{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:28:48Z","timestamp":1774974528010,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T00:00:00Z","timestamp":1765929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T00:00:00Z","timestamp":1765929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s10489-025-07029-5","type":"journal-article","created":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T10:44:10Z","timestamp":1765968250000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multimodal biometric recognition with cancelable template protection using deep learning and an optimized bloom filter"],"prefix":"10.1007","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2345-9327","authenticated-orcid":false,"given":"Md Sabuj","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8163-3146","authenticated-orcid":false,"given":"Ting","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Hengjian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,17]]},"reference":[{"key":"7029_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infrared.2021.103734","volume":"116","author":"H Ma","year":"2021","unstructured":"Ma H, Hu N, Fang C (2021) The biometric recognition system based on near-infrared finger vein image. Infrared Phys Technol 116:103734. https:\/\/doi.org\/10.1016\/j.infrared.2021.103734","journal-title":"Infrared Phys Technol"},{"key":"7029_CR2","doi-asserted-by":"publisher","first-page":"4566","DOI":"10.1109\/ACCESS.2020.3045078","volume":"9","author":"X Liu","year":"2021","unstructured":"Liu X, Xie L, Wang Y, Zou J, Xiong J, Ying Z, Vasilakos AV (2021) Privacy and security issues in deep learning: a survey. IEEE Access 9:4566\u20134593. https:\/\/doi.org\/10.1109\/ACCESS.2020.3045078","journal-title":"IEEE Access"},{"key":"7029_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19692-w","author":"MS Khan","year":"2024","unstructured":"Khan MS, Li H, Sun Y, Zhao C (2024) Cancelable fingerprint template protection based on random quantization and improved bloom filter. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-19692-w","journal-title":"Multimedia Tools Appl"},{"key":"7029_CR4","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1109\/TIFS.2020.3033189","volume":"16","author":"V Talreja","year":"2021","unstructured":"Talreja V, Valenti MC, Nasrabadi NM (2021) Deep hashing for secure multimodal biometrics. IEEE Trans Inf Forensics Secur 16:1306\u20131321. https:\/\/doi.org\/10.1109\/TIFS.2020.3033189","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7029_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2024.106006","volume":"91","author":"DK Vallabhadas","year":"2024","unstructured":"Vallabhadas DK, Sandhya M, Reddy SD, Satwika D, Prashanth GL (2024) Biometric template protection based on a cancelable convolutional neural network over iris and fingerprint. Biomed Signal Process Control 91:106006. https:\/\/doi.org\/10.1016\/j.bspc.2024.106006","journal-title":"Biomed Signal Process Control"},{"key":"7029_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103863","volume":"142","author":"MS Khan","year":"2024","unstructured":"Khan MS, Li H, Zhao C (2024) Deep secure PalmNet: a novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism. Computers Secur 142:103863. https:\/\/doi.org\/10.1016\/j.cose.2024.103863","journal-title":"Computers Secur"},{"key":"7029_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.104126","volume":"93","author":"MS Khan","year":"2025","unstructured":"Khan MS, Zhong T, Zhou F, Li H (2025) Secure and cancelable fingerprint templates with privacy-preserving mapping and template encoding. J Inf Secur Appl 93:104126. https:\/\/doi.org\/10.1016\/j.jisa.2025.104126","journal-title":"J Inf Secur Appl"},{"key":"7029_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/S0924-9338(14)78664-X","volume":"29","author":"M Hermans","year":"2014","unstructured":"Hermans M (2014) EPA-1472 - Harmonisation of psychiatric training across Europe. Eur Psychiatry 29:1. https:\/\/doi.org\/10.1016\/S0924-9338(14)78664-X","journal-title":"Eur Psychiatry"},{"issue":"2","key":"7029_CR9","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2018","unstructured":"Jin Z, Lai Y-L, Hwang J-Y, Kim S, Teoh ABJ (2018) Ranking based locality sensitive hashing enabled cancelable biometrics: index-of-max hashing. IEEE Trans Inf Forensics Secur 13(2):393\u2013407. https:\/\/doi.org\/10.1109\/TIFS.2017.2753172","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7029_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104698","volume":"159","author":"P Dash","year":"2025","unstructured":"Dash P, Samanta D, Sarma M, Das AK, Vasilakos AV (2025) Privacy preserving unique robust and revocable passcode generation from fingerprint data. Comput Secur 159:104698. https:\/\/doi.org\/10.1016\/j.cose.2025.104698","journal-title":"Comput Secur"},{"issue":"12","key":"7029_CR11","doi-asserted-by":"publisher","first-page":"6249","DOI":"10.1007\/s00371-022-02726-5","volume":"39","author":"A Ali","year":"2023","unstructured":"Ali A, Baghel VS, Prakash S (2023) A novel technique for fingerprint template security in biometric authentication systems. Vis Comput 39(12):6249\u20136263. https:\/\/doi.org\/10.1007\/s00371-022-02726-5","journal-title":"Vis Comput"},{"issue":"5","key":"7029_CR12","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","volume":"32","author":"K Nandakumar","year":"2015","unstructured":"Nandakumar K, Jain AK (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88\u2013100. https:\/\/doi.org\/10.1109\/MSP.2015.2427849","journal-title":"IEEE Signal Process Mag"},{"key":"7029_CR13","doi-asserted-by":"publisher","unstructured":"Rathgeb C, Breitinger F, Busch C (2013) Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20138. https:\/\/doi.org\/10.1109\/ICB.2013.6612976","DOI":"10.1109\/ICB.2013.6612976"},{"issue":"21","key":"7029_CR14","doi-asserted-by":"publisher","first-page":"27733","DOI":"10.1007\/s11042-018-5956-y","volume":"77","author":"ABJ Teoh","year":"2018","unstructured":"Teoh ABJ, Cho S, Kim J (2018) Random permutation Maxout transform for cancellable facial template protection. Multimedia Tools Appl 77(21):27733\u201327759. https:\/\/doi.org\/10.1007\/s11042-018-5956-y","journal-title":"Multimedia Tools Appl"},{"key":"7029_CR15","doi-asserted-by":"publisher","first-page":"8531","DOI":"10.1109\/ACCESS.2023.3239387","volume":"11","author":"JC Bernal-Romero","year":"2023","unstructured":"Bernal-Romero JC, Ramirez-Cortes JM, Rangel-Magdaleno JDJ, Gomez-Gil P, Peregrina-Barreto H, Cruz-Vega I (2023) A review on protection and cancelable techniques in biometric systems. IEEE Access 11:8531\u20138568. https:\/\/doi.org\/10.1109\/ACCESS.2023.3239387","journal-title":"IEEE Access"},{"key":"7029_CR16","doi-asserted-by":"publisher","unstructured":"Kim J, Jin\u00a0Teoh AB (2019) Sparse Combined Index-of-Max Hashing for Fingerprint Template Protection. In: 2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp. 1\u20136. https:\/\/doi.org\/10.1109\/CISP-BMEI48845.2019.8965716","DOI":"10.1109\/CISP-BMEI48845.2019.8965716"},{"key":"7029_CR17","doi-asserted-by":"publisher","unstructured":"Zhang X, Wang H, Ye L, Tao L (2020) Finger-Vein Cancelable Template Protection based on Random Permutation Projection. In: 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP), pp. 709\u2013713 . https:\/\/doi.org\/10.1109\/ICSIP49896.2020.9339312","DOI":"10.1109\/ICSIP49896.2020.9339312"},{"key":"7029_CR18","doi-asserted-by":"publisher","unstructured":"Wang X, Li H, Zhao B (2021) A Novel Palmprint Cancelable Scheme Based on Orthogonal IOM. In: Smys, S., Balas, V.E., Kamel, K.A., Lafata, P. (eds.) Inventive Computation and (Information Technologies), pp. 633\u2013645. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-33-4305-4_46","DOI":"10.1007\/978-981-33-4305-4_46"},{"key":"7029_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103021","volume":"125","author":"Y Sun","year":"2023","unstructured":"Sun Y, Li H, Li N (2023) A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter. Comput Secur 125:103021. https:\/\/doi.org\/10.1016\/j.cose.2022.103021","journal-title":"Comput Secur"},{"key":"7029_CR20","doi-asserted-by":"publisher","unstructured":"Shahreza HO, Rathgeb C, Osorio-Roig D, Hahn VK, Marcel S, Busch C (2022) Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics. In: 2022 IEEE International Joint Conference on Biometrics (IJCB), pp. 1\u201310. IEEE, Abu Dhabi, United Arab Emirates. https:\/\/doi.org\/10.1109\/IJCB54206.2022.10007960","DOI":"10.1109\/IJCB54206.2022.10007960"},{"issue":"1","key":"7029_CR21","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s42400-023-00137-0","volume":"6","author":"Y Jiang","year":"2023","unstructured":"Jiang Y, Shen P, Zeng L, Zhu X, Jiang D, Chen C (2023) Cancelable biometric schemes for Euclidean metric and Cosine metric. Cybersecurity 6(1):4. https:\/\/doi.org\/10.1186\/s42400-023-00137-0","journal-title":"Cybersecurity"},{"key":"7029_CR22","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TIFS.2022.3230212","volume":"18","author":"TM Dang","year":"2023","unstructured":"Dang TM, Nguyen TD, Hoang T, Kim H, Beng Jin Teoh A, Choi D (2023) AVET: a novel transform function to improve cancellable biometrics security. IEEE Trans Inf Forensics Secur 18:758\u2013772. https:\/\/doi.org\/10.1109\/TIFS.2022.3230212","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7029_CR23","doi-asserted-by":"publisher","first-page":"3449","DOI":"10.1109\/TIFS.2022.3208812","volume":"17","author":"MJ Lee","year":"2022","unstructured":"Lee MJ, Jin Z, Liang S-N, Tistarelli M (2022) Alignment-robust cancelable biometric scheme for iris verification. IEEE Trans Inf Forensics Secur 17:3449\u20133464. https:\/\/doi.org\/10.1109\/TIFS.2022.3208812","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7029_CR24","doi-asserted-by":"publisher","first-page":"32064","DOI":"10.1109\/ACCESS.2024.3366456","volume":"12","author":"RS P","year":"2024","unstructured":"P RS, Thomas T, Emmanuel S (2024) Cancelable biometric template generation using random feature vector transformations. IEEE Access 12:32064\u201332079. https:\/\/doi.org\/10.1109\/ACCESS.2024.3366456","journal-title":"IEEE Access"},{"key":"7029_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104381","volume":"152","author":"Q Zheng","year":"2025","unstructured":"Zheng Q, Xiang J, Song C, Matias R, Hao R, Liao S, Zhang X, Zhao M, Zhao D (2025) Cancelable iris template based on slicing. Comput Secur 152:104381. https:\/\/doi.org\/10.1016\/j.cose.2025.104381","journal-title":"Comput Secur"},{"key":"7029_CR26","doi-asserted-by":"publisher","unstructured":"Zheng Q, Xiang J, Yao Z, Tian J, Li H, Zhao D (2025) IrisSPT: Cancelable Iris Template for Secure Authentication Based on Self-Parameterized Transform. IEEE Transactions on Biometrics Behavior and Identity Science 1\u20131. https:\/\/doi.org\/10.1109\/TBIOM.2025.3557530","DOI":"10.1109\/TBIOM.2025.3557530"},{"key":"7029_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.104049","volume":"90","author":"J Kukadiya","year":"2025","unstructured":"Kukadiya J, Sandhya M, Vallabhadas DK, Prasad IH, Mooda R (2025) An alignment-free secure fingerprint authentication integrated with elliptic curve signcryption scheme. J Inf Secur Appl 90:104049. https:\/\/doi.org\/10.1016\/j.jisa.2025.104049","journal-title":"J Inf Secur Appl"},{"key":"7029_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104216","volume":"150","author":"AHY Mohammed","year":"2025","unstructured":"Mohammed AHY, Dziyauddin RA, Kamaruddin N, Rahim FA (2025) A hybrid ranking algorithm for secure and efficient iris template protection. Comput Secur 150:104216. https:\/\/doi.org\/10.1016\/j.cose.2024.104216","journal-title":"Comput Secur"},{"key":"7029_CR29","doi-asserted-by":"publisher","first-page":"64300","DOI":"10.1109\/ACCESS.2024.3395417","volume":"12","author":"U Sumalatha","year":"2024","unstructured":"Sumalatha U, Prakasha KK, Prabhu S, Nayak VC (2024) A comprehensive review of unimodal and multimodal fingerprint biometric authentication systems: fusion, attacks, and template protection. IEEE Access 12:64300\u201364334. https:\/\/doi.org\/10.1109\/ACCESS.2024.3395417","journal-title":"IEEE Access"},{"issue":"3","key":"7029_CR30","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1007\/s12596-023-01302-x","volume":"53","author":"GM Salama","year":"2024","unstructured":"Salama GM, El-Gazar S, Omar B, Hassan AA (2024) Multimodal cancelable biometric authentication system based on EEG signal for IoT applications. J Opt 53(3):1839\u20131853. https:\/\/doi.org\/10.1007\/s12596-023-01302-x","journal-title":"J Opt"},{"key":"7029_CR31","doi-asserted-by":"publisher","first-page":"173557","DOI":"10.1109\/ACCESS.2024.3501368","volume":"12","author":"D Reddy Rachapalli","year":"2024","unstructured":"Reddy Rachapalli D, Dondeti V, Kalluri HK (2024) Multimodal cancellable biometric template protection and person verification in transformed domain. IEEE Access 12:173557\u2013173582. https:\/\/doi.org\/10.1109\/ACCESS.2024.3501368","journal-title":"IEEE Access"},{"issue":"1","key":"7029_CR32","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TDSC.2020.2997558","volume":"19","author":"GS Walia","year":"2022","unstructured":"Walia GS, Aggarwal K, Singh K, Singh K (2022) Design and analysis of adaptive graph-based cancelable multi-biometrics approach. IEEE Trans Dependable Secure Comput 19(1):54\u201366. https:\/\/doi.org\/10.1109\/TDSC.2020.2997558","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"7029_CR33","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.1109\/TIFS.2019.2954779","volume":"15","author":"GS Walia","year":"2020","unstructured":"Walia GS, Jain G, Bansal N, Singh K (2020) Adaptive weighted graph approach to generate multimodal cancelable biometric templates. IEEE Trans Inf Forensics Secur 15:1945\u20131958. https:\/\/doi.org\/10.1109\/TIFS.2019.2954779","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7029_CR34","doi-asserted-by":"crossref","unstructured":"Chen Z, Shen Y, Ding M, Chen Z, Zhao H, Learned-Miller EG, Gan C (2023) Mod-squad: Designing mixtures of experts as modular multi-task learners. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 11828\u201311837","DOI":"10.1109\/CVPR52729.2023.01138"},{"key":"7029_CR35","unstructured":"Puigcerver J, Riquelme C, Mustafa B, Houlsby N (2024) From Sparse to Soft Mixtures of Experts"},{"issue":"1","key":"7029_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2024.103869","volume":"62","author":"Z Zhou","year":"2025","unstructured":"Zhou Z, Liu Y, Zhu X, Zhang S, Liu Z (2025) Privacy-preserving cancelable multi-biometrics for identity information management. Inf Process Manage 62(1):103869. https:\/\/doi.org\/10.1016\/j.ipm.2024.103869","journal-title":"Inf Process Manage"},{"issue":"1","key":"7029_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00138-023-01496-x","volume":"35","author":"Z Shao","year":"2024","unstructured":"Shao Z, Li L, Zhang Z, Li B, Liu X, Shang Y, Chen B (2024) Cancelable face recognition using phase retrieval and complex principal component analysis network. Mach Vis Appl 35(1):1\u201311. https:\/\/doi.org\/10.1007\/s00138-023-01496-x","journal-title":"Mach Vis Appl"},{"key":"7029_CR38","doi-asserted-by":"publisher","first-page":"7810","DOI":"10.1109\/TIFS.2024.3436528","volume":"19","author":"Y Wang","year":"2024","unstructured":"Wang Y, Gui J, Tang YY, Kwok JT-Y (2024) CFVNet: an end-to-end cancelable finger vein network for recognition. IEEE Trans Inf Forensics Secur 19:7810\u20137823. https:\/\/doi.org\/10.1109\/TIFS.2024.3436528","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7029_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108886","volume":"131","author":"X Dong","year":"2022","unstructured":"Dong X, Cho S, Kim Y, Kim S, Teoh ABJ (2022) Deep rank hashing network for cancellable face identification. Pattern Recogn 131:108886. https:\/\/doi.org\/10.1016\/j.patcog.2022.108886","journal-title":"Pattern Recogn"},{"issue":"12","key":"7029_CR40","doi-asserted-by":"publisher","first-page":"2224","DOI":"10.1049\/iet-ipr.2018.5912","volume":"13","author":"C Yu","year":"2019","unstructured":"Yu C, Li H, Wang X (2019) SVD-based image compression, encryption, and identity authentication algorithm on cloud. IET Image Process 13(12):2224\u20132232. https:\/\/doi.org\/10.1049\/iet-ipr.2018.5912","journal-title":"IET Image Process"},{"key":"7029_CR41","doi-asserted-by":"publisher","unstructured":"Woo S, Park J, Lee J-Y, Kweon IS (2018) CBAM: Convolutional Block Attention Module. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) Computer Vision \u2013 ECCV 2018 vol. 11211, pp. 3\u201319. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-01234-2_1","DOI":"10.1007\/978-3-030-01234-2_1"},{"issue":"10","key":"7029_CR42","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1109\/TSMC.2015.2499725","volume":"46","author":"Z Jin","year":"2016","unstructured":"Jin Z, Lim M-H, Teoh ABJ, Goi B-M, Tay YH (2016) Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans Syst Man Cybern Syst 46(10):1415\u20131428. https:\/\/doi.org\/10.1109\/TSMC.2015.2499725","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"7029_CR43","unstructured":"University T (2017) Tongji Contactless Palmprint Dataset. https:\/\/cslinzhang.github.io\/ContactlessPalm\/. [Online; accessed April 23, 2025]"},{"key":"7029_CR44","unstructured":"PolyU Biometrics Research Centre (2014) PolyU Palmprint Database. http:\/\/www.comp.polyu.edu.hk\/~biometrics\/. [Online; accessed April 23, 2025]"},{"key":"7029_CR45","doi-asserted-by":"publisher","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) FVC2002: Second Fingerprint Verification Competition. In: Object Recognition Supported by User Interaction for Service Robots, vol. 3, pp. 811\u2013814. IEEE Comput. Soc, Quebec City, Que., Canada. https:\/\/doi.org\/10.1109\/ICPR.2002.1048144","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"7029_CR46","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.patcog.2017.04.016","volume":"69","author":"L Zhang","year":"2017","unstructured":"Zhang L, Li L, Yang A, Shen Y, Yang M (2017) Towards contactless palmprint recognition: a novel device, a new benchmark, and a collaborative representation based identification approach. Pattern Recogn 69:199\u2013212. https:\/\/doi.org\/10.1016\/j.patcog.2017.04.016","journal-title":"Pattern Recogn"},{"issue":"4","key":"7029_CR47","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/TBIOM.2020.3003406","volume":"2","author":"J Zhu","year":"2020","unstructured":"Zhu J, Zhong D, Luo K (2020) Boosting unconstrained palmprint recognition with adversarial metric learning. IEEE Trans Biometrics Behav Identity Sci 2(4):388\u2013398. https:\/\/doi.org\/10.1109\/TBIOM.2020.3003406","journal-title":"IEEE Trans Biometrics Behav Identity Sci"},{"key":"7029_CR48","doi-asserted-by":"publisher","first-page":"145912","DOI":"10.1109\/ACCESS.2021.3123291","volume":"9","author":"G Arora","year":"2021","unstructured":"Arora G, Kalra S, Bhatia A, Tiwari K (2021) PalmHashNet: palmprint hashing network for indexing large databases to boost identification. IEEE Access 9:145912\u2013145928. https:\/\/doi.org\/10.1109\/ACCESS.2021.3123291","journal-title":"IEEE Access"},{"issue":"17","key":"7029_CR49","doi-asserted-by":"publisher","first-page":"11947","DOI":"10.1007\/s11042-019-08446-8","volume":"79","author":"H Li","year":"2020","unstructured":"Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme based on randomized cuckoo hashing and MinHash. Multimedia Tools Appl 79(17):11947\u201311971. https:\/\/doi.org\/10.1007\/s11042-019-08446-8","journal-title":"Multimedia Tools Appl"},{"issue":"7","key":"7029_CR50","doi-asserted-by":"publisher","first-page":"6169","DOI":"10.1007\/s10462-022-10334-x","volume":"56","author":"T Wu","year":"2023","unstructured":"Wu T, Leng L, Khan MK (2023) A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection. Artif Intell Rev 56(7):6169\u20136186. https:\/\/doi.org\/10.1007\/s10462-022-10334-x","journal-title":"Artif Intell Rev"},{"key":"7029_CR51","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1109\/LSP.2021.3071262","volume":"28","author":"Y Li","year":"2021","unstructured":"Li Y, Zhao H, Cao Z, Liu E, Pang L (2021) Compact and cancelable fingerprint binary codes generation via one permutation hashing. IEEE Signal Process Lett 28:738\u2013742. https:\/\/doi.org\/10.1109\/LSP.2021.3071262","journal-title":"IEEE Signal Process Lett"},{"key":"7029_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107735","volume":"111","author":"M Shahzad","year":"2021","unstructured":"Shahzad M, Wang S, Deng G, Yang W (2021) Alignment-free cancelable fingerprint templates with dual protection. Pattern Recogn 111:107735. https:\/\/doi.org\/10.1016\/j.patcog.2020.107735","journal-title":"Pattern Recogn"},{"issue":"13","key":"7029_CR53","doi-asserted-by":"publisher","first-page":"3645","DOI":"10.1049\/ipr2.12130","volume":"17","author":"VS Baghel","year":"2023","unstructured":"Baghel VS, Ali SS, Prakash S (2023) A non-invertible transformation based technique to protect a fingerprint template. IET Image Process 17(13):3645\u20133659. https:\/\/doi.org\/10.1049\/ipr2.12130","journal-title":"IET Image Process"},{"key":"7029_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102583","volume":"114","author":"W Yang","year":"2022","unstructured":"Yang W, Wang S, Kang JJ, Johnstone MN, Bedari A (2022) A linear convolution-based cancelable fingerprint biometric authentication system. Comput Secur 114:102583. https:\/\/doi.org\/10.1016\/j.cose.2021.102583","journal-title":"Comput Secur"},{"key":"7029_CR55","doi-asserted-by":"publisher","first-page":"4100","DOI":"10.1109\/TIFS.2024.3369322","volume":"19","author":"C Gao","year":"2024","unstructured":"Gao C, Zhang K, Wang W, Cao Z, Pang L, Liu E, Zhao H (2024) Protected face templates generation based on multiple partial Walsh transformations and Simhash. IEEE Trans Inf Forensics Secur 19:4100\u20134113. https:\/\/doi.org\/10.1109\/TIFS.2024.3369322","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7029_CR56","doi-asserted-by":"publisher","unstructured":"Champaneria VH, Zaveri MA, Patel SJ (2024) A Secure Template Protection Technique for Robust Biometric Systems. In: 2024 IEEE Students Conference on Engineering and Systems (SCES), pp. 1\u20136. https:\/\/doi.org\/10.1109\/SCES61914.2024.10652322","DOI":"10.1109\/SCES61914.2024.10652322"},{"key":"7029_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2025.113049","volume":"175","author":"S Song","year":"2025","unstructured":"Song S, Yang Y, Yu M, Liao Y, Guo W, Li J, Guo S (2025) Cancelable binary biometric template generation scheme based on partial walsh transformation and MinHash algorithm. Appl Soft Comput 175:113049. https:\/\/doi.org\/10.1016\/j.asoc.2025.113049","journal-title":"Appl Soft Comput"},{"issue":"12","key":"7029_CR58","doi-asserted-by":"publisher","first-page":"5581","DOI":"10.1007\/s12652-021-03190-0","volume":"13","author":"R Vyas","year":"2022","unstructured":"Vyas R, Kanumuri T, Sheoran G, Dubey P (2022) Accurate feature extraction for multimodal biometrics combining iris and palmprint. J Ambient Intell Humaniz Comput 13(12):5581\u20135589. https:\/\/doi.org\/10.1007\/s12652-021-03190-0","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"4","key":"7029_CR59","doi-asserted-by":"publisher","first-page":"229","DOI":"10.3934\/electreng.2021013","volume":"5","author":"C Kamlaskar","year":"2021","unstructured":"Kamlaskar C, Abhyankar A (2021) Iris-fingerprint multimodal biometric system based on optimal feature level fusion model. AIMS Electron Electr Eng 5(4):229\u2013250. https:\/\/doi.org\/10.3934\/electreng.2021013","journal-title":"AIMS Electron Electr Eng"},{"issue":"6","key":"7029_CR60","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1007\/s42979-024-03148-x","volume":"5","author":"SK Choudhary","year":"2024","unstructured":"Choudhary SK, Naik AK (2024) Multimodal biometric authentication with two-layer hybrid template security. SN Comput Sci 5(6):785. https:\/\/doi.org\/10.1007\/s42979-024-03148-x","journal-title":"SN Comput Sci"},{"key":"7029_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2025.105018","volume":"160","author":"TS Sasikala","year":"2025","unstructured":"Sasikala TS (2025) Multimodal secure biometrics using attention efficient-net hash compression framework. Digit Signal Process 160:105018. https:\/\/doi.org\/10.1016\/j.dsp.2025.105018","journal-title":"Digit Signal Process"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-07029-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-07029-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-07029-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:17:14Z","timestamp":1774865834000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-07029-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["7029"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-07029-5","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"11 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known financial interests or personal relationships that could have influenced the research findings presented in this paper. Furthermore, they confirm that no potential conflicts of interest exist that may have impacted the integrity, objectivity, or outcomes of this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"6"}}