{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T13:31:18Z","timestamp":1763904678587},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T00:00:00Z","timestamp":1574467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T00:00:00Z","timestamp":1574467200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11042-019-08163-2","type":"journal-article","created":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T17:02:57Z","timestamp":1574528577000},"page":"2521-2541","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Cancelable Iris recognition system based on comb filter"],"prefix":"10.1007","volume":"79","author":[{"given":"Randa F.","family":"Soliman","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,23]]},"reference":[{"key":"8163_CR1","unstructured":"Arpit D, Nwogu I, Srivastava G, Govindaraju (2014) An Analysis of random projections in cancelable biometrics. In: Proceedings of the 31st International Conference on Machine Learning vol. 32"},{"issue":"2","key":"8163_CR2","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.cviu.2007.08.005","volume":"110","author":"KW Bowyer","year":"2008","unstructured":"Bowyer KW, Hollingsworth K, Flynn PJ (2008) Image understanding for iris biometrics: a survey. ELSEVIER J Comput Vision Image Understand 110(2):281\u2013307","journal-title":"ELSEVIER J Comput Vision Image Understand"},{"key":"8163_CR3","doi-asserted-by":"crossref","unstructured":"Burge MJ, Kevin KW (2013) Handbook of iris recognition. Springer","DOI":"10.1007\/978-1-4471-4402-1"},{"key":"8163_CR4","unstructured":"CASIA-IrisV3 Database (2017) http:\/\/www.cbsr.ia.ac.cn\/english\/IrisDatabase.asp. Accessed December 2017."},{"key":"8163_CR5","doi-asserted-by":"crossref","unstructured":"Choudhury B, Then P, Raman V, Issac B, Haldar MK (2016) Cancelable iris biometrics based on data hiding schemes. IEEE Student Conference on Research and Development (SCOReD)","DOI":"10.1109\/SCORED.2016.7810049"},{"issue":"7","key":"8163_CR6","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1364\/JOSAA.2.001160","volume":"2","author":"JG Daugman","year":"1985","unstructured":"Daugman JG (1985) Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. Optic Soc Am J, A: Optics Image Sci 2(7):1160\u20131169","journal-title":"Optic Soc Am J, A: Optics Image Sci"},{"issue":"11","key":"8163_CR7","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J Daugman","year":"1993","unstructured":"Daugman J (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15(11):1148\u20131161","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8163_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman J (2004) How iris recognition works. IEEE Trans Circuits Syst Video Technol 14:21\u201330","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"8163_CR9","doi-asserted-by":"crossref","unstructured":"Dwivedi R, Dey S (2015) Cancelable iris template generation using look-up table mapping. Signal Processing and Integrated Networks (SPIN) 2nd International Conference on Signal Processing and Integrated Network: 785\u2013790","DOI":"10.1109\/SPIN.2015.7095296"},{"issue":"5","key":"8163_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MSP.2015.2443271","volume":"32","author":"N Evans","year":"2015","unstructured":"Evans N, Marcel S, Ross A, Teoh ABJ (2015) Biometrics security and privacy protection. IEEE Signal Process Mag 32(5):17\u201318","journal-title":"IEEE Signal Process Mag"},{"key":"8163_CR11","doi-asserted-by":"crossref","unstructured":"Ferreira JL, Wu Y, Aarts RM (2018) Enhancement of the comb filtering selectivity using iterative moving average for periodic waveform and harmonic elimination. Journal of Healthcare Engineering","DOI":"10.1155\/2018\/7901502"},{"issue":"C","key":"8163_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ins.2016.06.046","volume":"370","author":"M Gomez-Barrero","year":"2016","unstructured":"Gomez-Barrero M, Rathgeb C, Galbally J, Busch C, Fierrez J (2016) Unlinkable and irreversible biometric template protection based on bloom filters. Inf Sci 370(C):18\u201332","journal-title":"Inf Sci"},{"issue":"10","key":"8163_CR13","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1109\/TIP.2002.804262","volume":"11","author":"S Grigorescu","year":"2002","unstructured":"Grigorescu S, Petkov N, Kruizinga P (2002) Comparison of texture features based on Gabor filters. IEEE Trans Image Process 11(10):1160\u20131167","journal-title":"IEEE Trans Image Process"},{"key":"8163_CR14","first-page":"135","volume-title":"Lecture Notes in Computer Science","author":"Jutta H\u00e4mmerle-Uhl","year":"2009","unstructured":"H\u00e4mmerle-Uhl J, Pschernig E, Uhl A (2009) Cancelable iris biometrics using block re-mapping and image warping. Springer Berlin Heidelberg International Conference on Information Security: 135\u2013142"},{"key":"8163_CR15","unstructured":"Hermans J, Mennink B, Peeters R (2014) When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system. International conference of the biometrics special interest group (BIOSIG): 1\u20136, , Darmstadt, Germany"},{"key":"8163_CR16","unstructured":"Information technology, ISO\/IEC 30136 (2018) Performance testing of biometric template protection scheme for reasonable performance evaluation"},{"key":"8163_CR17","unstructured":"Jain AK, Li SZ (2005) Handbook of face recognition. Springer 1st"},{"key":"8163_CR18","doi-asserted-by":"crossref","unstructured":"Jenisch S Uhl A (2011) Security analysis of a cancelable iris recognition system based on block remapping. 18th IEEE international conference on image processing: 3213\u20133216","DOI":"10.1109\/ICIP.2011.6116352"},{"key":"8163_CR19","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1090\/conm\/026\/737400","volume":"26","author":"W Johnson","year":"1984","unstructured":"Johnson W, Lindenstrauss J (1984) Extensions of Lipschitz maps into a hilbert space. Contemp Math 26:189\u2013206","journal-title":"Contemp Math"},{"key":"8163_CR20","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1016\/j.patcog.2009.08.016","volume":"43","author":"A Kumar","year":"2010","unstructured":"Kumar A, Passi A (2010) Comparison and combination of iris matchers for reliable personal authentication. Pattern Recogn 43:1016\u20131026","journal-title":"Pattern Recogn"},{"key":"8163_CR21","doi-asserted-by":"crossref","unstructured":"Kuo SM, Lee BH, Tain W (2006) Real-time signal processing, implantations and applications. John Wiley & Sons Ltd, 2nd","DOI":"10.1002\/0470035528"},{"issue":"5","key":"8163_CR22","first-page":"315","volume":"6","author":"P Lacharme","year":"2012","unstructured":"Lacharme P (2012) Analysis of the iriscodes bioencoding scheme. Int J Comput Sci Secur 6(5):315\u2013321","journal-title":"Int J Comput Sci Secur"},{"key":"8163_CR23","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.patcog.2016.10.035","volume":"64","author":"Y Lai","year":"2017","unstructured":"Lai Y, Jin J, Teoh ABJ, Goi B, Yap W, Chai T, Rathgeb C (2017) Cancelable iris template generation based on indexing-first-one hashing. Pattern Recogn 64:105\u2013117","journal-title":"Pattern Recogn"},{"key":"8163_CR24","unstructured":"Masek L (2003) Recognition of human iris patterns for biometric identification. M. Thesis, The University of Western Australia"},{"issue":"7","key":"8163_CR25","doi-asserted-by":"publisher","first-page":"1878","DOI":"10.1587\/transinf.E93.D.1878","volume":"E93-D","author":"O Ouda","year":"2010","unstructured":"Ouda O, Tsumura N, Nakaguchi T (2010) A reliable tokenless cancelable biometrics scheme for protecting Iriscodes. IEICE Trans Inf Syst E93-D(7):1878\u20131888","journal-title":"IEICE Trans Inf Syst"},{"issue":"9","key":"8163_CR26","doi-asserted-by":"publisher","first-page":"1768","DOI":"10.1587\/transinf.E94.D.1768","volume":"94-D","author":"O Ouda","year":"2011","unstructured":"Ouda O, Tsumura N, Nakaguchi T (2011) On the security of bioEncoding based cancelable biometrics. IEICE Trans Inform Syst 94-D(9):1768\u20131777","journal-title":"IEICE Trans Inform Syst"},{"issue":"5","key":"8163_CR27","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2015.2434151","volume":"32","author":"VM Patel","year":"2015","unstructured":"Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Process Mag 32(5):54\u201365","journal-title":"IEEE Signal Process Mag"},{"issue":"7","key":"8163_CR28","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S0969-4765(17)30138-8","volume":"2017","author":"P Punithavathi","year":"2017","unstructured":"Punithavathi P, Subbiah G (2017) Can cancelable biometrics preserve privacy? Biometric Technol Today:7, 8\u201311","journal-title":"Biometric Technology Today"},{"issue":"1","key":"8163_CR29","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TIFS.2011.2166069","volume":"7","author":"AD Rahulkar","year":"2012","unstructured":"Rahulkar AD, Holambe RS (2012) Half-iris feature extraction and recognition using a new class of biorthogonal triplet half-band filter bank and flexible k-out-of-n: a postclassifier. IEEE Trans Inform Forensics Sec 7(1):230\u2013240","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"8163_CR30","doi-asserted-by":"crossref","unstructured":"Rashid RA, Mahalin NH, Sarijari MA, Abdul Aziz AA (2008) Security system using biometric technology: design and implementation of voice recognition system (VRS). International conference on computer and communication engineering ICCCE2008, 898\u2013902","DOI":"10.1109\/ICCCE.2008.4580735"},{"issue":"4","key":"8163_CR31","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561\u2013572","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8163_CR32","first-page":"3): 1","volume":"2011","author":"C Rathageb","year":"2011","unstructured":"Rathageb C, Hammerle-Uhl A (2011) A survey on biometric cryptosystem and cancelable biometrics. EURASIP J Inf Secur 2011:3): 1\u20133):25","journal-title":"EURASIP J Inf Secur"},{"key":"8163_CR33","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Uhl A (2010) Secure iris recognition based on local intensity variations. In: Proceedings of the 7th international conference on image analysis and recognition II: 266\u2013275","DOI":"10.1007\/978-3-642-13775-4_27"},{"issue":"4","key":"8163_CR34","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1049\/iet-bmt.2013.0049","volume":"3","author":"C Rathgeb","year":"2014","unstructured":"Rathgeb C, Breitinger F, Busch C, Baier H (2014) On the application of bloom filters to iris biometrics. IET J Biometr 3(4):207\u2013218","journal-title":"IET J Biometr"},{"key":"8163_CR35","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Breitinger F, Baier H, Busch C (2015) Towards bloom filter-based indexing of iris biometric data. IEEE International Conference on Biometrics (ICB): 422\u2013429","DOI":"10.1109\/ICB.2015.7139105"},{"key":"8163_CR36","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.ijleo.2016.11.150","volume":"140","author":"NF Soliman","year":"2017","unstructured":"Soliman NF, Mohamed E, Magdi F, Abd El-Samie FE, AbdElnaby M (2017) Efficient iris localization and recognition. Optik - Int J Light Electron Optics 140:469\u2013475","journal-title":"Optik - Int J Light Electron Optics"},{"key":"8163_CR37","doi-asserted-by":"crossref","unstructured":"Syarif MA, Ong TS, Teoh ABJ, Tee C (2014) Improved biohashing method based on most intensive histogram block location. International Conference of Neural Information Processing: 644\u2013652","DOI":"10.1007\/978-3-319-12643-2_78"},{"issue":"3","key":"8163_CR38","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1049\/iet-bmt.2015.0045","volume":"5","author":"M Tarek","year":"2016","unstructured":"Tarek M, Ouda O, Hamza T (2016) Robust cancelable biometrics scheme based on neural networks. The Instit Eng Technol IET Biometr 5(3):220\u2013228","journal-title":"The Instit Eng Technol IET Biometr"},{"issue":"4","key":"8163_CR39","first-page":"498","volume":"19","author":"M Tarek","year":"2017","unstructured":"Tarek M, Ouda O, Hamza T (2017) Pre-image resistant cancelable biometrics scheme using bidirectional memory model. Int J Netw Sec 19(4):498\u2013506","journal-title":"Int J Netw Sec"},{"issue":"11","key":"8163_CR40","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ABJ Teoh","year":"2004","unstructured":"Teoh ABJ, Ngo DCL, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245\u20132255","journal-title":"Pattern Recogn"},{"issue":"6","key":"8163_CR41","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1016\/j.robot.2012.01.003","volume":"60","author":"E Vezzetti","year":"2012","unstructured":"Vezzetti E, Marcolin F (2012) Geometrical descriptors for human face morphological analysis and recognition. Robot Auton Syst 60(6):928\u2013939","journal-title":"Robot Auton Syst"},{"key":"8163_CR42","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.ins.2014.02.145","volume":"274","author":"M Wan","year":"2014","unstructured":"Wan M, Li M, Yang G, Gai S, Jin Z (2014) Feature extraction using two-dimensional maximum embedding difference. Inf Sci 274:55\u201369","journal-title":"Inf Sci"},{"issue":"1","key":"8163_CR43","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s11042-015-3057-8","volume":"76","author":"M Wan","year":"2017","unstructured":"Wan M, Yang G, Gai S, Yang Z (2017) Two-dimensional discriminant locality preserving projections (2DDLPP) and its application to feature extraction via fuzzy set. Multimed Tools Appl 76(1):355\u2013371","journal-title":"Multimed Tools Appl"},{"key":"8163_CR44","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.fss.2016.06.001","volume":"318","author":"M Wan","year":"2017","unstructured":"Wan M, Lai Z, Yang G, Yang Z, Zhang F, Zheng H (2017) Local graph embedding based on maximum margin criterion via fuzzy set. Fuzzy Sets Syst 318:120\u2013131","journal-title":"Fuzzy Sets Syst"},{"key":"8163_CR45","unstructured":"Zuo J, Ratha NK Connell JH (2008) Cancelable iris biometric. 19th international conference on pattern recognition ICPR2008: 1\u20134"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08163-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08163-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08163-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T00:46:35Z","timestamp":1606005995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08163-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,23]]},"references-count":45,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["8163"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08163-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,23]]},"assertion":[{"value":"5 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}