{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:42:15Z","timestamp":1753922535882},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-021-10648-y","type":"journal-article","created":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T09:08:53Z","timestamp":1615885733000},"page":"21425-21448","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-preserving biometric verification with outsourced correlation filter computation"],"prefix":"10.1007","volume":"80","author":[{"given":"Motahareh","family":"Taheri","sequence":"first","affiliation":[]},{"given":"Saeed","family":"Mozaffari","sequence":"additional","affiliation":[]},{"given":"Parviz","family":"Keshavarzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,16]]},"reference":[{"key":"10648_CR1","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, Mcmahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security 25, 308\u2013318","DOI":"10.1145\/2976749.2978318"},{"issue":"4","key":"10648_CR2","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput Surv 51 (4):308\u2013318. https:\/\/doi.org\/10.1145\/3214303","journal-title":"ACM Comput Surv"},{"issue":"6","key":"10648_CR3","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s10207-016-0350-0","volume":"16","author":"M Aliasgari","year":"2017","unstructured":"Aliasgari M, Blanton M, Bayatbabolghani F (2017) Secure computation of hidden markov models and secure floating-point arithmetic in the malicious model. Int J Inf Secur 16(6):577\u2013601. https:\/\/doi.org\/10.1007\/s10207-016-0350-0","journal-title":"Int J Inf Secur"},{"key":"10648_CR4","doi-asserted-by":"publisher","unstructured":"Bai Y, Zhuo L, Cheng B, Peng Y (2014) Surf feature extraction in encrypted domain. In: IEEE International conference on multimedia and expo (ICME). https:\/\/doi.org\/10.1109\/ICME.2014.6890170","DOI":"10.1109\/ICME.2014.6890170"},{"key":"10648_CR5","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.optlastec.2012.07.001","volume":"45","author":"P Banerjee","year":"2013","unstructured":"Banerjee P, Datta A (2013) Generalized regression neural network trained pre processing of frequency domain correlation filter for improved face recognition and its optical implementation. Opt Laser Technol 45:217\u2013227. https:\/\/doi.org\/10.1016\/j.optlastec.2012.07.001","journal-title":"Opt Laser Technol"},{"key":"10648_CR6","unstructured":"Benaloh J (1994) Dense probabilistic encryption. In: Proceedings of the workshop on selected areas of cryptography, 120\u2013128"},{"issue":"1","key":"10648_CR7","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TIFS.2008.2011087","volume":"4","author":"T Bianchi","year":"2009","unstructured":"Bianchi T, Piva A, Barni M (2009) On the implementation of the discrete fourier transform in the encrypted domain. IEEE Trans. Inf. Forensics Secur. 4 (1):86\u201397. https:\/\/doi.org\/10.1109\/TIFS.2008.2011087","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"10648_CR8","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","volume":"21","author":"YH Chao","year":"2012","unstructured":"Chao YH, Chun SL, Soo CP (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593\u20134607. https:\/\/doi.org\/10.1109\/TIP.2012.2204272","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"10648_CR9","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1109\/TPAMI.2010.28","volume":"32","author":"L Ding","year":"2010","unstructured":"Ding L, Martinez A (2010) Features versus context: an approach for precise and detailed detection and delineation of faces and facial features. IEEE Trans Patt Analy Mach Intell 32(11):2022\u20132038","journal-title":"IEEE Trans Patt Analy Mach Intell"},{"key":"10648_CR10","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.jvcir.2019.01.027","volume":"59","author":"L Du","year":"2019","unstructured":"Du L, Zhang W, Fu H, Ren W, Zhang X (2019) An efficient privacy protection scheme for data security in video surveillance. J Vis Commun Image Representation 59:347\u2013362. https:\/\/doi.org\/10.1016\/j.jvcir.2019.01.027","journal-title":"J Vis Commun Image Representation"},{"key":"10648_CR11","doi-asserted-by":"publisher","unstructured":"ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology p 10\u20139618. https:\/\/doi.org\/10.1109\/TIT.1985.1057074","DOI":"10.1109\/TIT.1985.1057074"},{"key":"10648_CR12","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-714","volume":"5672","author":"Z Erkin","year":"2009","unstructured":"Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy preserving face recognition. Privacy Preserving Technol 5672:235\u2013253. https:\/\/doi.org\/10.1007\/978-3-642-03168-714","journal-title":"Privacy Preserving Technol"},{"key":"10648_CR13","doi-asserted-by":"crossref","unstructured":"Goldwasser S, Micali A (1982) Probabilistic encryption and how to play mental poker keeping secret all partial information. In: Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC New York, USA 82 365\u201396377","DOI":"10.1145\/800070.802212"},{"key":"10648_CR14","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.patcog.2017.01.024","volume":"67","author":"M Gomez-Barrero","year":"2017","unstructured":"Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149\u2013163. https:\/\/doi.org\/10.1016\/j.patcog.2017.01.024","journal-title":"Pattern Recogn"},{"key":"10648_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.inffus.2017.10.003","volume":"42","author":"M Gomez-Barrero","year":"2018","unstructured":"Gomez-Barrero M, Rathgeb C, Li G, Ramachandrai R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inf Fusion 42:37\u2013503. https:\/\/doi.org\/10.1016\/j.inffus.2017.10.003","journal-title":"Inf Fusion"},{"key":"10648_CR16","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jpdc.2018.10.005","volume":"124","author":"A Gumaei","year":"2019","unstructured":"Gumaei A, Sammouda R, Al-Salman AMS (2019) Alsanad: Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation. J Parall Distrib Comput 124:27\u201340. https:\/\/doi.org\/10.1016\/j.jpdc.2018.10.005","journal-title":"J Parall Distrib Comput"},{"key":"10648_CR17","doi-asserted-by":"publisher","unstructured":"Hariss K, Noura H, Samhat A. (2020) An efficient fully homomorphic symmetric encryption algorithm. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-019-08511-2","DOI":"10.1007\/s11042-019-08511-2"},{"issue":"5","key":"10648_CR18","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s10207-015-0308-7","volume":"15","author":"MS Kiraz","year":"2016","unstructured":"Kiraz MS, Uzunkol O (2016) Efficient and verifiable algorithms for secure outsourcing of cryptographic computations. Int J Inf Secur 15(5):519\u2013537. https:\/\/doi.org\/10.1007\/s10207-015-0308-7","journal-title":"Int J Inf Secur"},{"issue":"1","key":"10648_CR19","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2219653","volume":"30","author":"R Lagendijk","year":"2013","unstructured":"Lagendijk R, Erkin Z, Barni M (2013) Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Processing Magazine 30(1):82\u2013105. https:\/\/doi.org\/10.1109\/MSP.2012.2219653","journal-title":"IEEE Signal Processing Magazine"},{"issue":"5","key":"10648_CR20","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TPAMI.2005.92","volume":"27","author":"KC Lee","year":"2005","unstructured":"Lee KC, Ho J, Kriegman D (2005) Acquiring linear subspaces for face recognition under variable lighting. IEEE Trans Pattern Anal Mach Intell 27(5):684\u2013698. https:\/\/doi.org\/10.1109\/TPAMI.2005.92","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10648_CR21","doi-asserted-by":"publisher","unstructured":"Leng L, Jin Teoh AB, Li M, Khan K (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Security Comm Networks 7. https:\/\/doi.org\/10.1002\/sec.900","DOI":"10.1002\/sec.900"},{"key":"10648_CR22","doi-asserted-by":"publisher","first-page":"2290","DOI":"10.1016\/j.patcog.2015.01.021","volume":"48","author":"L Leng","year":"2015","unstructured":"Leng L, Li M, Kim C, Bi X (2015) Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn 48:2290\u20132303. https:\/\/doi.org\/10.1016\/j.patcog.2015.01.021","journal-title":"Pattern Recogn"},{"key":"10648_CR23","doi-asserted-by":"publisher","unstructured":"Leng L, Li M, Teoh ABJ (2013) Conjugate 2dpalmhash code for secure palm-print-vein verification. In: 2013 6th International congress on image and signal processing (CISP). https:\/\/doi.org\/10.1109\/CISP.2013.6743951","DOI":"10.1109\/CISP.2013.6743951"},{"key":"10648_CR24","doi-asserted-by":"publisher","unstructured":"Leng L, Teoh ABJ (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimedia Tools and Applications, 76. https:\/\/doi.org\/10.1007\/s11042-015-3058-7","DOI":"10.1007\/s11042-015-3058-7"},{"key":"10648_CR25","doi-asserted-by":"publisher","unstructured":"Leng L, Zhang J (2012) Palmhash code for palmprint verification and protection. In: 25th IEEE Canadian conference on electrical and computer engineering. https:\/\/doi.org\/10.1109\/CCECE.2012.6334853","DOI":"10.1109\/CCECE.2012.6334853"},{"key":"10648_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2012.08.028","volume":"108","author":"L Leng","year":"2013","unstructured":"Leng L, Zhang J (2013) Palmhash codevs.palmphasorcode. Neurocomputing 108:1\u201312. https:\/\/doi.org\/10.1016\/j.neucom.2012.08.028","journal-title":"Neurocomputing"},{"key":"10648_CR27","doi-asserted-by":"publisher","unstructured":"Leng L, Zhang J, Chen G, Khan K, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition palmphasor-fusion. In: Computational science and its applications - ICCSA 2011 pp 458\u2013470. https:\/\/doi.org\/10.1007\/978-3-642-21934-4_37","DOI":"10.1007\/978-3-642-21934-4_37"},{"key":"10648_CR28","doi-asserted-by":"publisher","unstructured":"Leng L, Zhang J, Chen G, Khan K, Bai1 P (2011) Two dimensional palmphasor enhanced by multiorientation score level fusion. Commun Comput Inf Sci 186:122\u2013129. https:\/\/doi.org\/10.1007\/978-3-642-22339-6_15","DOI":"10.1007\/978-3-642-22339-6_15"},{"key":"10648_CR29","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/ICTC.2010.5674791","volume":"15","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Xu J, Khan K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in dct domain. Int J Phys Sci 15:467\u2013471. https:\/\/doi.org\/10.1109\/ICTC.2010.5674791","journal-title":"Int J Phys Sci"},{"issue":"3","key":"10648_CR30","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TIFS.2015.2505630","volume":"11","author":"C Li","year":"2017","unstructured":"Li C, Hu J (2017) A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans Inf Forensics Secur 11(3):543\u2013555. https:\/\/doi.org\/10.1109\/TIFS.2015.2505630","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10648_CR31","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s10115-016-0923-2","volume":"49","author":"K Lin","year":"2016","unstructured":"Lin K (2016) Privacy-preserving kernel k-means clustering outsourcing with random transformation. Knowl Inf Syst 49(3):885\u2013908","journal-title":"Knowl Inf Syst"},{"issue":"2","key":"10648_CR32","first-page":"260","volume":"26","author":"Y Lin","year":"2017","unstructured":"Lin Y, Ling Y, Wangke Y, Zhendong W (2017) A cancelable fuzzy vault algorithm based on transformed fingerprint features. Chin J Electron 26 (2):260\u2013267","journal-title":"Chin J Electron"},{"key":"10648_CR33","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.jvcir.2016.12.012","volume":"43","author":"L Luo","year":"2017","unstructured":"Luo L, Wang X, Hu S, Hu X, Chen L (2017) Interactive image segmentation based on samples reconstruction and flda. J Vis Commun Image Represent 43:138\u2013151. https:\/\/doi.org\/10.1016\/j.jvcir.2016.12.012","journal-title":"J Vis Commun Image Represent"},{"key":"10648_CR34","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jvcir.2019.102578","volume":"102578","author":"J Ma","year":"2019","unstructured":"Ma J, Yuan Y (2019) Dimension reduction of image deep feature using pca. J Vis Commun Image Represent 102578:63. https:\/\/doi.org\/10.1016\/j.jvcir.2019.102578","journal-title":"J Vis Commun Image Represent"},{"issue":"17","key":"10648_CR35","doi-asserted-by":"publisher","first-page":"3751","DOI":"10.1364\/AO.33.003751","volume":"33","author":"A Mahalanobis","year":"1994","unstructured":"Mahalanobis A, Kumar B, Song S, Sims SRF, Epperson J (1994) Unconstrained correlation filters. Appl Opt 33(17):3751\u20133759. https:\/\/doi.org\/10.1364\/AO.33.003751","journal-title":"Appl Opt"},{"key":"10648_CR36","doi-asserted-by":"crossref","unstructured":"Maltoni D, Maio D, Jain A, Prabhakar S (2009) The full FVC2000 and FVC2002 databases are available in the DVD included. In: Handbook of fingerprint recognition. 2nd edn.","DOI":"10.1007\/978-1-84882-254-2"},{"key":"10648_CR37","doi-asserted-by":"publisher","unstructured":"Osadchy M, Pinkas B, Jarrous A, Moskovich B (2010) Scifi-a system for secure face identification. IEEE Symposium on Security and Privacy 239\u2013254. https:\/\/doi.org\/10.1109\/SP.2010.39","DOI":"10.1109\/SP.2010.39"},{"key":"10648_CR38","doi-asserted-by":"publisher","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. https:\/\/doi.org\/10.1007\/3-540-48910-X16, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X16"},{"issue":"5","key":"10648_CR39","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0262-8856(97)00070-X","volume":"16","author":"P Phillips","year":"1998","unstructured":"Phillips P, Wechsler H, Huang J, Rauss P (1998) The feret database and evaluation procedure for face-recognition algorithms. Image Vis Comput 16(5):295\u2013306. https:\/\/doi.org\/10.1016\/S0262-8856(97)00070-X","journal-title":"Image Vis Comput"},{"issue":"5","key":"10648_CR40","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TDSC.2013.51","volume":"11","author":"Y Rahulamathavan","year":"2014","unstructured":"Rahulamathavan Y, Phan RCW, Veluru S, Cumanan K, Rajarajan M (2014) Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans Dependable Secure Comput 11 (5):467\u2013479. https:\/\/doi.org\/10.1109\/TDSC.2013.51","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"10648_CR41","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/TDSC2015.2453963","volume":"14","author":"Y Rahulamathavan","year":"2015","unstructured":"Rahulamathavan Y, Rajarajan M (2015) Efficient privacy-preserving facial expression classification. IEEE Trans Dependable Secure Comput 14 (3):326\u2013338. https:\/\/doi.org\/10.1109\/TDSC2015.2453963","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10648_CR42","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/JBHI.2013.2274899","volume":"18","author":"Y Rahulamathavan","year":"2014","unstructured":"Rahulamathavan Y, Veluru S, Phan RCW, Chambers J, Rajarajan M (2014) Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE J Biomed Health Inform 18:56\u201366. https:\/\/doi.org\/10.1109\/JBHI.2013.2274899","journal-title":"IEEE J Biomed Health Inform"},{"key":"10648_CR43","doi-asserted-by":"publisher","unstructured":"Rathgeb C, Gomez-Barrero M, Busch C (2015) Towards cancelable multi-bio- metrics based on adaptive bloom filters: a case study on feature level fusion of face and iris. Int Workshop on Biometrics and Forensics IWBF 1\u20136. https:\/\/doi.org\/10.1109\/IWBF.2015.7110225","DOI":"10.1109\/IWBF.2015.7110225"},{"key":"10648_CR44","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-14423-316","volume":"5984","author":"A Sadeghi","year":"2009","unstructured":"Sadeghi A, Schneider T, Wehrenberg I (2009) Efficient privacy-preserving face recognition. Inform Secur Cryptol 5984:229\u2013244. https:\/\/doi.org\/10.1007\/978-3-642-14423-316","journal-title":"Inform Secur Cryptol"},{"issue":"3","key":"10648_CR45","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1049\/iet-bmt.2016.0008","volume":"6","author":"M Sandhya","year":"2017","unstructured":"Sandhya M, Prasad M (2017) Securing fingerprint templates using fused structures. IET Biometrics 6(3):173\u2013182. https:\/\/doi.org\/10.1049\/iet-bmt.2016.0008","journal-title":"IET Biometrics"},{"key":"10648_CR46","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1109\/ICPR.2004.1334679","volume":"3","author":"M Savvides","year":"2004","unstructured":"Savvides M, Vijaya Kumar BVK, Khosla P (2004) Cancelable biometric filters for face recognition. Pattern Recogn 3:922\u2013925. https:\/\/doi.org\/10.1109\/ICPR.2004.1334679","journal-title":"Pattern Recogn"},{"issue":"10","key":"10648_CR47","doi-asserted-by":"publisher","first-page":"395","DOI":"10.17148\/IJARCCE.2015.41086","volume":"4","author":"F Sayyada","year":"2015","unstructured":"Sayyada F, Sultana D, Shubhangi DC (2015) Privacy preserved image recognition on msb encrypted images. Int J of Adv Res Comput Commun Eng 4(10):395\u2013398. https:\/\/doi.org\/10.17148\/IJARCCE.2015.41086","journal-title":"Int J of Adv Res Comput Commun Eng"},{"key":"10648_CR48","doi-asserted-by":"publisher","first-page":"34773","DOI":"10.1007\/s11042-019-08071-5","volume":"78","author":"A Shakiba","year":"2019","unstructured":"Shakiba A (2019) A novel randomized one-dimensional chaotic chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal. Multimed Tools Appl 78:34773\u201334799. https:\/\/doi.org\/10.1007\/s11042-019-08071-5","journal-title":"Multimed Tools Appl"},{"key":"10648_CR49","doi-asserted-by":"crossref","unstructured":"Shokri R (2015) Privacy-preserving deep learning","DOI":"10.1145\/2810103.2813687"},{"key":"10648_CR50","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1364\/JOSAA.32.001772","volume":"32","author":"M Taheri","year":"2015","unstructured":"Taheri M, Mozaffari S, Keshavarzi P (2015) Cancelable face verification using optical encryption and authentication. Opt Soc Am A 32:1772\u20131779. https:\/\/doi.org\/10.1364\/JOSAA.32.001772","journal-title":"Opt Soc Am A"},{"key":"10648_CR51","doi-asserted-by":"publisher","unstructured":"Taheri M, Mozaffari S, Keshavarzi P (2017) Face authentication in encrypted domain based on correlation filter. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-017-5275-8","DOI":"10.1007\/s11042-017-5275-8"},{"key":"10648_CR52","doi-asserted-by":"publisher","unstructured":"Trived A, Thounaojam D, Pal S (2020) Non-invertible cancellable fingerprint template for fingerprint biometric. Computers and Security 90. https:\/\/doi.org\/10.1016\/j.cose.2019.101690","DOI":"10.1016\/j.cose.2019.101690"},{"issue":"2","key":"10648_CR53","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1504\/IJACT.2014.062738","volume":"3","author":"T Veugen","year":"2014","unstructured":"Veugen T (2014) Encrypted integer division and secure compariso. Int J Appl Crypto 3(2):166\u2013180. https:\/\/doi.org\/10.1504\/IJACT.2014.062738","journal-title":"Int J Appl Crypto"},{"key":"10648_CR54","doi-asserted-by":"publisher","unstructured":"Wang Q, Hu S, Wang J, Ren K (2016) Secure surfing: Privacy-preserving speeded-up robust feature extractor. In: IEEE 36th international conference on distributed computing systems (ICDCS). https:\/\/doi.org\/10.1109\/ICDCS.2016.84, pp 700\u2013710","DOI":"10.1109\/ICDCS.2016.84"},{"key":"10648_CR55","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.jvcir.2019.04.015","volume":"62","author":"HT Wu","year":"2019","unstructured":"Wu HT, Cheung YM, Yang Z, Tang S (2019) A high-capacity reversible data hiding method for homomorphic encrypted images. J Vis Commun Image Represent 62:87\u201396. https:\/\/doi.org\/10.1016\/j.jvcir.2019.04.015","journal-title":"J Vis Commun Image Represent"},{"issue":"9","key":"10648_CR56","doi-asserted-by":"publisher","first-page":"3735","DOI":"10.1007\/s00500-015-1759-5","volume":"20","author":"C Xiang","year":"2016","unstructured":"Xiang C, Tang C, Cai Y, Xu Q (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735\u20133744. https:\/\/doi.org\/10.1007\/s00500-015-1759-5","journal-title":"Soft Comput"},{"key":"10648_CR57","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.cose.2016.11.014","volume":"69","author":"G Xu","year":"2017","unstructured":"Xu G, Li H, Tan C, Liu D, Dai Y, Yang K (2017) Achieving efficient and privacy-preserving truth discovery in crowd sensing systems. Comput Secur 69:114\u2013126. https:\/\/doi.org\/10.1016\/j.cose.2016.11.014","journal-title":"Comput Secur"},{"key":"10648_CR58","doi-asserted-by":"crossref","unstructured":"Zhang Y (2015) Robust privacy preserving fingerprint authentication. Master of Science Rice University","DOI":"10.1109\/HST.2016.7495547"},{"key":"10648_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2015.11.004","volume":"89","author":"Y Zhu","year":"2016","unstructured":"Zhu Y, Huang Z, Takagi T (2016) Secure and controllable k-nn query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1\u201312. https:\/\/doi.org\/10.1016\/j.jpdc.2015.11.0049","journal-title":"J Parallel Distrib Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10648-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10648-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10648-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T05:15:31Z","timestamp":1621919731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10648-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,16]]},"references-count":59,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10648"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10648-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,16]]},"assertion":[{"value":"6 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}