{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T18:30:42Z","timestamp":1767897042698,"version":"3.49.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:00:00Z","timestamp":1556150400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:00:00Z","timestamp":1556150400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11042-019-7615-3","type":"journal-article","created":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T01:47:31Z","timestamp":1556329651000},"page":"17081-17099","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application"],"prefix":"10.1007","volume":"79","author":[{"given":"Priya","family":"Ramasamy","sequence":"first","affiliation":[]},{"given":"Vidhyapriya","family":"Ranganathan","sequence":"additional","affiliation":[]},{"given":"Venketesh","family":"Palanisamy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1939-4842","authenticated-orcid":false,"given":"Seifedine","family":"Kadry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,25]]},"reference":[{"key":"7615_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.9790\/2834-0621114","volume":"6","author":"AS Ajay","year":"2013","unstructured":"Ajay AS (2013) Low power FPGA based elliptical curve cryptography. IOSR J Electron Commun Eng 6:11\u201314","journal-title":"IOSR J Electron Commun Eng"},{"key":"7615_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijsc.2011.2401","volume":"2","author":"KMA Alheeti","year":"2011","unstructured":"Alheeti KMA (2011) Biometric iris recognition based on hybrid technique. Int J Soft Comput 2:1\u20139","journal-title":"Int J Soft Comput"},{"key":"7615_CR3","doi-asserted-by":"crossref","unstructured":"Barker EB, Barker WC, Burr WE, Polk WT, Smid ME (2014) NIST Special Publication 800-57: Recommendation for Key Management Part 1: General (Revision 3), 2012: 1\u2013147.","DOI":"10.6028\/NIST.SP.800-57p1r3"},{"key":"7615_CR4","unstructured":"Cha B, Kim K, Na H (2008) Random password generation of OTP system using changed location and angle of fingerprint features. IEEE 2008 computer and information technology; 8\u201311 July 2008; Sydney, New South Wales, Australia. IEEE: 420\u2013425"},{"key":"7615_CR5","unstructured":"Chen CH, Chu TC (2006) Fusion of face and iris features for multimodal biometrics. In: Springer 2006 international conference on biometrics; Berlin, Heidelberg. Springer. 571\u2013580"},{"key":"7615_CR6","first-page":"17","volume":"16","author":"S Daftry","year":"2012","unstructured":"Daftry S, Dawar S (2012) Performance evaluation of transform based feature extraction methods for identity authentication system using fingerprint matching. Image 16:17\u201322","journal-title":"Image"},{"key":"7615_CR7","doi-asserted-by":"publisher","first-page":"525","DOI":"10.15837\/ijccc.2010.4.2510","volume":"5","author":"I Iancu","year":"2010","unstructured":"Iancu I, Constantinescu N, Colhon M (2010) Fingerprint\u2019s identification using a fuzzy logic system. Int J Comput Commun Control 5:525\u2013531","journal-title":"Int J Comput Commun Control"},{"key":"7615_CR8","doi-asserted-by":"crossref","unstructured":"Johnson PA, Meyer PL, Sazonova N, Hua F, Schuckers S (2010) Quality in face and iris research ensemble (Q-FIRE). IEEE 2010 biometrics: theory applications and systems; 27\u201329 September 2010; Washington, DC, United States. IEEE: 1\u20136","DOI":"10.1109\/BTAS.2010.5634513"},{"key":"7615_CR9","unstructured":"Lee YS, Kim NH, Lim H, Jo H, Lee HJ (2010) Online banking authentication system using mobile-OTP with QR-code. In: IEEE 2010 Computer Sciences and Convergence Information Technology; Seoul, South Korea. IEEE: 644\u2013648"},{"key":"7615_CR10","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1007\/978-3-642-37949-9_73","volume":"115","author":"D Mahto","year":"2013","unstructured":"Mahto D, Yadav DK (2013) Network security using ECC with biometric. Int Conf Heterogen Netw Quality, Reliability, Sec Robust 115:842\u2013853","journal-title":"Int Conf Heterogen Netw Quality, Reliability, Sec Robust"},{"key":"7615_CR11","doi-asserted-by":"crossref","unstructured":"Nguyen K, Sridharan S, Denman S, Fookes C (2012) Feature-domain super-resolution framework for Gabor-based face and iris recognition. IEEE 2012 computer vision and pattern recognition; Providence, Rhode Island, United States. IEEE: 2642\u20132649","DOI":"10.1109\/CVPR.2012.6247984"},{"key":"7615_CR12","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1049\/iet-cvi.2011.0095","volume":"6","author":"MB Ramalho","year":"2012","unstructured":"Ramalho MB, Correia PL, Soares LD (2012) Hand-based multimodal identification system with secure biometric template storage. IET Comput Vis 6:165\u2013173","journal-title":"IET Comput Vis"},{"key":"7615_CR13","doi-asserted-by":"crossref","unstructured":"Richards G (2012) One-time password (OTP) pre-authentication. RFC 6560, April 2012","DOI":"10.17487\/rfc6560"},{"key":"7615_CR14","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1504\/IJESDF.2013.055049","volume":"5","author":"GMA Sagayee","year":"2013","unstructured":"Sagayee GMA, Arumugam S, Mala GA (2013) Biometric encryption using enhanced fingerprint image and elliptic curve. Int J Electron Sec Digit Forens 5:110\u2013123","journal-title":"Int J Electron Sec Digit Forens"},{"key":"7615_CR15","doi-asserted-by":"crossref","first-page":"55","DOI":"10.5120\/8042-1358","volume":"51","author":"T Sheeba","year":"2012","unstructured":"Sheeba T, Justin Bernard M (2012) Survey on multimodal biometric authentication combining fingerprint and finger vein. Int J Comput Applic 51:55\u201360","journal-title":"Int J Comput Applic"},{"key":"7615_CR16","first-page":"20","volume":"6","author":"D Shreyal","year":"2017","unstructured":"Shreyal D, More P (2017) Implementation of VSK and arithmetic OTP verification for resisting shoulder surfing attack. Int J Sci Res 6:20\u201324","journal-title":"Int J Sci Res"},{"key":"7615_CR17","doi-asserted-by":"crossref","unstructured":"Tsai CL, Chen CJ, Zhuang DJ (2012) Secure OTP and biometric verification scheme for mobile banking. IEEE 2012 Mobile, Ubiquitous, and Intelligent Computing; Center for Secure information system, george mason university, Fairfax, VA, USA. IEEE: 138\u2013141","DOI":"10.1109\/MUSIC.2012.31"},{"key":"7615_CR18","doi-asserted-by":"crossref","unstructured":"Wang Y, Tieniu T, Jain AK (2003) Combining face and iris biometrics for identity verification. Springer 2003 Audio and Video-Based Biometric Person Authentication; Guildford, UK. Springer: 805\u2013813","DOI":"10.1007\/3-540-44887-X_93"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7615-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7615-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7615-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T17:11:21Z","timestamp":1593623481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7615-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,25]]},"references-count":18,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7615"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7615-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,25]]},"assertion":[{"value":"17 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}