{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T14:45:53Z","timestamp":1776005153702,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10541-8","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T19:50:37Z","timestamp":1613764237000},"page":"18735-18752","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["RETRACTED ARTICLE: Securing recognized multimodal biometric images using cryptographic model"],"prefix":"10.1007","volume":"80","author":[{"given":"L. Nisha","family":"Evangelin","sequence":"first","affiliation":[]},{"given":"A. Lenin","family":"Fred","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,19]]},"reference":[{"key":"10541_CR1","doi-asserted-by":"crossref","unstructured":"Abdolrahimpour H, Shahab E (2017) A short survey of visual cryptography and secret image sharing techniques and applications. Int Adv Res J Sci Eng Technol 4(3):58\u201362","DOI":"10.17148\/IARJSET.2017.4313"},{"key":"10541_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10674-4","volume-title":"Feature selection and enhanced krill herd algorithm for text document clustering","author":"LMQ Abualigah","year":"2019","unstructured":"Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin"},{"issue":"16","key":"10541_CR3","doi-asserted-by":"publisher","first-page":"12381","DOI":"10.1007\/s00521-020-04839-1","volume":"32","author":"L Abualigah","year":"2020","unstructured":"Abualigah L (2020) Multi-verse optimizer algorithm: a comprehensive survey of its results, variants, and applications. Neural Comput & Applic 32(16):12381\u201312401","journal-title":"Neural Comput & Applic"},{"issue":"11","key":"10541_CR4","doi-asserted-by":"publisher","first-page":"4773","DOI":"10.1007\/s11227-017-2046-2","volume":"73","author":"L Abualigah","year":"2017","unstructured":"Abualigah L, Khader A (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773\u20134795","journal-title":"J Supercomput"},{"key":"10541_CR5","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.future.2018.02.040","volume":"85","author":"Z Ali","year":"2018","unstructured":"Ali Z, Hossain MS, Muhammad G, Ullah I, Abachi H, Alamri A (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Futur Gener Comput Syst 85:76\u201387","journal-title":"Futur Gener Comput Syst"},{"key":"10541_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.eswa.2018.02.018","volume":"102","author":"M Allaoui","year":"2018","unstructured":"Allaoui M, Ahiod B, El Yafrani M (2018) A hybrid crow search algorithm for solving the DNA fragment assembly problem. Expert Syst Appl 102:44\u201356","journal-title":"Expert Syst Appl"},{"key":"10541_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compstruc.2016.03.001","volume":"169","author":"A Askarzadeh","year":"2016","unstructured":"Askarzadeh A (2016) A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1\u201312","journal-title":"Comput Struct"},{"key":"10541_CR8","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1016\/j.protcy.2012.05.098","volume":"4","author":"P Bedi","year":"2012","unstructured":"Bedi P, Bansal R, Sehgal P (2012) Multimodal biometric authentication using PSO based watermarking. Procedia Technol 4:612\u2013618","journal-title":"Procedia Technol"},{"issue":"3","key":"10541_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3390\/cryptography2030024","volume":"2","author":"J Chang","year":"2018","unstructured":"Chang J, Huang BY, Juan J (2018) A new visual multi-secrets sharing scheme by random grids. Cryptography 2(3):24","journal-title":"Cryptography"},{"key":"10541_CR10","doi-asserted-by":"crossref","unstructured":"Dixit S, Jain DK, Saxena A (2014) An approach for secret sharing using randomised visual secret sharing. In: 2014 fourth international conference on communication systems and network technologies (pp. 847-850). IEEE","DOI":"10.1109\/CSNT.2014.176"},{"issue":"22","key":"10541_CR11","doi-asserted-by":"publisher","first-page":"31077","DOI":"10.1007\/s11042-019-07918-1","volume":"78","author":"L Evangelin","year":"2019","unstructured":"Evangelin L, Fred A (2019) Reduced optimal feature based biometric authentication using MALO-MKSVM techniques. Multimed Tools Appl 78(22):31077\u201331100","journal-title":"Multimed Tools Appl"},{"key":"10541_CR12","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.compeleceng.2018.04.014","volume":"68","author":"D Gupta","year":"2018","unstructured":"Gupta D, Sundaram S, Khanna A, Ella Hassanien A, de Albuquerque VHC (2018) Improved diagnosis of Parkinson\u2019s disease using optimized crow search algorithm. Comput Electr Eng 68:412\u2013424","journal-title":"Comput Electr Eng"},{"key":"10541_CR13","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2019.01.007","volume":"83","author":"S Gupta","year":"2019","unstructured":"Gupta S, Buriro A, Crispo B (2019) DriverAuth: a risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. Comput Secur 83:122\u2013139","journal-title":"Comput Secur"},{"key":"10541_CR14","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.future.2018.09.024","volume":"91","author":"H Hamidi","year":"2019","unstructured":"Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Futur Gener Comput Syst 91:434\u2013449","journal-title":"Futur Gener Comput Syst"},{"key":"10541_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.cose.2018.11.003","volume":"81","author":"M Hammad","year":"2019","unstructured":"Hammad M, Wang K (2019) Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network. Comput Secur 81:107\u2013122","journal-title":"Comput Secur"},{"key":"10541_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.procs.2016.05.187","volume":"85","author":"D Jagadiswary","year":"2016","unstructured":"Jagadiswary D, Saraswady D (2016) Biometric authentication using fused multimodal biometric. Procedia Comput Sci 85:109\u2013116","journal-title":"Procedia Comput Sci"},{"issue":"13\u201315","key":"10541_CR17","doi-asserted-by":"publisher","first-page":"3026","DOI":"10.1016\/j.neucom.2007.12.017","volume":"71","author":"MK Khan","year":"2008","unstructured":"Khan MK, Zhang J (2008) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13\u201315):3026\u20133031","journal-title":"Neurocomputing"},{"issue":"9","key":"10541_CR18","doi-asserted-by":"publisher","first-page":"11017","DOI":"10.1007\/s11042-017-4966-5","volume":"77","author":"S Kumar","year":"2018","unstructured":"Kumar S, Singh SK, Singh AK, Tiwari S, Singh RS (2018) Privacy preserving security using biometrics in cloud computing. Multimed Tools Appl 77(9):11017\u201311039","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10541_CR19","doi-asserted-by":"publisher","first-page":"2290","DOI":"10.1016\/j.patcog.2015.01.021","volume":"48","author":"L Leng","year":"2015","unstructured":"Leng L, Teoh ABJ (2015) Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn 48(7):2290\u20132303","journal-title":"Pattern Recogn"},{"issue":"6","key":"10541_CR20","doi-asserted-by":"publisher","first-page":"1979","DOI":"10.1016\/j.jnca.2011.07.003","volume":"34","author":"L Leng","year":"2011","unstructured":"Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979\u20131989","journal-title":"J Netw Comput Appl"},{"key":"10541_CR21","doi-asserted-by":"crossref","unstructured":"Leng L, Zhang J (2012) Palmhash code for palmprint verification and protection. In: 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1\u20134. IEEE","DOI":"10.1109\/CCECE.2012.6334853"},{"key":"10541_CR22","doi-asserted-by":"crossref","unstructured":"Leng L, Zhang J, Chen G, Khan MK, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition. In: International conference on computational science and its applications, pp. 458\u2013470. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-21934-4_37"},{"issue":"6","key":"10541_CR23","doi-asserted-by":"publisher","first-page":"8373","DOI":"10.1007\/s11042-016-3458-3","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Teoh ABJ, Li M (2017) Simplified 2DPalmHash code for secure palmprint verification. Multimed Tools Appl 76(6):8373\u20138398","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"10541_CR24","doi-asserted-by":"publisher","first-page":"4349","DOI":"10.1007\/s00500-016-2066-5","volume":"21","author":"P Li","year":"2017","unstructured":"Li P, Li T, Yao ZA, Tang CM, Li J (2017) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):4349\u20134359","journal-title":"Soft Comput"},{"issue":"1","key":"10541_CR25","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1007\/s11042-013-1372-5","volume":"72","author":"B Ma","year":"2014","unstructured":"Ma B, Wang Y, Li C, Zhang Z, Huang D (2014) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimed Tools Appl 72(1):637\u2013666","journal-title":"Multimed Tools Appl"},{"key":"10541_CR26","doi-asserted-by":"crossref","unstructured":"Malan DJ, Welsh M, Smith MD (2004) A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: 2004 first annual IEEE communications society conference on sensor and ad hoc communications and networks, 2004. IEEE SECON 2004. (pp. 71-80). IEEE","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"10541_CR27","doi-asserted-by":"crossref","unstructured":"Pave\u0161i\u0107 N, Savi\u010d T, Ribari\u0107 S, (2006) Multimodal biometric authentication system based on hand features. In: from data and information analysis to knowledge engineering (pp. 630-637). Springer, Berlin, Heidelberg","DOI":"10.1007\/3-540-31314-1_77"},{"key":"10541_CR28","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.image.2017.03.008","volume":"55","author":"L Rzouga Haddada","year":"2017","unstructured":"Rzouga Haddada L, Dorizzi B, Essoukri Ben Amara N (2017) A combined watermarking approach for securing biometric data. Signal Process Image Commun 55:23\u201331","journal-title":"Signal Process Image Commun"},{"key":"10541_CR29","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.cose.2015.06.001","volume":"53","author":"H Saevanee","year":"2015","unstructured":"Saevanee H, Clarke N, Furnell S, Biscione V (2015) Continuous user authentication using multi-modal biometrics. Comput Secur 53:234\u2013246","journal-title":"Comput Secur"},{"key":"10541_CR30","doi-asserted-by":"crossref","unstructured":"Sarier ND (2017) Privacy preserving multimodal biometric authentication in the cloud. In: International conference on green, pervasive, and cloud computing (pp. 90-104). Springer, Cham","DOI":"10.1007\/978-3-319-57186-7_8"},{"key":"10541_CR31","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.future.2017.09.078","volume":"80","author":"ND Sarier","year":"2018","unstructured":"Sarier ND (2018) Multimodal biometric identity based encryption. Futur Gener Comput Syst 80:112\u2013125","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"10541_CR32","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TIFS.2017.2750104","volume":"13","author":"M Sasaki","year":"2017","unstructured":"Sasaki M, Watanabe Y (2017) Visual secret sharing schemes encrypting multiple images. IEEE Trans Inf Forensics Secur 13(2):356\u2013365","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10541_CR33","doi-asserted-by":"crossref","unstructured":"Saudy NF, Ali IA, Al Barkouky R (2019) Error analysis and detection procedures for elliptic curve cryptography. Ain Shams Eng J 10(3):587\u2013597","DOI":"10.1016\/j.asej.2018.11.007"},{"issue":"11","key":"10541_CR34","doi-asserted-by":"publisher","first-page":"1650138","DOI":"10.1142\/S0218126616501383","volume":"25","author":"K Shankar","year":"2016","unstructured":"Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138","journal-title":"J Circ Syst Comput"},{"issue":"2","key":"10541_CR35","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/CC.2017.7868160","volume":"14","author":"K Shankar","year":"2017","unstructured":"Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118\u2013130","journal-title":"China Commun"},{"issue":"1","key":"10541_CR36","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s11277-017-5034-1","volume":"99","author":"E Sujatha","year":"2018","unstructured":"Sujatha E, Chilambuchelvan A (2018) Multimodal biometric authentication algorithm using iris, palm print, face and signature with encoded dwt. Wirel Pers Commun 99(1):23\u201334","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"10541_CR37","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.aej.2018.12.008","volume":"58","author":"BS Vidya","year":"2019","unstructured":"Vidya BS, Chandra E (2019) Entropy based local binary pattern (ELBP) feature extraction technique of multimodal biometrics as defence mechanism for cloud storage. Alex Eng J 58(1):103\u2013114","journal-title":"Alex Eng J"},{"key":"10541_CR38","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.eswa.2018.08.036","volume":"116","author":"GS Walia","year":"2019","unstructured":"Walia GS, Singh T, Singh K, Verma N (2019) Robust multimodal biometric system based on optimal score level fusion model. Expert Syst Appl 116:364\u2013376","journal-title":"Expert Syst Appl"},{"issue":"1","key":"10541_CR39","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2478\/s11772-008-0054-8","volume":"17","author":"F Wang","year":"2009","unstructured":"Wang F, Han J (2009) Multimodal biometric authentication based on score level fusion using support vector machine. Opto-Electron Rev 17(1):59\u201364","journal-title":"Opto-Electron Rev"},{"issue":"9","key":"10541_CR40","doi-asserted-by":"publisher","first-page":"3735","DOI":"10.1007\/s00500-015-1759-5","volume":"20","author":"C Xiang","year":"2016","unstructured":"Xiang C, Tang C, Cai Y, Xu Q (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735\u20133744","journal-title":"Soft Comput"},{"key":"10541_CR41","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.sigpro.2014.06.011","volume":"105","author":"X Yan","year":"2014","unstructured":"Yan X, Wang S, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process 105:389\u2013398","journal-title":"Signal Process"}],"updated-by":[{"DOI":"10.1007\/s11042-026-21568-0","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T00:00:00Z","timestamp":1775952000000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10541-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10541-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10541-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T14:11:52Z","timestamp":1776003112000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10541-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,19]]},"references-count":41,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10541"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10541-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,19]]},"assertion":[{"value":"26 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2026","order":6,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":7,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-026-21568-0","URL":"https:\/\/doi.org\/10.1007\/s11042-026-21568-0","order":9,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}