{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T03:52:58Z","timestamp":1772509978399,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s10489-025-06534-x","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T07:35:22Z","timestamp":1746430522000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Real-numbered singular matrix transformation for non-invertible and cancelable biometric templates"],"prefix":"10.1007","volume":"55","author":[{"given":"Onkar","family":"Singh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1061-2994","authenticated-orcid":false,"given":"Ajay","family":"Jaiswal","sequence":"additional","affiliation":[]},{"given":"Naveen","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"6534_CR1","doi-asserted-by":"publisher","first-page":"8531","DOI":"10.1109\/ACCESS.2023.3239387","volume":"11","author":"JC Bernal-Romero","year":"2023","unstructured":"Bernal-Romero JC, Ramirez-Cortes JM, Rangel-Magdaleno JDJ, Gomez-Gil P, Peregrina-Barreto H, Cruz-Vega I (2023) A review on protection and cancelable techniques in biometric systems. IEEE Access 11:8531\u20138568. https:\/\/doi.org\/10.1109\/ACCESS.2023.3239387","journal-title":"IEEE Access"},{"issue":"1","key":"6534_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/TBIOM.2023.3327694","volume":"6","author":"K Ito","year":"2024","unstructured":"Ito K, Kozu T, Kawai H, Hanawa G, Aoki T (2024) Cancelable face recognition using deep steganography. IEEE Trans Biom Behav Identity Sci 6(1):87\u2013102. https:\/\/doi.org\/10.1109\/TBIOM.2023.3327694","journal-title":"IEEE Trans Biom Behav Identity Sci"},{"key":"6534_CR3","doi-asserted-by":"publisher","unstructured":"Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable biometrics: a case study in fingerprints. In: 18th International Conference on Pattern Recognition (ICPR\u201906), vol 4, pp 370\u2013373. https:\/\/doi.org\/10.1109\/ICPR.2006.353","DOI":"10.1109\/ICPR.2006.353"},{"key":"6534_CR4","doi-asserted-by":"publisher","unstructured":"Nasr M, Pi\u00f3rkowski A, Mah PM, Abd El-Samie FE (2024) Cancelable biometrics based on quaternion adaptive filter optimization for security applications. In: 2024 6th International Conference on Computing and Informatics (ICCI), pp 490\u2013498. https:\/\/doi.org\/10.1109\/ICCI61671.2024.10485055","DOI":"10.1109\/ICCI61671.2024.10485055"},{"issue":"13","key":"6534_CR5","doi-asserted-by":"publisher","first-page":"23196","DOI":"10.1109\/JIOT.2024.3374229","volume":"11","author":"A Sardar","year":"2024","unstructured":"Sardar A, Umer S, Rout RK, Sahoo KS, Gandomi AH (2024) Enhanced biometric template protection schemes for securing face recognition in iot environment. IEEE Internet Things J 11(13):23196\u201323206. https:\/\/doi.org\/10.1109\/JIOT.2024.3374229","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"6534_CR6","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2015.2434151","volume":"32","author":"VM Patel","year":"2015","unstructured":"Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Process Mag 32(5):54\u201365. https:\/\/doi.org\/10.1109\/MSP.2015.2434151","journal-title":"IEEE Signal Process Mag"},{"issue":"24","key":"6534_CR7","doi-asserted-by":"publisher","first-page":"21457","DOI":"10.1109\/JIOT.2023.3299465","volume":"10","author":"S Umer","year":"2023","unstructured":"Umer S, Sardar A, Rout RK, Tanveer M, Razzak I (2023) Iot-enabled multimodal biometric recognition system in secure environment. IEEE Internet Things J 10(24):21457\u201321466. https:\/\/doi.org\/10.1109\/JIOT.2023.3299465","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"6534_CR8","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614\u2013634. https:\/\/doi.org\/10.1147\/sj.403.0614","journal-title":"IBM Syst J"},{"key":"6534_CR9","doi-asserted-by":"publisher","unstructured":"Manisha, Kumar N (2020) Cancelable biometrics: a comprehensive survey. Artif Intell Rev 53:3403\u20133446. https:\/\/doi.org\/10.1007\/s10462-019-09767-8","DOI":"10.1007\/s10462-019-09767-8"},{"key":"6534_CR10","doi-asserted-by":"publisher","unstructured":"Chandra E, Kanagalakshmi K (2011) Cancelable biometric template generation and protection schemes: a review. In: 2011 3rd International conference on electronics computer technology, vol 5, pp 15\u201320. https:\/\/doi.org\/10.1109\/ICECTECH.2011.5941948","DOI":"10.1109\/ICECTECH.2011.5941948"},{"key":"6534_CR11","doi-asserted-by":"publisher","unstructured":"Sharma P, Walia GS, Rohilla R (2020) Recent advancement in cancelable biometric for user recognition: a brief survey. In: 2020 9th International conference System Modeling and Advancement in Research Trends (SMART), pp 137\u2013146. https:\/\/doi.org\/10.1109\/SMART50582.2020.9337107","DOI":"10.1109\/SMART50582.2020.9337107"},{"issue":"10","key":"6534_CR12","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1080\/08839514.2021.1922841","volume":"35","author":"I Iqbal","year":"2021","unstructured":"Iqbal I, Odesanmi GA, Wang J, Liu L (2021) Comparative investigation of learning algorithms for image classification with small dataset. Appl Artif Intell 35(10):697\u2013716. https:\/\/doi.org\/10.1080\/08839514.2021.1922841","journal-title":"Appl Artif Intell"},{"key":"6534_CR13","doi-asserted-by":"publisher","first-page":"101843","DOI":"10.1016\/j.compmedimag.2020.101843","volume":"88","author":"I Iqbal","year":"2021","unstructured":"Iqbal I, Younus M, Walayat K, Kakar MU, Ma J (2021) Automated multi-class classification of skin lesions through deep convolutional neural network with dermoscopic images. Comput Med Imag Graph 88:101843. https:\/\/doi.org\/10.1016\/j.compmedimag.2020.101843","journal-title":"Comput Med Imag Graph"},{"issue":"1","key":"6534_CR14","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s10489-021-02401-7","volume":"52","author":"M Tarek","year":"2022","unstructured":"Tarek M, Hamouda E, Abohamama AS (2022) Multi-instance cancellable biometrics schemes based on generative adversarial network. Appl Intell 52(1):501\u2013513. https:\/\/doi.org\/10.1007\/s10489-021-02401-7","journal-title":"Appl Intell"},{"issue":"1","key":"6534_CR15","doi-asserted-by":"publisher","first-page":"103869","DOI":"10.1016\/j.ipm.2024.103869","volume":"62","author":"Z Zhou","year":"2025","unstructured":"Zhou Z, Liu Y, Zhu X, Zhang S, Liu Z (2025) Privacy-preserving cancelable multi-biometrics for identity information management. Inform Process Manag 62(1):103869. https:\/\/doi.org\/10.1016\/j.ipm.2024.103869","journal-title":"Inform Process Manag"},{"key":"6534_CR16","doi-asserted-by":"publisher","first-page":"100511","DOI":"10.1016\/j.eij.2024.100511","volume":"27","author":"Z Maaref","year":"2024","unstructured":"Maaref Z, Belhadj F, Attia A, Akhtar Z, Jasser MB, Ramly AM, Mohamed AW (2024) A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems. Egyptian Inform J 27:100511. https:\/\/doi.org\/10.1016\/j.eij.2024.100511","journal-title":"Egyptian Inform J"},{"key":"6534_CR17","doi-asserted-by":"publisher","unstructured":"Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: 2008 19th International conference on pattern recognition, pp 1\u20134. https:\/\/doi.org\/10.1109\/ICPR.2008.4761886","DOI":"10.1109\/ICPR.2008.4761886"},{"key":"6534_CR18","doi-asserted-by":"publisher","first-page":"2824","DOI":"10.1007\/s10489-017-1117-7","volume":"48","author":"N Kumar","year":"2018","unstructured":"Kumar N, Singh S, Kumar A (2018) Random permutation principal component analysis for cancelable biometric recognition. Appl Intell 48:2824\u20132836. https:\/\/doi.org\/10.1007\/s10489-017-1117-7","journal-title":"Appl Intell"},{"key":"6534_CR19","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1007\/s11042-019-08228-2","volume":"79","author":"N Kumar","year":"2020","unstructured":"Kumar N, Rawat M (2020) Rp-lpp: a random permutation based locality preserving projection for cancelable biometric recognition. Multimed Tool Appl 79:2363\u20132381. https:\/\/doi.org\/10.1007\/s11042-019-08228-2","journal-title":"Multimed Tool Appl"},{"issue":"1","key":"6534_CR20","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3(1):71\u201386","journal-title":"J Cogn Neurosci"},{"key":"6534_CR21","doi-asserted-by":"publisher","unstructured":"Yang J, Zhang D, Frangi AF, Yang J-y (2004) Two-dimensional pca: a new approach to appearance-based face representation and recognition. IEEE Trans Pattern Anal Mach Intell 26(1):131\u2013137. https:\/\/doi.org\/10.1109\/TPAMI.2004.1261097","DOI":"10.1109\/TPAMI.2004.1261097"},{"key":"6534_CR22","doi-asserted-by":"publisher","unstructured":"Punithavathi P, Geetha S (2021) Random permutation-based linear discriminant analysis for cancelable biometric recognition. In: Thampi SM, Gelenbe E, Atiquzzaman M, Chaudhary V, Li K-C (eds) Advances in computing and network communications, pp 593\u2013603. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-33-6977-1_43","DOI":"10.1007\/978-981-33-6977-1_43"},{"key":"6534_CR23","doi-asserted-by":"publisher","first-page":"27733","DOI":"10.1007\/s11042-018-5956-y","volume":"77","author":"ABJ Teoh","year":"2018","unstructured":"Teoh ABJ, Cho S, Kim J (2018) Random permutation maxout transform for cancellable facial template protection. Multimed Tool Appl 77:27733\u201327759. https:\/\/doi.org\/10.1007\/s11042-018-5956-y","journal-title":"Multimed Tool Appl"},{"key":"6534_CR24","doi-asserted-by":"publisher","unstructured":"Farooq F, Bolle RM, Jea T-Y, Ratha N (2007) Anonymous and revocable fingerprint recognition. In: 2007 IEEE conference on computer vision and pattern recognition, pp 1\u20137. https:\/\/doi.org\/10.1109\/CVPR.2007.383382","DOI":"10.1109\/CVPR.2007.383382"},{"key":"6534_CR25","doi-asserted-by":"publisher","unstructured":"Kumar N, Manisha (2022) Cbrw: a novel approach for cancelable biometric template generation based on 1-d random walk. Appl Intell 52(13):15417\u201315435. https:\/\/doi.org\/10.1007\/s10489-022-03215-x","DOI":"10.1007\/s10489-022-03215-x"},{"issue":"16","key":"6534_CR26","doi-asserted-by":"publisher","first-page":"23217","DOI":"10.1007\/s11042-022-12655-z","volume":"81","author":"S Rafiq","year":"2022","unstructured":"Rafiq S, Selwal A (2022) Block-xor based cancellable template protection scheme for multi-instance iris biometric system. Multimed Tool Appl 81(16):23217\u201323235. https:\/\/doi.org\/10.1007\/s11042-022-12655-z","journal-title":"Multimed Tool Appl"},{"key":"6534_CR27","doi-asserted-by":"publisher","unstructured":"Manisha, Kumar N (2020) On generating cancelable biometric template using reverse of boolean xor. In: 2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3), pp 1\u20134. https:\/\/doi.org\/10.1109\/ICONC345789.2020.9117459","DOI":"10.1109\/ICONC345789.2020.9117459"},{"issue":"7","key":"6534_CR28","doi-asserted-by":"publisher","first-page":"4329","DOI":"10.37418\/amsj.9.7.3","volume":"9","author":"M Miteva","year":"2020","unstructured":"Miteva M, Koceva Lazarova L, Stojkovic N, Stojanova A (2020) A way to generate singular matrix. Advan Math: Sci J 9(7):4329\u20134344. https:\/\/doi.org\/10.37418\/amsj.9.7.3","journal-title":"Advan Math: Sci J"},{"key":"6534_CR29","unstructured":"Nefian AV (1999) Georgia tech face database"},{"issue":"6","key":"6534_CR30","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.imavis.2009.11.005","volume":"28","author":"CE Thomaz","year":"2010","unstructured":"Thomaz CE, Giraldi GA (2010) A new ranking method for principal components analysis and its application to face image analysis. Image Vis Comput 28(6):902\u2013913. https:\/\/doi.org\/10.1016\/j.imavis.2009.11.005","journal-title":"Image Vis Comput"},{"key":"6534_CR31","unstructured":"Casia.V1: Casia-IrisV1 database. http:\/\/biometrics.idealtest.org\/"},{"key":"6534_CR32","doi-asserted-by":"publisher","unstructured":"Proen\u00e7a H, Alexandre LA (2005) Ubiris: a noisy iris image database. In: Roli F, Vitulano S (eds) Image analysis and processing \u2013 ICIAP 2005, pp 970\u2013977. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/11553595_119","DOI":"10.1007\/11553595_119"},{"issue":"3","key":"6534_CR33","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1016\/j.patcog.2009.08.016","volume":"43","author":"A Kumar","year":"2010","unstructured":"Kumar A, Passi A (2010) Comparison and combination of iris matchers for reliable personal authentication. Pattern Recogn 43(3):1016\u20131026. https:\/\/doi.org\/10.1016\/j.patcog.2009.08.016","journal-title":"Pattern Recogn"},{"key":"6534_CR34","unstructured":"Gonzalez E, Alvarez L, Mazorra L: Mathematical analysis of images (AMI). AMI ear database. [online] Available: https:\/\/webctim.ulpgc.es\/research_works\/ami_ear_database\/"},{"issue":"3","key":"6534_CR35","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.patcog.2011.06.005","volume":"45","author":"A Kumar","year":"2012","unstructured":"Kumar A, Wu C (2012) Automated human identification using ear imaging. Pattern Recogn 45(3):956\u2013968. https:\/\/doi.org\/10.1016\/j.patcog.2011.06.005","journal-title":"Pattern Recogn"},{"issue":"1","key":"6534_CR36","doi-asserted-by":"publisher","first-page":"17","DOI":"10.54392\/irjmt2512","volume":"7","author":"O Singh","year":"2024","unstructured":"Singh O, Jaiswal A, Kumar N, Kumar N (2024) Cancelable biometric template generation using eigenfeature regularization. Int Res J Multidisciplinary Technovation 7(1):17\u201332. https:\/\/doi.org\/10.54392\/irjmt2512","journal-title":"Int Res J Multidisciplinary Technovation"},{"key":"6534_CR37","doi-asserted-by":"publisher","first-page":"102144","DOI":"10.1016\/j.inffus.2023.102144","volume":"103","author":"SM Abdullahi","year":"2024","unstructured":"Abdullahi SM, Sun S, Wang B, Wei N, Wang H (2024) Biometric template attacks and recent protection mechanisms: a survey. Inform Fusion 103:102144. https:\/\/doi.org\/10.1016\/j.inffus.2023.102144","journal-title":"Inform Fusion"},{"key":"6534_CR38","doi-asserted-by":"publisher","unstructured":"Kaur P, Kumar N (2023) Enhanced biometric cryptosystem using ear & iris modality based on binary robust independent\u00a0elementary feature. In: 2023 6th International Conference on Information Systems and Computer Networks (ISCON), pp 1\u20136. https:\/\/doi.org\/10.1109\/ISCON57294.2023.10112197","DOI":"10.1109\/ISCON57294.2023.10112197"},{"key":"6534_CR39","doi-asserted-by":"publisher","unstructured":"Manisha, Kumar N (2022) Cbrc: a novel approach for cancelable biometric template generation using random permutation and chinese remainder theorem. Multimed Tool Appl 81(16):22027\u201322064. https:\/\/doi.org\/10.1007\/s11042-021-11284-2","DOI":"10.1007\/s11042-021-11284-2"},{"issue":"2","key":"6534_CR40","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S et al (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31\u201338","journal-title":"Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT)"},{"key":"6534_CR41","doi-asserted-by":"publisher","unstructured":"Essaid M, Akharraz I, Saaidi A, Mouhib A (2018) A new image encryption scheme based on confusion-diffusion using an enhanced skew tent map. Procedia Comput Sci 127:539\u2013548. https:\/\/doi.org\/10.1016\/j.procs.2018.01.153 . Proceedings Of The First International Conference On Intelligent Computing In Data Sciences, ICDS2017","DOI":"10.1016\/j.procs.2018.01.153"},{"key":"6534_CR42","doi-asserted-by":"publisher","first-page":"102350","DOI":"10.1016\/j.cose.2021.102350","volume":"108","author":"MJ Lee","year":"2021","unstructured":"Lee MJ, Teoh ABJ, Uhl A, Liang S-N, Jin Z (2021) A tokenless cancellable scheme for multimodal biometric systems. Comput Secur 108:102350. https:\/\/doi.org\/10.1016\/j.cose.2021.102350","journal-title":"Comput Secur"},{"issue":"3","key":"6534_CR43","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1109\/TIFS.2018.2855669","volume":"14","author":"H Kaur","year":"2019","unstructured":"Kaur H, Khanna P (2019) Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans Inf Forensics Secur 14(3):709\u2013719. https:\/\/doi.org\/10.1109\/TIFS.2018.2855669","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6534_CR44","doi-asserted-by":"publisher","unstructured":"Lee D-H, Lee SH, Cho NI (2018) Cancelable biometrics using noise embedding. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp 3390\u20133395. https:\/\/doi.org\/10.1109\/ICPR.2018.8545121","DOI":"10.1109\/ICPR.2018.8545121"},{"key":"6534_CR45","unstructured":"Kaur H, Khanna P (2017) Non-invertible biometric encryption to generate cancelable biometric templates. In: Proceedings of the world congress on engineering and computer science, vol 1, pp 1\u20134"},{"key":"6534_CR46","doi-asserted-by":"publisher","unstructured":"Singh O, Jaiswal A, Kumar N, Kumar N (2024) Random permutation-based linear regression for cancelable biometrics. Expert Syst:13652. https:\/\/doi.org\/10.1111\/exsy.13652","DOI":"10.1111\/exsy.13652"},{"issue":"1","key":"6534_CR47","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s00138-023-01496-x","volume":"35","author":"Z Shao","year":"2024","unstructured":"Shao Z, Li L, Zhang Z, Li B, Liu X, Shang Y, Chen B (2024) Cancelable face recognition using phase retrieval and complex principal component analysis network. Mach Vis Appl 35(1):12","journal-title":"Mach Vis Appl"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06534-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06534-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06534-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T13:57:42Z","timestamp":1758290262000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06534-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":47,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["6534"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06534-x","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,5]]},"assertion":[{"value":"29 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"719"}}