattern Recogn. 103, 107277 (2020)","journal-title":"Pattern Recogn."},{"issue":"12","key":"14_CR20","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","volume":"28","author":"AB Teoh","year":"2006","unstructured":"Teoh, A.B., Goh, A., Ngo, D.C.: Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892\u20131901 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1016\/j.future.2019.07.022","volume":"101","author":"K Atighehchi","year":"2019","unstructured":"Atighehchi, K., Ghammam, L., Barbier, M., Rosenberger, C.: GREYC-hashing: combining biometrics and secret for enhancing the security of protected templates. Futur. Gener. Comput. Syst. 101, 819\u2013830 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"10","key":"14_CR22","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: Arcface: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"issue":"11","key":"14_CR24","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245\u20132255 (2004)","journal-title":"Pattern Recogn."},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Dong, X., Jin, Z., Jin, A.T.B.: A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/BTAS46853.2019.9185997"},{"key":"14_CR26","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. In: Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition (2008)"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Gunther, M., Cruz, S., Rudd, E.M., Boult, T.E.: Toward open-set face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 71\u201380 (2017)","DOI":"10.1109\/CVPRW.2017.85"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1071-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:05:33Z","timestamp":1738901133000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1071-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819610709","9789819610716"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1071-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}