{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:24:12Z","timestamp":1776115452165,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:00:00Z","timestamp":1611964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:00:00Z","timestamp":1611964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-020-10246-4","type":"journal-article","created":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T20:02:41Z","timestamp":1612036961000},"page":"23625-23646","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Security of facial biometric authentication for attendance system"],"prefix":"10.1007","volume":"80","author":[{"given":"Vera","family":"Wati","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9573-3909","authenticated-orcid":false,"given":"Kusrini","family":"Kusrini","sequence":"additional","affiliation":[]},{"given":"Hanif","family":"Al Fatta","sequence":"additional","affiliation":[]},{"given":"Nitika","family":"Kapoor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,30]]},"reference":[{"issue":"16","key":"10246_CR1","doi-asserted-by":"publisher","first-page":"23369","DOI":"10.1007\/s11042-019-7646-9","volume":"78","author":"AS Alphonse","year":"2019","unstructured":"Alphonse AS, Starvin MS (2019) A novel maximum and minimum response-based Gabor (MMRG) feature extraction method for facial expression recognition. Multimed Tools Appl 78(16):23369\u201323397. https:\/\/doi.org\/10.1007\/s11042-019-7646-9","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10246_CR2","doi-asserted-by":"publisher","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee SP, Woodard D (2012) Biometric authentication and identification using keystroke dynamics: a survey. J Pattern Recognit Res 7(1):116\u2013139. https:\/\/doi.org\/10.13176\/11.427","journal-title":"J Pattern Recognit Res"},{"key":"10246_CR3","unstructured":"Barina D (2016) Gabor wavelets in image processing. CoRR abs\/1602.0(2):1\u20136. Available: http:\/\/arxiv.org\/abs\/1602.03308"},{"issue":"7","key":"10246_CR4","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"PN Belhumeur","year":"1997","unstructured":"Belhumeur PN, Hespanha JP, Kriegman DJ (1997) Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans Pattern Anal Mach Intell 19(7):711\u2013720. https:\/\/doi.org\/10.1109\/34.598228","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10246_CR5","unstructured":"Bhattacharyya D, Ranjan R, FAA, Choi M (2009) Biometric authentication: A review. 2(3):13\u201328"},{"key":"10246_CR6","doi-asserted-by":"publisher","unstructured":"Boka A, Morris B (2019) Person recognition for access logging. IEEE 9th Annu Comput Commun Work Conf CCWC. 2019, pp. 933\u2013936, https:\/\/doi.org\/10.1109\/CCWC.2019.8666483.","DOI":"10.1109\/CCWC.2019.8666483"},{"key":"10246_CR7","doi-asserted-by":"crossref","unstructured":"Brunelli R (2009) Template matching techniques in computer vision: theory and practice. WILEY","DOI":"10.1002\/9780470744055"},{"key":"10246_CR8","doi-asserted-by":"publisher","unstructured":"Chatterjee D, Chandran S (2016, 2017) Comparative study of camshift and KLT algorithms for real time face detection and tracking applications. Proc. - 2016 2nd IEEE Int. Conf. Res. Comput. Intell. Commun. Networks, ICRCICN:62\u201365. https:\/\/doi.org\/10.1109\/ICRCICN.2016.7813552","DOI":"10.1109\/ICRCICN.2016.7813552"},{"key":"10246_CR9","doi-asserted-by":"publisher","unstructured":"Christou N, Kanojiya N (2019) Human facial expression recognition with convolution neural networks. Third International Congress on Information and Communication Technology:539\u2013545. https:\/\/doi.org\/10.1007\/978-981-13-1165-9_49","DOI":"10.1007\/978-981-13-1165-9_49"},{"key":"10246_CR10","doi-asserted-by":"publisher","unstructured":"Crisan S (2017) A novel perspective on hand vein patterns for biometric recognition: problems, challenges, and implementations. In: Jiang R, Al-maadeed S, Bouridane A, Crookes PD, Beghdadi A (eds) Biometric security and privacy: Opportunities & challenges in the big data era. Springer International Publishing, Cham, pp 21\u201349. https:\/\/doi.org\/10.1007\/978-3-319-47301-7_2","DOI":"10.1007\/978-3-319-47301-7_2"},{"key":"10246_CR11","doi-asserted-by":"crossref","unstructured":"Dhall A, Goecke R, Lucey S, Gedeon T (2012) Collecting large, richly annotated facial-expression databases from movies. IEEE Multimed (3):34\u201341","DOI":"10.1109\/MMUL.2012.26"},{"key":"10246_CR12","doi-asserted-by":"publisher","unstructured":"Gao Q (2012) Biometric authentication in smart grid. Int Energy Sustain Conf IESC 2012. https:\/\/doi.org\/10.1109\/IESC.2012.6217197","DOI":"10.1109\/IESC.2012.6217197"},{"key":"10246_CR13","doi-asserted-by":"publisher","unstructured":"Jain A, Hong L, Sharath P (2000) Biometric identification. Commun ACM 43(2): 90\u201398. https:\/\/doi.org\/10.1145\/328236.328110","DOI":"10.1145\/328236.328110"},{"key":"10246_CR14","doi-asserted-by":"publisher","unstructured":"Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans CIRCUITS Syst VIDEO Technol 14(1):4\u201320. https:\/\/doi.org\/10.1109\/TCSVT.2003.818349","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"10246_CR15","doi-asserted-by":"publisher","unstructured":"Kim Y, Toh KA (2007) A method to enhance face biometric security. IEEE Conf Biometrics Theory, Appl Syst BTAS\u201907, no. i, https:\/\/doi.org\/10.1109\/BTAS.2007.4401913.","DOI":"10.1109\/BTAS.2007.4401913"},{"issue":"4","key":"10246_CR16","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3938\/jkps.71.231","volume":"71","author":"KH Kim","year":"2017","unstructured":"Kim KH, Lee S, Shim JB, Chang KH, Yang DS, Yoon WS, Park YJ, Kim CY, Cao YJ (2017) A text-based data mining and toxicity prediction modeling system for a clinical decision support in radiation oncology: a preliminary study. J Korean Phys Soc 71(4):231\u2013237. https:\/\/doi.org\/10.3938\/jkps.71.231","journal-title":"J Korean Phys Soc"},{"key":"10246_CR17","doi-asserted-by":"publisher","unstructured":"Kristian Y, Purnama KE, Sutanto EH, Zaman L, Setiawan EI, Purnomo MH (2018) Klasifikasi Nyeri pada Video Ekspresi Wajah Bayi Menggunakan DCNN Autoencoder dan LSTM. JNTETI 7(3):308\u2013316. https:\/\/doi.org\/10.22146\/jnteti.v7i3.440","DOI":"10.22146\/jnteti.v7i3.440"},{"key":"10246_CR18","doi-asserted-by":"publisher","first-page":"7733","DOI":"10.1007\/s10586-017-1323-4","volume":"22","author":"PM Kumar","year":"2019","unstructured":"Kumar PM, Gandhi U, Varatharajan R, Manogaran G Jr, Vadivel T (2019) Intelligent face recognition and navigation system using neural learning for smart security in internet of things. Cluster Comput 22:7733\u20137744. https:\/\/doi.org\/10.1007\/s10586-017-1323-4","journal-title":"Cluster Comput"},{"issue":"7553","key":"10246_CR19","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y Lecun","year":"2015","unstructured":"Lecun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444. https:\/\/doi.org\/10.1038\/nature14539","journal-title":"Nature"},{"key":"10246_CR20","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.future.2017.05.008","volume":"76","author":"N Nedjah","year":"2017","unstructured":"Nedjah N, Wyant RS, Mourelle LM, Gupta BB (2017) Efficient yet robust biometric Iris matching on smart cards for data high security and privacy. Futur Gener Comput Syst 76:18\u201332. https:\/\/doi.org\/10.1016\/j.future.2017.05.008","journal-title":"Futur Gener Comput Syst"},{"key":"10246_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/AITC.2019.8921316","volume":"2019","author":"T Nyein","year":"2019","unstructured":"Nyein T, Oo AN (2019) University classroom attendance system using facenet and support vector machine. Int Conf Adv Inf Technol ICAIT 2019:171\u2013176. https:\/\/doi.org\/10.1109\/AITC.2019.8921316","journal-title":"Int Conf Adv Inf Technol ICAIT"},{"key":"10246_CR22","doi-asserted-by":"publisher","unstructured":"Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971\u2013987. https:\/\/doi.org\/10.1109\/TPAMI.2002.1017623","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"10246_CR23","unstructured":"Pato JN, Millett LI (2010) Biometric recognition: Challenges and opportunities. Washington (DC): www.nap.edu"},{"issue":"2","key":"10246_CR24","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1007\/s11227-019-03022-1","volume":"76","author":"KK Patro","year":"2020","unstructured":"Patro KK, Reddi SPR, Khalelulla SKE, Kumar PR, Shankar K (2020) ECG data optimization for biometric human recognition using statistical distributed machine learning algorithm. J Supercomput 76(2):858\u2013875","journal-title":"J Supercomput"},{"key":"10246_CR25","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1109\/ICACCS48705.2020.9074246","volume":"2020","author":"D Praveenbalaji","year":"2020","unstructured":"Praveenbalaji D, Srinivas R, Roopa S, Suresh M, Gayathri A (2020) ID photo verification by face recognition. 6th Int Conf Adv Comput Commun Syst ICACCS 2020:1449\u20131453. https:\/\/doi.org\/10.1109\/ICACCS48705.2020.9074246","journal-title":"6th Int Conf Adv Comput Commun Syst ICACCS"},{"key":"10246_CR26","doi-asserted-by":"publisher","unstructured":"Sameem MSI, Qasim T, Bakhat K (2017) Real time recognition of human faces, ICOSST 2016\u20132016. Int Conf Open Source Syst Technol Proc:62\u201365. https:\/\/doi.org\/10.1109\/ICOSST.2016.7838578","DOI":"10.1109\/ICOSST.2016.7838578"},{"key":"10246_CR27","doi-asserted-by":"publisher","unstructured":"Shoba VBT, Sam IS (2020) A hybrid features extraction on face for efficient face recognition. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-08997-1","DOI":"10.1007\/s11042-020-08997-1"},{"key":"10246_CR28","doi-asserted-by":"publisher","unstructured":"Taloba AI, Sewisy AA, Dawood YA (2019) Accuracy enhancement scaling factor of viola-jones using genetic algorithms. ICENCO 2018 - 14th Int Comput Eng Conf Secur Smart Soc:209\u2013212. https:\/\/doi.org\/10.1109\/ICENCO.2018.8636121","DOI":"10.1109\/ICENCO.2018.8636121"},{"key":"10246_CR29","doi-asserted-by":"publisher","unstructured":"Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. Accepted Conference On Computer Vision And Pattern Recognition, pp 511\u2013518. https:\/\/doi.org\/10.1109\/CVPR.2001.990517","DOI":"10.1109\/CVPR.2001.990517"},{"key":"10246_CR30","doi-asserted-by":"publisher","unstructured":"Wati DAR, Abadianto D (2018) Design of face detection and recognition system for smart home security application. Proc. - 2017 2nd Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. ICITISEE 2017, vol. 2018-Janua, pp. 342\u2013347, https:\/\/doi.org\/10.1109\/ICITISEE.2017.8285524.","DOI":"10.1109\/ICITISEE.2017.8285524"},{"key":"10246_CR31","doi-asserted-by":"publisher","unstructured":"Wati V, Kusrini, Al Fatta H (2019) Real time face expression classification using convolutional neural network algorithm. Int Conf Inf Commun Technol ICOIACT 2019, no. Clm, pp. 497\u2013501, https:\/\/doi.org\/10.1109\/ICOIACT46704.2019.8938521.","DOI":"10.1109\/ICOIACT46704.2019.8938521"}],"updated-by":[{"DOI":"10.1007\/s11042-021-10746-x","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T00:00:00Z","timestamp":1614729600000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10246-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10246-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10246-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T09:28:57Z","timestamp":1625304537000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10246-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,30]]},"references-count":31,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10246"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10246-4","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11042-021-10746-x","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,30]]},"assertion":[{"value":"6 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2021","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-021-10746-x","URL":"https:\/\/doi.org\/10.1007\/s11042-021-10746-x","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}