{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:39:54Z","timestamp":1772026794560,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T00:00:00Z","timestamp":1610841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T00:00:00Z","timestamp":1610841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10291-z","type":"journal-article","created":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T01:02:31Z","timestamp":1610845351000},"page":"13677-13705","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["RETRACTED ARTICLE: Proposed framework for cancelable face\n            recognition system"],"prefix":"10.1007","volume":"80","author":[{"given":"H. I.","family":"Ashiba","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,17]]},"reference":[{"key":"10291_CR1","doi-asserted-by":"publisher","unstructured":"Akdogan D, Altop DK, Eskandarian L, Levi A (2018) Secure key\n                    agreement protocols: pure biometrics and cancelable biometrics. Comput Netw\n                    142:33\u201348. https:\/\/doi.org\/10.1016\/j.comnet.2018.06.001","DOI":"10.1016\/j.comnet.2018.06.001"},{"key":"10291_CR2","doi-asserted-by":"publisher","unstructured":"Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019)\n                    Impact of digital fingerprint image quality on the fingerprint recognition\n                    accuracy. Multimed Tools Appl 78:3649\u20133688. https:\/\/doi.org\/10.1007\/s11042-017-5537-5","DOI":"10.1007\/s11042-017-5537-5"},{"key":"10291_CR3","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.1007\/s11042-019-08154-3","volume":"79","author":"HI Ashiba","year":"2020","unstructured":"Ashiba HI (2020) Cepstrum adaptive plateau histogram for dark IR\n                    night vision images enhancement. Multimed Tools Appl\n                    79:2543\u20132554","journal-title":"Multimed Tools Appl"},{"key":"10291_CR4","doi-asserted-by":"publisher","first-page":"123","DOI":"10.2528\/PIERC08012301","volume":"1","author":"HI Ashiba","year":"2008","unstructured":"Ashiba HI, Awadallah KH, El-Halfawy SM, El-Samie FEA (2008)\n                    Homomorphic enhancement of infrared images using the additive wavelet transform.\n                    Prog Electromagn Res C 1:123\u2013130","journal-title":"Prog Electromagn Res C"},{"issue":"9","key":"10291_CR5","doi-asserted-by":"publisher","first-page":"11277","DOI":"10.1007\/s11042-018-6545-9","volume":"78","author":"HI Ashiba","year":"2019","unstructured":"Ashiba HI, Mansour HM, Ahmed HM, El-Kordy MF, Dessouky MI, Zahran\n                    O, El-Samie FEA (2019) Enhancement of IR images using histogram processing and\n                    the Undecimated additive wavelet transform. Multimed Tools Appl\n                    78(9):11277\u201311290","journal-title":"Multimed Tools Appl"},{"key":"10291_CR6","doi-asserted-by":"publisher","first-page":"3288","DOI":"10.1016\/j.patcog.2012.02.027","volume":"45","author":"O Beom-Seok","year":"2012","unstructured":"Beom-Seok O, Toh KA, Choi K, Teoh ABJ, Kim J (2012) Extraction and\n                    fusion of partial face features for cancelable identity verification. Pattern\n                    Recogn 45:3288\u20133303","journal-title":"Pattern Recogn"},{"issue":"6","key":"10291_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4172\/2155-6180.1000150","volume":"3","author":"VE Brindha","year":"2012","unstructured":"Brindha VE, Natarajan AM (2012) Multi-modal biometric template\n                    security:fingerprint and Palmprint based fuzzy vault. J Biom Biostat\n                    3(6):1\u20136","journal-title":"J Biom Biostat"},{"key":"10291_CR8","doi-asserted-by":"publisher","unstructured":"Mohammad SM (2020) Facial recognition technology. SSRN Electron J.\u00a0https:\/\/doi.org\/10.2139\/ssrn.3622882","DOI":"10.2139\/ssrn.3622882"},{"key":"10291_CR9","doi-asserted-by":"publisher","unstructured":"Das S, Muhammad K, Bakshi S, Mukherjee I, Sa PK, Sangaiah AK, Bruno\n                    A (2018) Lip biometric template security framework using spatial steganography.\n                    Pattern Recogn Lett. https:\/\/doi.org\/10.1016\/j.patrec.2018.06.026","DOI":"10.1016\/j.patrec.2018.06.026"},{"issue":"3","key":"10291_CR10","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/0146-664X(75)90012-X","volume":"4","author":"LS Davis","year":"1975","unstructured":"Davis LS (1975) A survey of edge detection techniques [J]. Comput\n                    Graph Image Process 4(3):248\u2013270","journal-title":"Comput Graph Image Process"},{"key":"10291_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.patrec.2018.04.022","volume":"126","author":"R Dwivedi","year":"2018","unstructured":"Dwivedi R, Dey S (2018) Score-level fusion for cancelable multi-\n                    biometric veri\u00decation. Pattern Recogn Lett 126:58\u201367. https:\/\/doi.org\/10.1016\/j.patrec.2018.04.022","journal-title":"Pattern Recogn Lett"},{"key":"10291_CR12","doi-asserted-by":"crossref","unstructured":"Feng YC, Yuen PC, Member, IEEE, and Anil K. Jain, Fellow, IEEE\n                    (2010) A hybrid approach for generating secure and discriminating face template.\n                    IEEE Trans Inf Forensic Secur 5(1)","DOI":"10.1109\/TIFS.2009.2038760"},{"issue":"1","key":"10291_CR13","first-page":"2","volume":"12","author":"AS Hassanein","year":"2015","unstructured":"Hassanein AS, Mohammad S, Sameer M, Ragab ME (2015) Survey on hough\n                    transform, theory, techniques and applications. IJCSI Int J Comput Sci Issues\n                    12(1):2","journal-title":"IJCSI Int J Comput Sci Issues"},{"key":"10291_CR14","doi-asserted-by":"publisher","unstructured":"Zhang X, Zhu L, Jing W, Jiang T (2019) The optimisation of speech\n                    recognition based on convolutional neural network. Int J High Perform Comput\n                    Netw (IJHPCN) 13(2):222.\u00a0https:\/\/doi.org\/10.1504\/IJHPCN.2019.10018669","DOI":"10.1504\/IJHPCN.2019.10018669"},{"key":"10291_CR15","doi-asserted-by":"crossref","unstructured":"Kaur H, Khanna P (2020) Privacy preserving remote multi-server\n                    biometric authentication using cancelable biometrics and secret sharing. Futur\n                    Gener Comput Syst 102:30\u201341","DOI":"10.1016\/j.future.2019.07.023"},{"key":"10291_CR16","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1016\/j.procs.2015.06.077","volume":"54","author":"H Kaur","year":"2015","unstructured":"Kaur H, Khanna P (2015) Gaussian random projection based\n                    non-invertible cancelable biometric templates. Procedia Comput Sci\n                    54:661\u2013670","journal-title":"Procedia Comput Sci"},{"key":"10291_CR17","doi-asserted-by":"crossref","unstructured":"Kaur H, Khanna P (2018) Random slope method for generation of\n                    cancelable biometric features. Pattern Recognit Lett\n                    126:31\u201340","DOI":"10.1016\/j.patrec.2018.02.016"},{"key":"10291_CR18","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.patcog.2019.01.039","volume":"91","author":"JB Kho","year":"2019","unstructured":"Kho JB, Kim J, Kim I, Teoh ABJ (2019) Cancelable fingerprint\n                    template design with randomized non-negative least squares. Pattern Recogn\n                    91:245\u2013260","journal-title":"Pattern Recogn"},{"key":"10291_CR19","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1016\/j.proeng.2012.01.120","volume":"29","author":"H Li","year":"2012","unstructured":"Li H, Wang L (2012) Chaos-based cancelable Palmprint authentication\n                    system, international workshop on information and electronics engineering\n                    (IWIEE). Procedia Eng 29:1239\u20131245","journal-title":"Procedia Eng"},{"key":"10291_CR20","doi-asserted-by":"publisher","unstructured":"Li H, Wang L, Zhang R, Wu L (2012) A high performance and secure\n                    palmprint template protection scheme. J Softw 7(8)1827\u20131834.\u00a0https:\/\/doi.org\/10.4304\/jsw.7.8.1827-1834","DOI":"10.4304\/jsw.7.8.1827-1834"},{"issue":"4","key":"10291_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.2019100101","volume":"11","author":"Y Li","year":"2019","unstructured":"Li Y, Shi H, Chen L, Jiang F (2019) Convolutional approach also\n                    benefits traditional face pattern recognition algorithm [208!]. Int J Softw Sci\n                    Comput Intell (IJSSCI) 11(4):1\u201316. https:\/\/doi.org\/10.4018\/IJSSCI.2019100101","journal-title":"Int J Softw Sci Comput Intell (IJSSCI)"},{"key":"10291_CR22","doi-asserted-by":"publisher","first-page":"11947","DOI":"10.1007\/s11042-019-08446-8","volume":"79","author":"H Li","year":"2020","unstructured":"Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme\n                    basedon randomized cuckoo hashing and MinHash. Multimed Tools Appl\n                    79:11947\u201311971. https:\/\/doi.org\/10.1007\/s11042-019-08446-8","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10291_CR23","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1016\/j.eswa.2009.10.043","volume":"37","author":"E Maiorana","year":"2010","unstructured":"Maiorana E (2010) Biometric cryptosystem using function based\n                    on-line signature recognition. Expert Syst Appl\n                    37(4):3454\u20133461","journal-title":"Expert Syst Appl"},{"key":"10291_CR24","doi-asserted-by":"publisher","unstructured":"Narducci F et al (2019) Biometric data on the edge for secure,\n                    smart and user tailored access to cloud services. Futur Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2019.06.019","DOI":"10.1016\/j.future.2019.06.019"},{"key":"10291_CR25","volume-title":"The fast Fourier transform","author":"BE Oran","year":"2002","unstructured":"Oran BE (2002) The fast Fourier transform. Prentice-Hall, New\n                    York"},{"key":"10291_CR26","unstructured":"Pang Y-H, Teoh ABJ, Ling DNC (2007) Palmprint based cancelable\n                    biometric authentication system. Int J Comput Electr Autom Control Inf Eng\n                    1(9)"},{"key":"10291_CR27","doi-asserted-by":"publisher","unstructured":"Qu Z, He H, Liu W, Ma S (2019) A self-adaptive quantum\n                    steganography algorithm based on QLSb modification in watermarked quantum image.\n                    Int J High Perform Comput Netw (IJHPCN) 14(2).\u00a0https:\/\/doi.org\/10.1504\/IJHPCN.2019.101249","DOI":"10.1504\/IJHPCN.2019.101249"},{"issue":"1","key":"10291_CR28","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/TPAMI.2017.2781233","volume":"41","author":"R Rajeev","year":"2019","unstructured":"Rajeev R, Vishal M, Rama C (2019) HyperFace: a deep multi-task\n                    learning framework for face detection, landmark localization, pose estimation,\n                    and gender recognition. IEEE Trans Pattern Anal Mach Intell\n                    41(1):121\u2013135l","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10291_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2013.12.005","volume":"42","author":"C Rathgeb","year":"2014","unstructured":"Rathgeb C, Busch C (2014) Cancelable multi-biometrics: mixing\n                    Iris-codes based on adaptive bloom filters. Comput Secur 42:1\u201312. https:\/\/doi.org\/10.1016\/j.cose.2013.12.005","journal-title":"Comput Secur"},{"key":"10291_CR30","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1016\/j.optcom.2009.11.003","volume":"283","author":"N Saini","year":"2010","unstructured":"Saini N, Sinha A (2010) Optics based biohashing using joint\n                    transform correlator. Opt Commun 283:894\u2013902","journal-title":"Opt Commun"},{"key":"10291_CR31","first-page":"922","volume":"3","author":"M Savvides","year":"2004","unstructured":"Savvides M, Vijaya Kumar BVK, Khosla PK (2004) Cancellable\n                    biometrics filters for face recognition. Int Conf Pattern Recognit\n                    3:922\u2013925","journal-title":"Int Conf Pattern Recognit"},{"issue":"2","key":"10291_CR32","first-page":"250","volume":"1","author":"N Senthilkumaran","year":"2009","unstructured":"Senthilkumaran N, Rajesh R (2009) Edge detection techniques for\n                    image segmentation\u2013a survey of soft computing approaches [J]. Int J\n                    Recent Trends Eng 1(2):250\u2013254","journal-title":"Int J Recent Trends Eng"},{"key":"10291_CR33","doi-asserted-by":"publisher","unstructured":"Sunaryono D, Siswantoro J, Anggoro R (2019) An android based course\n                    attendance system using face recognition. J King Saud Univ\u2013 Comput Inf\n                    Sci 18.\u00a0https:\/\/doi.org\/10.1016\/j.jksuci.2019.01.006","DOI":"10.1016\/j.jksuci.2019.01.006"},{"key":"10291_CR34","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1364\/JOSAA.32.001772","volume":"32","author":"M Taheri","year":"2015","unstructured":"Taheri M, Mozaffari S, Keshavarzi P (2015) Cancelable face\n                    verification using optical en- cryption and authentication. J Opt Soc Am A\n                    32:1772\u20131779","journal-title":"J Opt Soc Am A"},{"key":"10291_CR35","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1016\/j.patrec.2004.11.021","volume":"26","author":"ABJ Teoh","year":"2005","unstructured":"Teoh ABJ, Ngo DCL (2005) Cancellable biometerics featuring with\n                    tokenized random number. Pattern Recogn Lett\n                    26:1454\u20131460","journal-title":"Pattern Recogn Lett"},{"key":"10291_CR36","doi-asserted-by":"publisher","unstructured":"Trivedi AK, Thounaojam DM, Pal S (2019) Non-Invertible Cancellable\n                    Fingerprint Template for Fingerprint Biometric. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2019.101690","DOI":"10.1016\/j.cose.2019.101690"},{"key":"10291_CR37","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ins.2017.04.026","volume":"406-407","author":"S Umer","year":"2017","unstructured":"Umer S, Dhara BC, Chanda B (2017) A novel cancelable iris\n                    recognition system based on feature learning techniques. Inf Sci\n                    406-407:102\u2013118","journal-title":"Inf Sci"},{"key":"10291_CR38","doi-asserted-by":"publisher","first-page":"055705","DOI":"10.1088\/2040-8978\/18\/5\/055705","volume":"18","author":"G Verma","year":"2016","unstructured":"Verma G, Sinha A (2016) Digital holographic based cancellable\n                    biometric for personal authentication. J Opt 18:055705","journal-title":"J Opt"},{"key":"10291_CR39","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.optlaseng.2019.06.028","volume":"123","author":"G Verma","year":"2019","unstructured":"Verma G, Liao M, Lu D, He W, Peng X (2019) A novel optical\n                    two-factor face authentication scheme. Opt Lasers Eng\n                    123:28\u201336","journal-title":"Opt Lasers Eng"},{"key":"10291_CR40","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.patcog.2016.01.001","volume":"54","author":"S Wang","year":"2016","unstructured":"Wang S, Hu J (2016) A blind system identification approach to\n                    cancelable fingerprint templates. Pattern Recogn\n                    54:14\u201322","journal-title":"Pattern Recogn"},{"key":"10291_CR41","doi-asserted-by":"publisher","first-page":"5971","DOI":"10.1007\/s00500-019-04530-1","volume":"24","author":"Y Xu","year":"2020","unstructured":"Xu Y, Liu J, Zhai Y, Gan J, Zeng J, Cao H, Scotti F, Piuri V,\n                    Labati RD (2020) Weakly supervised facial expression recognition via transferred\n                    DALCNN and active incremental learning. Soft Comput 24:5971\u20135985. https:\/\/doi.org\/10.1007\/s00500-019-04530-1","journal-title":"Soft Comput"},{"key":"10291_CR42","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.patcog.2018.01.026","volume":"78","author":"W Yang","year":"2018","unstructured":"Yang W, Wang S, Hu J, Zheng G, Valli C (2018) A fingerprint and\n                    finger-vein based cancelable multi-biometric system. Pattern Recogn\n                    78:242\u2013251","journal-title":"Pattern Recogn"},{"key":"10291_CR43","doi-asserted-by":"publisher","unstructured":"Yang W, Wang S, Hu J, Zheng G, Valli C (2019) Security and accuracy\n                    of fingerprint-based biometrics: a review. symmetry 11:141. https:\/\/doi.org\/10.3390\/sym11020141","DOI":"10.3390\/sym11020141"},{"key":"10291_CR44","doi-asserted-by":"publisher","first-page":"3050","DOI":"10.1109\/TIFS.2018.2838540","volume":"13","author":"K Zhou","year":"2018","unstructured":"Zhou K, Ren J (2018) Passbio.\"privacy-preserving user-centric\n                    biometric authentication\". IEEE Trans Inf Forensic Secur\n                    13:3050\u20133063","journal-title":"IEEE Trans Inf Forensic Secur"}],"updated-by":[{"DOI":"10.1007\/s11042-024-19932-z","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T00:00:00Z","timestamp":1722038400000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10291-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10291-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10291-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T04:18:13Z","timestamp":1722053893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10291-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,17]]},"references-count":44,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10291"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10291-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,17]]},"assertion":[{"value":"17 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2024","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-024-19932-z","URL":"https:\/\/doi.org\/10.1007\/s11042-024-19932-z","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}