{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T05:32:40Z","timestamp":1648963960112},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10690-w","type":"journal-article","created":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T13:04:11Z","timestamp":1615208651000},"page":"20641-20670","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of a hybrid approach using a revocable technique and steganographic text color coding technique for fingerprint template protection"],"prefix":"10.1007","volume":"80","author":[{"given":"Arpita","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Binod K.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,8]]},"reference":[{"issue":"1","key":"10690_CR1","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1093\/comjnl\/bxz047","volume":"63","author":"W Abdul","year":"2020","unstructured":"Abdul W, Nafea O, Ghouzali S, Tzovaras D (2020) Combining watermarking and hyper-chaotic map to enhance the security of stored biometric templates. The Computer Journal 63(1):479\u2013493. https:\/\/doi.org\/10.1093\/comjnl\/bxz047","journal-title":"The Computer Journal"},{"key":"10690_CR2","doi-asserted-by":"publisher","unstructured":"Abikoye OC, Ojo UA, Awotunde JB, et al. (2020) A safe and secured iris template using steganography and cryptography. Multimed Tools Appl, https:\/\/doi.org\/10.1007\/s11042-020-08971-x","DOI":"10.1007\/s11042-020-08971-x"},{"key":"10690_CR3","doi-asserted-by":"crossref","unstructured":"Abou elazm LA, Ibrahim S, Egila MG, Shawky H, Elsaid MKH, El-Shafai W, Abd El-Samie FE (2020) Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed Tools Appl","DOI":"10.1007\/s11042-019-08462-8"},{"key":"10690_CR4","unstructured":"Amritha G, Varkey M (2013) A security enhanced approach for digital image steganography using DWT and RC4 encryption. Int J Comput Trends Technol 4(6)"},{"key":"10690_CR5","doi-asserted-by":"crossref","unstructured":"Boult T (2006) Robust distance measures for face-recognition supporting revocable biometric tokens. In: Proc Int. conf. automatic face and gesture recognition, pp 560\u2013566","DOI":"10.1109\/FGR.2006.94"},{"key":"10690_CR6","doi-asserted-by":"crossref","unstructured":"Boult T, Scheirer W, Woodworth R (2007) Revocable fingerprint biotokens: Accuracy and security analysis. In: Proc IEEE conf. computer vision and pattern recognition, pp 1\u20138","DOI":"10.1109\/CVPR.2007.383110"},{"issue":"1-2","key":"10690_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.scico.2008.09.016","volume":"74","author":"J Bringer","year":"2008","unstructured":"Bringer J, Chabanne H, Kindarji B (2008) The best of both worlds: Applying secure sketches to cancelable biometrics, Sci. Comput Program 74(1-2):43\u201351","journal-title":"Comput Program"},{"key":"10690_CR8","unstructured":"Chedded A (2009) Steganoflage: a new image steganography algorithm. School of Computing & Intelligent Systems Faculty of Computing & Engineering University of Ulster"},{"key":"10690_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.inffus.2013.09.001","volume":"18","author":"Y Chin","year":"2014","unstructured":"Chin Y, Ong T, Teoh A, Goh K (2014) Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion. Inf Fusion 18:161\u2013174","journal-title":"Inf Fusion"},{"key":"10690_CR10","doi-asserted-by":"publisher","unstructured":"Feng YC, Yuen PC, Jain AK (2008) A hybrid approach for face template protection. SPIE Defense + Commercial Sensing. https:\/\/doi.org\/10.1117\/12.778652","DOI":"10.1117\/12.778652"},{"issue":"1","key":"10690_CR11","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/TIFS.2009.2038760","volume":"5","author":"YC Feng","year":"2010","unstructured":"Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forensics Secur 5(1):103\u2013117","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10690_CR12","doi-asserted-by":"crossref","unstructured":"Ghany KKA, Hefny HA, Hassanien AE, Ghali NI (2012) A hybrid approach for biometric template security","DOI":"10.1109\/ASONAM.2012.167"},{"key":"10690_CR13","doi-asserted-by":"crossref","unstructured":"Govindharaju Karthi, Ezhilarasan M (2016) Securing biometric template using a hybrid scheme ICIA-16","DOI":"10.1145\/2980258.2980475"},{"key":"10690_CR14","doi-asserted-by":"publisher","unstructured":"Gupta Banik B, Bandyopadhyay SK, Cuppens F (2018) Novel text steganography systems. In: Cuppens N, Lanet J-L, Legay A, Garcia-Alfaro J (eds), vol 10694. Springer International, pp 217\u201324, https:\/\/doi.org\/10.1007\/978-3-319-76687-4_15","DOI":"10.1007\/978-3-319-76687-4_15"},{"key":"10690_CR15","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1007\/s11042-018-6300-2","volume":"78","author":"M Hammad","year":"2019","unstructured":"Hammad M, Luo G, Wang K (2019) Cancelable biometric authentication system based on ECG. Multimed Tools Appl 78:1857\u20131887","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"10690_CR16","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao F, Anderson R, Daugman J (2006) Combining crypto with biometrics effectively. IEEE Trans Comput 55(9):1081\u20138","journal-title":"IEEE Trans Comput"},{"issue":"11","key":"10690_CR17","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/TPAMI.2003.1240122","volume":"25","author":"AK Jain","year":"2003","unstructured":"Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494\u20131498","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10690_CR18","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.patcog.2016.02.024","volume":"56","author":"Z Jin","year":"2016","unstructured":"Jin Z, Teoh ABJ, Goi BM, Tay YH (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 56:50\u201362","journal-title":"Pattern Recogn"},{"key":"10690_CR19","doi-asserted-by":"publisher","first-page":"932","DOI":"10.1016\/j.procs.2020.03.392","volume":"167","author":"C Kant","year":"2020","unstructured":"Kant C, Chaudhary S (2020) A watermarking based approach for protection of templates in multimodal biometric system. Procedia Computer Science 167:932\u2013941. https:\/\/doi.org\/10.1016\/j.procs.2020.03.392","journal-title":"Procedia Computer Science"},{"issue":"4","key":"10690_CR20","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.14419\/ijet.v7i4.11485","volume":"7","author":"G Karthi","year":"2018","unstructured":"Karthi G, Ezhilarasan M (2018) Multi biometric template protection using hybrid technique. Int J Eng Technol [S.l.] 7(4):2609\u20132613. ISSN 2227-524X. https:\/\/doi.org\/10.14419\/ijet.v7i4.11485","journal-title":"Int J Eng Technol [S.l.]"},{"key":"10690_CR21","first-page":"5","volume":"IX","author":"A Kerckhoffs","year":"1883","unstructured":"Kerckhoffs A (1883) La cryptographie militaire. Journal des sciences militaires IX:5\u201383; 161\u201391","journal-title":"Journal des sciences militaires"},{"issue":"2","key":"10690_CR22","doi-asserted-by":"publisher","first-page":"185","DOI":"10.3233\/SW-150209","volume":"8","author":"D Kevin","year":"2017","unstructured":"Kevin D, Ngomo A-CN (2017) On the efficient execution of bounded Jaro-Winkler distances. SemanticWeb J IOS Press 8(2):185\u201396. https:\/\/doi.org\/10.3233\/SW-150209","journal-title":"SemanticWeb J IOS Press"},{"key":"10690_CR23","doi-asserted-by":"publisher","unstructured":"Kingslin S, Kavitha N (2015) Evaluative approach towards text steganographic techniques. Indian J Sci Technol 8(29). https:\/\/doi.org\/10.17485\/ijst\/2015\/v8i29\/84415","DOI":"10.17485\/ijst\/2015\/v8i29\/84415"},{"key":"10690_CR24","unstructured":"Lavanya N, Manjula V, Krishna Rao NV (2012) Robust and secure data hiding in image using biometrictechnique. Int J Comput Sci Info Technol 3(5)"},{"issue":"5","key":"10690_CR25","doi-asserted-by":"publisher","first-page":"c1","DOI":"10.1109\/TPAMI.2007.1070","volume":"29","author":"Yujian Li","year":"2007","unstructured":"Li Yujian, Bo Liu (2007) A normalized Levenshtein distance metric. IEEE Trans Pattern Anal Mach Intell 29(5):c1\u2013c1. https:\/\/doi.org\/10.1109\/TPAMI.2007.1070","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10690_CR26","doi-asserted-by":"publisher","first-page":"11947","DOI":"10.1007\/s11042-019-08446-8","volume":"79","author":"H Li","year":"2020","unstructured":"Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme based on randomized cuckoo hashing and MinHash. Multimed Tools Appl 79:11947\u201311971. https:\/\/doi.org\/10.1007\/s11042-019-08446-8","journal-title":"Multimed Tools Appl"},{"key":"10690_CR27","first-page":"2014","volume":"686754","author":"H Liu","year":"2014","unstructured":"Liu H, Sun D, Xiong K, Qiu Z (2014) A hybrid approach to protect palmprint templates. Sci World J 686754:2014","journal-title":"Sci World J"},{"key":"10690_CR28","unstructured":"Malkhasyan N (2013) Authentication based on fingerprints with steganographic data protection. International Journal BInformation Theories and Applications 20(3)"},{"key":"10690_CR29","doi-asserted-by":"publisher","first-page":"3403","DOI":"10.1007\/s10462-019-09767-8","volume":"53","author":"N Kumar","year":"2019","unstructured":"Manisha, Kumar N (2019) Cancelable Biometrics: a comprehensive survey. Artif Intell Rev 53:3403\u20133446","journal-title":"Artif Intell Rev"},{"key":"10690_CR30","doi-asserted-by":"crossref","unstructured":"Monwar MM, Gavrilova ML (2009) Enhancing security through a hybrid multibiometric system. In: Proc. IEEE Int. Conf. Comput. Intell. Biometrics, Theory, Algorithms, Appl., pp 84\u201391","DOI":"10.1109\/CIB.2009.4925691"},{"key":"10690_CR31","unstructured":"Na W, Chiya Z, Li Xia, Yunjin W (2010) Enhancing iris-feature security with steganography. In: IEEE conference on industrial electronics and applications, pp 2233\u20132237"},{"issue":"9","key":"10690_CR32","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.1093\/comjnl\/bxv107","volume":"59","author":"O Nafea","year":"2016","unstructured":"Nafea O, Ghouzali S, Abdul W, Qazi E (2016) Hybrid multi-biometric template protection using watermarking. The Computer Journal 59(9):1392\u20131407. https:\/\/doi.org\/10.1093\/comjnl\/bxv107","journal-title":"The Computer Journal"},{"issue":"8","key":"10690_CR33","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1016\/j.patrec.2009.07.003","volume":"31","author":"A Nagar","year":"2010","unstructured":"Nagar A, Nandakumar K, Jain AK (2010) A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recogn Lett 31(8):733\u2013741","journal-title":"Pattern Recogn Lett"},{"key":"10690_CR34","doi-asserted-by":"crossref","unstructured":"Nguyen TAT, Dang TK, Nguyen DT (2019) A new biometric template protection using random orthonormal projection and fuzzy commitment. In: Lee S, Ismail R, Choo H (eds) Proceedings of the 13th international conference on ubiquitous information management and communication (IMCOM) 2019. IMCOM 2019. Advances in intelligent systems and computing, vol 935. Springer","DOI":"10.1007\/978-3-030-19063-7_58"},{"key":"10690_CR35","first-page":"12","volume":"2011","author":"K Ntalianis","year":"2011","unstructured":"Ntalianis K, Tsapatsoulis N, Drigas A (2011) Video-object oriented biometrics hiding for user authentication under error-prone transmissions. EURASIP J Inf Secur 2011:12","journal-title":"EURASIP J Inf Secur"},{"key":"10690_CR36","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","volume":"29","author":"T Ojala","year":"1996","unstructured":"Ojala T, Pietikainen M, Harwood D (1996) A comparative study of texture measures with classification based on feature distributions. Pattern Recogn 29:51\u201359","journal-title":"Pattern Recogn"},{"key":"10690_CR37","doi-asserted-by":"publisher","first-page":"1768","DOI":"10.1587\/transinf.E94.D","volume":"94-D","author":"O Ouda","year":"1768","unstructured":"Ouda O, Tsumura N, Nakaguchi T (1768) On the security of bioencoding based cancelable biometrics. IEICE Transactions 94-D:1768\u20131777. https:\/\/doi.org\/10.1587\/transinf.E94.D","journal-title":"IEICE Transactions"},{"key":"10690_CR38","doi-asserted-by":"publisher","unstructured":"Patel HM, Panuwala CN, Vora A (2016) Hybrid feature level approach for multi-biometric cryptosystem. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, pp 1087\u20131092, https:\/\/doi.org\/10.1109\/WiSPNET.2016.7566304","DOI":"10.1109\/WiSPNET.2016.7566304"},{"key":"10690_CR39","doi-asserted-by":"publisher","unstructured":"Poonguzhali N, Ezhilarasan M (2016) A hybrid template protection technique for fingerprint biometric authentication system. In: Proceedings of the international conference on informatics and analytics (ICIA-16). Association for computing machinery, New York, NY, USA, Article 43, 1\u20136. https:\/\/doi.org\/10.1145\/2980258.2980355","DOI":"10.1145\/2980258.2980355"},{"issue":"2","key":"10690_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/09500340.2020.1760384","volume":"67","author":"P Rakheja","year":"2020","unstructured":"Rakheja P, Singh P, Vig R (2020) othersDouble image encryption scheme for iris template protection using 3D Lorenz system and modified equal modulus decomposition in hybrid transform domain. J Mod Opt 67(2):1\u201314. https:\/\/doi.org\/10.1080\/09500340.2020.1760384","journal-title":"J Mod Opt"},{"key":"10690_CR41","doi-asserted-by":"publisher","unstructured":"Ramakrishnan BK, Thandra PK, Satya Murty Srinivasula AV (2017) Text steganography: A novel character-level embedding algorithm using font attribute. Security Commun Netw, https:\/\/doi.org\/10.1002\/sec.1757","DOI":"10.1002\/sec.1757"},{"issue":"1","key":"10690_CR42","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s13635-016-0049-9","volume":"2016","author":"C Rathgeb","year":"2016","unstructured":"Rathgeb C, Tams B, Wagner J, Busch C (2016) Unlinkable improved multi-biometric iris fuzzy vault. EURASIP J Inf Secur 2016(1):26","journal-title":"EURASIP J Inf Secur"},{"key":"10690_CR43","doi-asserted-by":"publisher","unstructured":"Shiu H-J, Lin B-S, Lin B-S, Huang P-Y, Huang C-H, Lei C-L, Cuppens F (2018) Data hiding on social media communications using text steganography. In: Cuppens N, Lanet J-L, Legay A, Garcia-Alfaro J (eds) Risks and security of internet and systems, vol 10694. Springer International, pp 217\u201324, https:\/\/doi.org\/10.1007\/978-3-319-76687-4_15","DOI":"10.1007\/978-3-319-76687-4_15"},{"issue":"1","key":"10690_CR44","first-page":"1","volume":"12","author":"A Siswanto","year":"2020","unstructured":"Siswanto A, Katuk N, Ku-Mahamud KR (2020) Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection. Int J Commun Netw Info Sec Kohat 12(1):1\u20139","journal-title":"Int J Commun Netw Info Sec Kohat"},{"key":"10690_CR45","doi-asserted-by":"publisher","unstructured":"Tabassum M, Sarower AH, Esha A, Hassan MM (2020) An enhancement of kerberos using biometric template and steganography. In: Bhuiyan T, Rahman M, Ali M (eds) Cyber security and computer science. ICONCS 2020. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering. https:\/\/doi.org\/10.1007\/978-3-030-52856-0_9, vol 325. Springer, Cham","DOI":"10.1007\/978-3-030-52856-0_9"},{"key":"10690_CR46","doi-asserted-by":"crossref","unstructured":"Wong WJ, Wong MLD, Teoh ABJ (2014) A security- and privacydriven hybrid biometric template protection technique. In: Proc int. conf. electron., inf. commun., pp 1\u20135","DOI":"10.1109\/ELINFOCOM.2014.6914383"},{"key":"10690_CR47","doi-asserted-by":"crossref","unstructured":"Yuan L (2014) Multimodal cryptosystem based on fuzzy commitment. In: Proc IEEE 17th Int Conf Comput Sci Eng, pp 1545\u20131549","DOI":"10.1109\/CSE.2014.286"},{"key":"10690_CR48","doi-asserted-by":"publisher","first-page":"32333","DOI":"10.1007\/s11042-019-07824-6","volume":"78","author":"Y Zakaria","year":"2019","unstructured":"Zakaria Y, et al. (2019) Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis. Multimed Tools Appl 78:32333\u201332355","journal-title":"Multimed Tools Appl"},{"key":"10690_CR49","doi-asserted-by":"publisher","unstructured":"Zhao D, Fang S, Xiang J, Tian J, Xiong S (2018) Iris template protection based on local ranking. Sec Commun Netw 2018, https:\/\/doi.org\/10.1155\/2018\/4519548","DOI":"10.1155\/2018\/4519548"},{"key":"10690_CR50","unstructured":"Zhenhua G, Lei Z, David Z, Xuanqin M (2010) Hierarchical multiscale LBP for face and palmprint recognition, IEEE 17th international conference on image processing, Hong Kong"},{"key":"10690_CR51","unstructured":"Zhu H-H, He Q-H, Li Y-X (2012) A two -step hybrid approach for voiceprint-biometric template protection. In: Proc. IEEE Int. Conf. Mach. Learn., pp 560\u2013565"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10690-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10690-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10690-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T06:23:43Z","timestamp":1621578223000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10690-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,8]]},"references-count":51,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10690"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10690-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,8]]},"assertion":[{"value":"12 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}