{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:44:33Z","timestamp":1761648273074},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,4,18]],"date-time":"2015-04-18T00:00:00Z","timestamp":1429315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s00530-015-0465-6","type":"journal-article","created":{"date-parts":[[2015,4,17]],"date-time":"2015-04-17T13:21:11Z","timestamp":1429276871000},"page":"367-378","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A multiple reversible watermarking technique for fingerprint authentication"],"prefix":"10.1007","volume":"22","author":[{"given":"Vaibhav B.","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Mehul S.","family":"Raval","sequence":"additional","affiliation":[]},{"given":"Dhruv","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Priti P.","family":"Rege","sequence":"additional","affiliation":[]},{"given":"S. K.","family":"Parulkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,18]]},"reference":[{"key":"465_CR5","doi-asserted-by":"crossref","unstructured":"Acharya, T., Tsai, P.S.: JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures. Wiley, New York (2005)","DOI":"10.1002\/0471745790.ch17"},{"key":"465_CR6","doi-asserted-by":"crossref","unstructured":"Baldisserra, D., Franco, A., Maio, D., Maltoni, D.: Fake fingerprint detection by odor analysis. In: Advances in Biometrics, pp. 265\u2013272. Springer, Berlin (2005)","DOI":"10.1007\/11608288_36"},{"key":"465_CR7","doi-asserted-by":"crossref","unstructured":"Bartlow, N., Kalka, N., Cukic, B., Ross, A.: Protecting iris images through asymmetric digital watermarking. In: 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp. 192\u2013197. IEEE, New York (2007)","DOI":"10.1109\/AUTOID.2007.380618"},{"key":"465_CR8","unstructured":"Bezdek, J.C., Pal, S.K.: Fuzzy Models for Pattern Recognition, vol. 267. IEEE press, New York (1992)"},{"key":"465_CR9","doi-asserted-by":"crossref","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proceedings of 2002 International Conference on Image Processing, vol. 2, pp. II-157\u2013II-160. IEEE, New York (2002)","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"465_CR10","doi-asserted-by":"crossref","unstructured":"Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B.: Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, vol. 18. Springer, Berlin (2008)","DOI":"10.1007\/978-0-387-71613-8"},{"key":"465_CR11","unstructured":"E-governance standards: Standards for e-governance applications. http:\/\/egovstandards.gov.in\/standardsandFramework\/biometric-standards\/fingerprint_image_data_standard_ver1.0.pdf\/view (2008)"},{"key":"465_CR12","doi-asserted-by":"crossref","unstructured":"El Bakrawy, L.M., Ghali, N.I., Hassanien, A.E., Peters, J.F.: Strict authentication of multimodal biometric images using near sets. In: Soft Computing in Industrial Applications, pp. 249\u2013258. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-20505-7_22"},{"key":"465_CR13","doi-asserted-by":"crossref","unstructured":"Fatindez-Zanuy, M.: On the vulnerability of biometric security systems. IEEE Aerosp. Electron. Syst. Mag. 3\u20138 (2004)","DOI":"10.1109\/MAES.2004.1308819"},{"key":"465_CR1","unstructured":"Fingerprint database: Fvc 2000. http:\/\/bias.csr.unibo.it\/fvc2000\/databases.asp (2000)"},{"key":"465_CR2","unstructured":"Fingerprint database: Fvc 2002. http:\/\/bias.csr.unibo.it\/fvc2002\/databases.asp (2002)"},{"key":"465_CR3","unstructured":"Fingerprint database: Fvc 2004. http:\/\/bias.csr.unibo.it\/fvc2004\/databases.asp (2004)"},{"key":"465_CR4","unstructured":"Fingerprint verification competition: Fvc 2006. http:\/\/bias.csr.unibo.it\/fvc2006\/ (2006)"},{"key":"465_CR14","unstructured":"Gonzalez, R.C., Woods, R.E., Eddins, S.L.: Digital Image Processing Using MATLAB. Pearson Education, India (2004)"},{"issue":"4","key":"465_CR15","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s12046-012-0089-x","volume":"37","author":"AK Gupta","year":"2012","unstructured":"Gupta, A.K., Raval, M.S.: A robust and secure watermarking scheme based on singular values replacement. Sadhana 37(4), 425\u2013440 (2012)","journal-title":"Sadhana"},{"key":"465_CR16","unstructured":"Homelend Security: Ntas guide. http:\/\/www.dhs.gov\/xlibrary\/assets\/ntas\/ntas-public-guide.pdf (2011)"},{"key":"465_CR17","doi-asserted-by":"crossref","unstructured":"Huber, R., St\u00f6gner, H., Uhl, A.: Semi-fragile watermarking in biometric systems: template self-embedding. In: Computer Analysis of Images and Patterns, pp. 34\u201341. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-23678-5_2"},{"key":"465_CR18","doi-asserted-by":"crossref","unstructured":"Hwang, J., Kim, J., Choi, J.: A reversible watermarking based on histogram shifting. In: Digital Watermarking, pp. 348\u2013361. Springer, Berlin (2006)","DOI":"10.1007\/11922841_28"},{"issue":"1","key":"465_CR19","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/TPAMI.2010.59","volume":"33","author":"AK Jain","year":"2011","unstructured":"Jain, A.K., Feng, J.: Latent fingerprint matching. IEEE Trans Pattern Anal Mach Intell 33(1), 88\u2013100 (2011)","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"465_CR20","unstructured":"Jain, A.K., Kumar, A.: Biometrics of next generation: an overview. In: Second Generation Biometrics (2010)"},{"key":"465_CR21","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Prabhakar, S., Pankanti, S.: A filterbank-based representation for classification and matching of fingerprints. In: International Joint Conference on Neural Networks 1999, IJCNN\u201999, vol. 5, pp. 3284\u20133285. IEEE, New York (1999)","DOI":"10.1109\/IJCNN.1999.836185"},{"key":"465_CR22","doi-asserted-by":"crossref","unstructured":"Joshi, M., Joshi, V.B., Raval, M.S.: Multilevel semi-fragile watermarking technique for improving biometric fingerprint system security. In: Intelligent Interactive Technologies and Multimedia, pp. 272\u2013283. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-37463-0_25"},{"key":"465_CR23","doi-asserted-by":"crossref","unstructured":"Khan, M.K., Zhang, J., Tian, L.: Protecting biometric data for personal identification. In: Advances in Biometric Person Authentication, pp. 629\u2013638. Springer, Berlin (2005)","DOI":"10.1007\/978-3-540-30548-4_72"},{"key":"465_CR24","doi-asserted-by":"crossref","unstructured":"Komninos, N., Dimitriou, T.: Protecting biometric templates with image watermarking techniques. In: Advances in Biometrics, pp. 114\u2013123. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-74549-5_13"},{"key":"465_CR25","unstructured":"Kutter, M., Voloshynovskiy, S.V., Herrigel, A.: Watermark copy attack. In: Electronic Imaging, pp. 371\u2013380. International Society for Optics and Photonics (2000)"},{"issue":"3","key":"465_CR26","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1007\/s11042-011-0974-z","volume":"64","author":"C Li","year":"2013","unstructured":"Li, C., Wang, Y., Ma, B., Zhang, Z.: Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed. Tools Appl. 64(3), 757\u2013776 (2013)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"465_CR27","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"CY Lin","year":"2001","unstructured":"Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Trans Circuits Syst. Video Technol. 11(2), 153\u2013168 (2001)","journal-title":"IEEE Trans Circuits Syst. Video Technol."},{"issue":"1","key":"465_CR28","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R Liu","year":"2002","unstructured":"Liu, R., Tan, T.: An svd-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4(1), 121\u2013128 (2002)","journal-title":"IEEE Trans. Multimed."},{"key":"465_CR29","doi-asserted-by":"crossref","unstructured":"Ma, B., Wang, Y., Li, C., Zhang, Z., Huang, D.: Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimed. Tools Appl. 1\u201330 (2013)","DOI":"10.1007\/s11042-013-1372-5"},{"key":"465_CR30","unstructured":"MI5 Security Service: Threat levels. https:\/\/www.mi5.gov.uk\/home\/the-threats\/terrorism\/threat-levels.html (2014)"},{"key":"465_CR31","unstructured":"NSTC, Committee on Technology, Committee on Homeland and National Security, Subcommittee on Biometrics: Fingerprint recognition. http:\/\/www.biometrics.gov\/documents\/fingerprintrec.pdf (2006)"},{"key":"465_CR32","unstructured":"Prabhakar, S.: Fingerprint classification and matching using a filterbank. PhD thesis, Michigan State University (2001)"},{"key":"465_CR33","doi-asserted-by":"crossref","unstructured":"Ratha, N.K., Bolle, R.M.: Effect of controlled image acquisition of fingerprint matching. In: International Conference on Pattern Recognition, vol. 2, pp. 1659\u20131659. IEEE Computer Society (1998)","DOI":"10.1109\/ICPR.1998.712037"},{"key":"465_CR34","doi-asserted-by":"crossref","unstructured":"Raval, M.S.: A secure steganographic technique for blind steganalysis resistance. In: Seventh International Conference on Advances in Pattern Recognition 2009, ICAPR\u201909, pp. 25\u201328. IEEE, New York (2009)","DOI":"10.1109\/ICAPR.2009.54"},{"key":"465_CR35","doi-asserted-by":"crossref","unstructured":"Sangalli, A.: The importance of being fuzzy: and other insights from the border between math and computers. Princeton University Press, New Jersey (1998)","DOI":"10.1515\/9780691187358"},{"issue":"2","key":"465_CR36","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/TIP.2005.859378","volume":"15","author":"HR Sheikh","year":"2006","unstructured":"Sheikh, H.R., Bovik, A.C.: Image information and visual quality. IEEE Trans. Image Process. 15(2), 430\u2013444 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"465_CR37","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1587\/elex.3.23","volume":"3","author":"M Vatsa","year":"2006","unstructured":"Vatsa, M., Singh, R., Noore, A., Houck, M.M., Morris, K.: Robust biometric image watermarking for fingerprint and face template protection. IEICE Electron. Express 3(2), 23\u201328 (2006)","journal-title":"IEICE Electron. Express"},{"key":"465_CR38","doi-asserted-by":"crossref","unstructured":"Wang, D.S., Li, J.P., Wen, X.Y.: Biometric image integrity authentication based on SVD and fragile watermarking. In: Congress on Image and Signal Processing 2008, CISP\u201908, vol. 5, pp. 679\u2013682. IEEE, New York (2008)","DOI":"10.1109\/CISP.2008.248"},{"key":"465_CR39","doi-asserted-by":"crossref","unstructured":"Watson, C., Wilson, C.: Effect of image size and compression on one-to-one fingerprint matching. US Department of Commerce, National Institute of Standards and Technology (2005)","DOI":"10.6028\/NIST.IR.7201"},{"key":"465_CR40","doi-asserted-by":"crossref","unstructured":"Whitelam, C., Osia, N., Bourlai, T.: Securing multimodal biometric data through watermarking and steganography. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 61\u201366. IEEE, New York (2013)","DOI":"10.1109\/THS.2013.6698977"},{"issue":"5","key":"465_CR41","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1109\/76.780358","volume":"9","author":"Z Xiong","year":"1999","unstructured":"Xiong, Z., Ramchandran, K., Orchard, M.T., Zhang, Y.Q.: A comparative study of DCT-and wavelet-based image coding. IEEE Trans. Circuits Syst. Video Technol. 9(5), 692\u2013695 (1999)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"465_CR42","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1242471.1242473","volume":"39","author":"D Zheng","year":"2007","unstructured":"Zheng, D., Liu, Y., Zhao, J., Saddik, A.E.: A survey of RST invariant image watermarking algorithms. ACM Comput. Surv. (CSUR) 39(2), 5 (2007)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"465_CR43","first-page":"022","volume":"4","author":"B Zhou","year":"2004","unstructured":"Zhou, B., Chen, J.: A geometric distortion resilient image watermarking algorithm based on SVD. J. Image Graph. 4, 022 (2004)","journal-title":"J. Image Graph."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-015-0465-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00530-015-0465-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-015-0465-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T17:18:05Z","timestamp":1566580685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00530-015-0465-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,18]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["465"],"URL":"https:\/\/doi.org\/10.1007\/s00530-015-0465-6","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,18]]}}}