{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T21:50:54Z","timestamp":1777672254658,"version":"3.51.4"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10489-021-02401-7","type":"journal-article","created":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T05:30:33Z","timestamp":1620192633000},"page":"501-513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Multi-instance cancellable biometrics schemes based on generative adversarial network"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5593-8416","authenticated-orcid":false,"given":"Mayada","family":"Tarek","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eslam","family":"Hamouda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. S.","family":"Abohamama","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,5,4]]},"reference":[{"key":"2401_CR1","doi-asserted-by":"publisher","unstructured":"Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Tech 14:4\u201320. https:\/\/doi.org\/10.1109\/TCSVT.2003.818349","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"2401_CR2","doi-asserted-by":"publisher","unstructured":"Bharadi VA, et al. (2018) Multi-instance Iris Recognition, The 4th. IntConf. on Comput. Communication Control and Automation (ICCUBEA), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCUBEA.2018.8697811","DOI":"10.1109\/ICCUBEA.2018.8697811"},{"key":"2401_CR3","doi-asserted-by":"publisher","first-page":"3026","DOI":"10.1016\/j.neucom.2007.12.017","volume":"71","author":"MK Khan","year":"2018","unstructured":"Khan MK, Zhang J (2018) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71:3026\u20133031. https:\/\/doi.org\/10.1016\/j.neucom.2007.12.017","journal-title":"Neurocomputing"},{"key":"2401_CR4","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.neucom.2014.06.040","volume":"147","author":"G Bhatnagar","year":"2015","unstructured":"Bhatnagar G (2015) Wu & q. j. A novel chaos-based secure transmission of biometric data, Neurocomputing 147:444\u2013455. https:\/\/doi.org\/10.1016\/j.neucom.2014.06.040","journal-title":"A novel chaos-based secure transmission of biometric data, Neurocomputing"},{"key":"2401_CR5","doi-asserted-by":"publisher","first-page":"18848","DOI":"10.1109\/ACCESS.2017.2784352","volume":"6","author":"K Nguyen","year":"2017","unstructured":"Nguyen K, et al. (2017) Iris recognition with off-the-shelf CNN features: a deep learning perspective. IEEE Access 6:18848\u201318855. https:\/\/doi.org\/10.1109\/ACCESS.2017.2784352","journal-title":"IEEE Access"},{"key":"2401_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.patcog.2017.05.021","volume":"72","author":"K Fookes","year":"2017","unstructured":"Fookes K, et al. (2017) Long range iris recognition: a survey. Pattern Recogn 72:123\u2013143. https:\/\/doi.org\/10.1016\/j.patcog.2017.05.021","journal-title":"Pattern Recogn"},{"key":"2401_CR7","doi-asserted-by":"publisher","first-page":"2848","DOI":"10.1007\/s10489-020-01681-9","volume":"50","author":"MK Morampudi","year":"2020","unstructured":"Morampudi MK, et al. (2020) Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server. Appl Intell 50:2848\u20132866. https:\/\/doi.org\/10.1007\/s10489-020-01681-9","journal-title":"Appl Intell"},{"key":"2401_CR8","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10044-015-0482-2","volume":"19","author":"S Umer","year":"2016","unstructured":"Umer S, Dhara BC, Chanda B (2016) Texture code matrix-based multi-instance iris recognition. Pattern Anal Appl 19:283\u2013295. https:\/\/doi.org\/10.1007\/s10044-015-0482-2","journal-title":"Pattern Anal Appl"},{"key":"2401_CR9","doi-asserted-by":"publisher","unstructured":"Rathgeb C, Busch C (2012) Multi biometric template protection: Issues and challenges. Trends Dev Biometr:173\u2013190. https:\/\/doi.org\/10.5772\/52152","DOI":"10.5772\/52152"},{"key":"2401_CR10","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1016\/j.neucom.2006.08.009","volume":"70","author":"YF Yao","year":"2007","unstructured":"Yao YF, Jing XY, Wong HS (2007) Face and palmprint feature level fusion for single sample biometrics recognition. Neurocomputing 70:1582\u20131586. https:\/\/doi.org\/10.1016\/j.neucom.2006.08.009","journal-title":"Neurocomputing"},{"key":"2401_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2008\/579416","volume":"1","author":"Ak Jain","year":"2008","unstructured":"Jain A. k., Nandakumar K, Nagar A (2008) Biometric template security. URASIP J Adv Signal Process 1:1\u201317. https:\/\/doi.org\/10.1155\/2008\/579416","journal-title":"URASIP J Adv Signal Process"},{"key":"2401_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/1687-417X-2011-3","volume":"3","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb C, Uhl A (2011) A.survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 3:3\u201325. https:\/\/doi.org\/10.1186\/1687-417X-2011-3","journal-title":"EURASIP J Inf Secur"},{"key":"2401_CR13","first-page":"41","volume":"8","author":"M Soltane","year":"2017","unstructured":"Soltane M, Messikh L, Zaoui A (2017) A Review Regarding the Biometrics Cryptography Challenging Design and Strategies. Broad Res Artif Intell Neurosci 8:41\u201364","journal-title":"Broad Res Artif Intell Neurosci"},{"key":"2401_CR14","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1049\/iet-bmt.2015.0045","volume":"5","author":"M Tarek","year":"2016","unstructured":"Tarek M, Ouda O, Hamza T (2016) Robust cancelable biometrics scheme based on neural networks. IET J Biometr 5:220\u2013228. https:\/\/doi.org\/10.1049\/iet-bmt.2015.0045","journal-title":"IET J Biometr"},{"key":"2401_CR15","doi-asserted-by":"publisher","unstructured":"Alwan HB, Ku-Mahamud KR (2020) Cancellable face biometrics template using alexnet. Springer Int Conf Appl Comput Support Indust Innov Tech 1174:336\u2013348. https:\/\/doi.org\/10.1007\/978-3-030-38752-5_27","DOI":"10.1007\/978-3-030-38752-5_27"},{"key":"2401_CR16","doi-asserted-by":"publisher","unstructured":"Algarni AD, et al. (2020) Efficient implementation of homomorphic and fuzzy transforms in Random-Projection encryption frameworks for cancellable face recognition. Electronics 9. https:\/\/doi.org\/10.3390\/electronics9061046","DOI":"10.3390\/electronics9061046"},{"key":"2401_CR17","doi-asserted-by":"publisher","first-page":"131338","DOI":"10.1109\/ACCESS.2019.2938019","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang X, Li H (2019) One-factor cancellable palmprint recognition scheme based on OIOM and minimum signature hash. IEEE Access 7:131338\u2013131354. https:\/\/doi.org\/10.1109\/ACCESS.2019.2938019","journal-title":"IEEE Access"},{"key":"2401_CR18","doi-asserted-by":"publisher","unstructured":"Trivedi AK, Thounaojam DM, Pal S (2020) Non-Invertible cancellable fingerprint template for fingerprint biometric. Comput Secur:90. https:\/\/doi.org\/10.1016\/j.cose.2019.101690","DOI":"10.1016\/j.cose.2019.101690"},{"key":"2401_CR19","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.patcog.2018.01.026","volume":"78","author":"W Yang","year":"2018","unstructured":"Yang W, et al. (2018) A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognit 78:242\u2013251. https:\/\/doi.org\/10.1016\/j.patcog.2018.01.026","journal-title":"Pattern Recognit"},{"key":"2401_CR20","doi-asserted-by":"publisher","unstructured":"Soliman RF, Amin M, Abd El-Samie FE (2018) A double random phase encoding approach for cancelable iris recognition. Opt Quant Electron:50. https:\/\/doi.org\/10.1007\/s11082-018-1591-0","DOI":"10.1007\/s11082-018-1591-0"},{"key":"2401_CR21","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1109\/TIFS.2018.2855669","volume":"14","author":"H Kaur","year":"2018","unstructured":"Kaur H, Khanna P (2018) Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans Inf Forens Secur 14:709\u2013719. https:\/\/doi.org\/10.1109\/TIFS.2018.2855669","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2401_CR22","doi-asserted-by":"publisher","first-page":"32333","DOI":"10.1007\/s11042-019-07824-6","volume":"78","author":"Y Zakaria","year":"2019","unstructured":"Zakaria Y, et al. (2019) Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis. Multimed Tools Appl 78:32333\u201332355. https:\/\/doi.org\/10.1007\/s11042-019-07824-6","journal-title":"Multimed Tools Appl"},{"key":"2401_CR23","doi-asserted-by":"publisher","unstructured":"Debiasi L et al (2019) Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms. IEEE Int Worksh Inf Forens Secur:1\u20136. https:\/\/doi.org\/10.1109\/WIFS47025.2019.9034984","DOI":"10.1109\/WIFS47025.2019.9034984"},{"key":"2401_CR24","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell A, White T, Dumoulin V, Arulkumaran K, Sengupta B, Bharath A (2018) Generative Adversarial Networks: An Overview. IEEE Signal Process Mag 35:53\u201365. https:\/\/doi.org\/10.1109\/MSP.2017.2765202","journal-title":"IEEE Signal Process Mag"},{"key":"2401_CR25","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.1109\/TNNLS.2018.2875194","volume":"30","author":"A Creswell","year":"2018","unstructured":"Creswell A, Bharath AA (2018) Inverting the Generator of a Generative Adversarial Network. IEEE Trans Neural Netw Learn Syst 30:1967\u20131974. https:\/\/doi.org\/10.1109\/TNNLS.2018.2875194","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2401_CR26","unstructured":"Masek L, Kovesi P (2003) Matlab source code for a biometric identification system based on iris patterns: The School of Computer Science and Software Engineering. The University of Western Australia"},{"key":"2401_CR27","doi-asserted-by":"publisher","first-page":"498","DOI":"10.6633\/IJNS.201707.19(4).02","volume":"19","author":"M Tarek","year":"2017","unstructured":"Tarek M, Ouda O, Hamza T (2017) Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional Memory Model. Int J Netw Secur 19:498\u2013506. https:\/\/doi.org\/10.6633\/IJNS.201707.19(4).02","journal-title":"Int J Netw Secur"},{"key":"2401_CR28","unstructured":"CASIA iris image database. Available at http:\/\/www.cbsr.ia.ac.cn\/, (accessed 24 Feb 2021)"},{"key":"2401_CR29","doi-asserted-by":"publisher","unstructured":"Morampudi MK, Veldandi S, Prasad MV, Raju U (2020) Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server. Appl Intell 50, 2848\u20132866. https:\/\/doi.org\/10.1007\/s10489-020-01681-9","DOI":"10.1007\/s10489-020-01681-9"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02401-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02401-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02401-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T06:33:33Z","timestamp":1642142013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02401-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,4]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["2401"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02401-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,4]]},"assertion":[{"value":"30 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}