{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:28:14Z","timestamp":1743042494195,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819712793"},{"type":"electronic","value":"9789819712809"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1280-9_7","type":"book-chapter","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T06:01:41Z","timestamp":1712037701000},"page":"80-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Authentication that Combines rPPG Information with Face Detection on the Blockchain"],"prefix":"10.1007","author":[{"given":"Maoying","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wu","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Ruochen","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yin","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Lan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Chao, L., Debiao, H., Xinyi, H., Khan, K.: DCAP: a secure and efficient decentralized conditional anonymous payment system based on blockchain. IEEE Trans. Inf. Forensics Secur. 15, 2440\u20132452 (2020)","DOI":"10.1109\/TIFS.2020.2969565"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.icte.2019.08.002","volume":"7","author":"O Pal","year":"2021","unstructured":"Pal, O., Alam, B., Thakur, V., Singh, S.: Key management for blockchain technology. ICT Express 7(1), 76\u201380 (2021)","journal-title":"ICT Express"},{"issue":"14","key":"7_CR3","doi-asserted-by":"publisher","first-page":"6252","DOI":"10.3390\/app11146252","volume":"11","author":"S Johar","year":"2021","unstructured":"Johar, S., Ahmad, N., Asher, W., Cruickshank, H., Durrani, A.: Research and applied perspective to blockchain technology: a comprehensive survey. Appl. Sci. 11(14), 6252 (2021)","journal-title":"Appl. Sci."},{"key":"7_CR4","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media Inc., Sebastopol (2015)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Medikonda, A.K., Padmatti, Y., Kosuru, V.B., Thudumu, R.: Biometric authentication: a holistic review. In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, Palladam, India, pp. 428\u2013433 (2018)","DOI":"10.1109\/I-SMAC.2018.8653751"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Sharma, V.K.: Designing of face recognition system. In: 2019 International Conference on Intelligent Computing and Control Systems (ICCS), Madurai, India, pp. 459\u2013461 (2019)","DOI":"10.1109\/ICCS45141.2019.9065373"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Shamini, B.P., Nithish, S.H., Surendar, N.: Bank transaction using face recognition. In: 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India, pp. 772\u2013774 (2022)","DOI":"10.1109\/IIHC55949.2022.10060800"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2017. Lecture Notes in Computer Science(), vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Yadav, D., Kohli, N., Singh, R., Vatsa, M., Noore, A.: Face presentation attack with latex masks in multispectral videos. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, pp. 275\u2013283 (2017)","DOI":"10.1109\/CVPRW.2017.40"},{"key":"7_CR10","unstructured":"Citron, D.K.: How deepfakes undermine truth and threaten democracy. TED (2019)"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","volume":"2","author":"J Galbally","year":"2014","unstructured":"Galbally, J., Marcel, S., Fierrez, J.: Biometric antispoofing methods: a survey in face recognition. IEEE Access 2, 1530\u20131552 (2014)","journal-title":"IEEE Access"},{"key":"7_CR12","unstructured":"Hernandez-Ortega, J., Tolosana, R., Fierrez, J., Morales, A.: Deepfakeson-phys: Deepfakes detection based on heart rate estimation. arXiv preprint: arXiv:2010.00400 (2020)"},{"issue":"7","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1109\/TIFS.2014.2322255","volume":"9","author":"N Erdogmus","year":"2014","unstructured":"Erdogmus, N., Marcel, S.: Spoofing face recognition with 3D masks. IEEE Trans. Inf. Forensics Secur. 9(7), 1084\u20131097 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, L., Li, H., Sun, L., Shi, Z., He, Y.: Poster: towards fully distributed user authentication with blockchain. In: 2017 IEEE Symposium on Privacy-Aware Computing (PAC), Washington, DC, USA, pp. 202\u2013203 (2017)","DOI":"10.1109\/PAC.2017.28"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Abbasi, A.G., Khan, Z.: Veidblock: verifiable identity using blockchain and ledger in a software defined network. In: Companion Proceedings of the10th International Conference on Utility and Cloud Computing, pp. 173\u2013179 (2017)","DOI":"10.1145\/3147234.3148088"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.icte.2021.08.003","volume":"7","author":"YK Lee","year":"2021","unstructured":"Lee, Y.K., Jeong, J.: Securing biometric authentication system using blockchain. ICT Express 7(3), 322\u2013326 (2021)","journal-title":"ICT Express"},{"issue":"1","key":"7_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/fi12010010","volume":"12","author":"R P\u00e1ez","year":"2020","unstructured":"P\u00e1ez, R., P\u00e9rez, M., Ram\u00edrez, G., Montes, J., Bouvarel, L.: An architecture for biometric electronic identification document system based on blockchain. Future Internet 12(1), 10 (2020)","journal-title":"Future Internet"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Hsu, C.S., Tu, S.F., Chiu, P.C.: Design of an e-diploma system based on consortium blockchain and facial recognition. Educ. Inf. Technol., 1\u201325 (2022)","DOI":"10.1007\/s10639-021-10840-5"},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s11277-022-09567-4","volume":"125","author":"Y Xu","year":"2022","unstructured":"Xu, Y., Meng, Y., Zhu, H.: An efficient double-offloading biometric authentication scheme based on blockchain for cross domain environment. Wireless Pers. Commun. 125(1), 599\u2013618 (2022). https:\/\/doi.org\/10.1007\/s11277-022-09567-4","journal-title":"Wireless Pers. Commun."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Bao, D., You, L.:Two-factor identity authentication scheme based on blockchain and fuzzy extractor. Soft Comput., 1\u201313 (2021)","DOI":"10.1007\/s00500-021-05936-6"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Qi, Y., Fu, Y., Wang, T., Lv, H.: Pftom: a blockchain based on fingerprint. In: 20Chinese Automation Congress (CAC), Shanghai, China, pp. 5338\u20135344 (2020)","DOI":"10.1109\/CAC51589.2020.9326945"},{"key":"7_CR22","first-page":"102814","volume":"59","author":"C Bisogni","year":"2021","unstructured":"Bisogni, C., Iovane, G., Landi, R.E., Nappi, M.: ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions. J. Inf. Secur. Appl. 59, 102814 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"7_CR23","doi-asserted-by":"publisher","first-page":"3737","DOI":"10.1007\/s11277-021-09311-4","volume":"123","author":"Y Yang","year":"2021","unstructured":"Yang, Y., Zhang, Q., Gao, W., Fan, C., Shu, Q., Yun, H.: Design on face recognition system with privacy preservation based on homomorphic encryption. Wireless Pers. Commun. 123(4), 3737\u20133754 (2021). https:\/\/doi.org\/10.1007\/s11277-021-09311-4","journal-title":"Wireless Pers. Commun."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Conotter, V., Bodnari, E., Boato, G., Farid, H.: Physiologically-based detection of computer generated faces in video. In: IEEE International Conference on Image Processing (ICIP), pp. 248\u2013252. IEEE (2014)","DOI":"10.1109\/ICIP.2014.7025049"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Qi, H., et al.: Deeprhythm: exposing deepfakes with attentional visual heartbeat rhythms. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 4318\u20134327 (2020)","DOI":"10.1145\/3394171.3413707"},{"key":"7_CR26","unstructured":"Ciftci, U. A., Demir, I., Yin, L.: Fakecatcher: detection of synthetic portrait videos using biological signals. In: IEEE Transactions on Pattern Analysis and Machine Intelligence (2020)"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Chen, W., McDuff, D.:DeepPhys: video-based physiological measurement using convolutional attention networks. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) Computer Vision \u2013 ECCV 2018. Lecture Notes in Computer Science(), vol. 11206, pp. 349\u2013365. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01216-8_22","DOI":"10.1007\/978-3-030-01216-8_22"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TSUSC.2018.2793466","volume":"5","author":"G Iovane","year":"2018","unstructured":"Iovane, G., Bisogni, C., De Maio, L., Nappi, M.: An encryption approach using information fusion techniques involving prime numbers and face biometrics. IEEE Trans. Sustain. Comput. 5(2), 260\u2013267 (2018)","journal-title":"IEEE Trans. Sustain. Comput."}],"container-title":["Communications in Computer and Information Science","Data Science and Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1280-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T13:13:59Z","timestamp":1731676439000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1280-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819712793","9789819712809"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1280-9_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IAIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Artificial Intelligence Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iaic2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iaicconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}