{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:25:33Z","timestamp":1773984333639,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"31","license":[{"start":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T00:00:00Z","timestamp":1708473600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T00:00:00Z","timestamp":1708473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-15013-9","type":"journal-article","created":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T09:02:22Z","timestamp":1708506142000},"page":"76131-76175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Efficient cancelable authentication system based on DRPE and adaptive filter"],"prefix":"10.1007","volume":"83","author":[{"given":"Ensherah A.","family":"Naeem","sequence":"first","affiliation":[]},{"given":"Ayat","family":"Saied","sequence":"additional","affiliation":[]},{"given":"Adel S.","family":"El-Fishawy","sequence":"additional","affiliation":[]},{"given":"Mohamad","family":"Rihan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8749-9518","authenticated-orcid":false,"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7789-9195","authenticated-orcid":false,"given":"Ghada M.","family":"El-Banby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"key":"15013_CR1","doi-asserted-by":"publisher","first-page":"221246","DOI":"10.1109\/ACCESS.2020.3043689","volume":"8","author":"A Abdulaziz","year":"2020","unstructured":"Abdulaziz A, Amoon M, Aly MH, El-Shafai W (2020) Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 8:221246\u2013221268","journal-title":"IEEE Access"},{"issue":"31","key":"15013_CR2","doi-asserted-by":"publisher","first-page":"23483","DOI":"10.1007\/s11042-020-08971-x","volume":"79","author":"OC Abikoye","year":"2020","unstructured":"Abikoye OC, Ojo UA, Awotunde JB, Ogundokun RO (2020) A safe and secured iris template cancelable Iris recognition system based on comb filter using steganography and cryptography. Multimed Tools Appl 79(31):23483\u201323506","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"15013_CR3","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.3390\/electronics9061046","volume":"9","author":"AD Algarni","year":"2020","unstructured":"Algarni AD, El Banby GM, Soliman NF, El-Samie FE, Iliyasu AM (2020) Efficient implementation of homomorphic and fuzzy transforms in random-projection encryption frameworks for cancellable face recognition. Electronics. 9(6):1046","journal-title":"Electronics."},{"key":"15013_CR4","unstructured":"AT&T database. https:\/\/www.cl.cam.ac.uk\/research\/dtg\/attarchive:pub\/data\/att_faces.tar.Z"},{"key":"15013_CR5","doi-asserted-by":"publisher","first-page":"103103","DOI":"10.1016\/j.dsp.2021.103103","volume":"16","author":"IS Badr","year":"2021","unstructured":"Badr IS, Radwan AG, el-Rabaie ESM, Said LA, el Banby GM, el-Shafai W, Abd el-Samie FE (2021) Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion. Digit Signal Process 16:103103","journal-title":"Digit Signal Process"},{"issue":"1","key":"15013_CR6","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/21645515.2017.1379639","volume":"14","author":"UA Bhatti","year":"2018","unstructured":"Bhatti UA et al (2018) Recommendation system for immunization coverage and monitoring. Hum Vaccines Immunother 14(1):165\u2013171","journal-title":"Hum Vaccines Immunother"},{"issue":"3","key":"15013_CR7","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/17517575.2018.1557256","volume":"13","author":"UA Bhatti","year":"2019","unstructured":"Bhatti UA et al (2019) Recommendation system using feature extraction and pattern recognition in clinical care systems. Enterp Inf Syst 13(3):329\u2013351","journal-title":"Enterp Inf Syst"},{"key":"15013_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TGRS.2021.3090410","volume":"60","author":"UA Bhatti","year":"2021","unstructured":"Bhatti UA et al (2021) Local similarity-based spatial\u2013spectral fusion hyperspectral image classification with deep CNN and Gabor filtering. IEEE Trans Geosci Remote Sens 60:1\u201315","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"15013_CR9","doi-asserted-by":"publisher","first-page":"132569","DOI":"10.1016\/j.chemosphere.2021.132569","volume":"288","author":"UA Bhatti","year":"2022","unstructured":"Bhatti UA et al (2022) Assessing the change of ambient air quality patterns in Jiangsu Province of China pre-to post-COVID-19. Chemosphere 288:132569","journal-title":"Chemosphere"},{"issue":"4","key":"15013_CR10","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1109\/78.668573","volume":"46","author":"WW Boles","year":"1998","unstructured":"Boles WW, Boashash B (1998) A human identification technique using images of the iris and wavelet transform. IEEE Trans Signal Process 46(4):1185\u20131188","journal-title":"IEEE Trans Signal Process"},{"issue":"16","key":"15013_CR11","doi-asserted-by":"publisher","first-page":"10253","DOI":"10.1364\/OE.15.010253","volume":"15","author":"Y Frauel","year":"2007","unstructured":"Frauel Y, Castro A, Naughton TJ, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express 15(16):10253\u201310265","journal-title":"Opt Express"},{"key":"15013_CR12","doi-asserted-by":"publisher","first-page":"101700","DOI":"10.1016\/j.cose.2019.101700","volume":"90","author":"M Gomez-Barrero","year":"2020","unstructured":"Gomez-Barrero M, Galbally J (2020) Reversing the irreversible: a survey on inverse biometrics. Comput Secur 90:101700","journal-title":"Comput Secur"},{"key":"15013_CR13","unstructured":"IIT Delhi Iris Database version 1.0. http:\/\/web.iitd.ac.in\/~biometrics\/Database_Iris.htm"},{"key":"15013_CR14","unstructured":"IIT Delhi knuckle Database version 1.0. http:\/\/web.iitd.ac.in\/~biometrics\/Database_knuckle.htm"},{"key":"15013_CR15","unstructured":"IITD Palmprint Database. http:\/\/web.iitd.ac.in\/~ajaykr\/Database_Palm.htm"},{"key":"15013_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1","volume-title":"Introduction to biometrics","author":"AK Jain","year":"2011","unstructured":"Jain AK, Ross AA, Nandakumar K (2011) Introduction to biometrics. Springer Science & Business Media"},{"key":"15013_CR17","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.patrec.2020.07.024","volume":"138","author":"M Joshi","year":"2020","unstructured":"Joshi M, Mazumdar B, Dey S (Oct. 2020) A comprehensive security analysis of match-in-database fingerprint biometric system. Pattern Recogn Lett 138:247\u2013266","journal-title":"Pattern Recogn Lett"},{"key":"15013_CR18","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2019.07.023","volume":"102","author":"H Kaur","year":"2020","unstructured":"Kaur H, Khanna P (2020) Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Futur Gener Comput Syst 102:30\u201341","journal-title":"Futur Gener Comput Syst"},{"issue":"6","key":"15013_CR19","doi-asserted-by":"publisher","first-page":"2075","DOI":"10.1109\/78.218137","volume":"41","author":"VJ Mathews","year":"1993","unstructured":"Mathews VJ, Xie Z (1993) A stochastic gradient adaptive filter with gradient adaptive step size. IEEE Trans Signal Process 41(6):2075\u20132087","journal-title":"IEEE Trans Signal Process"},{"issue":"8","key":"15013_CR20","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1364\/OL.31.001044","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31(8):1044\u20131046","journal-title":"Opt Lett"},{"key":"15013_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.12.003","volume":"82","author":"J Qiu","year":"2019","unstructured":"Qiu J, Li H, Zhao C (2019) Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. Comput Secur 82:1\u201314","journal-title":"Comput Secur"},{"key":"15013_CR22","doi-asserted-by":"publisher","first-page":"104017","DOI":"10.1016\/j.imavis.2020.104017","volume":"104","author":"A Singh","year":"2020","unstructured":"Singh A, Arora A, Nigam A (2020) Cancelable Iris template generation by aggregating patch level ordinal relations with its holistically extended performance and security analysis. Image Vis Comput 104:104017","journal-title":"Image Vis Comput"},{"key":"15013_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5123671","volume":"2021","author":"G Singh","year":"2021","unstructured":"Singh G et al (2021) Spoken language identification using deep learning. Comput Intell Neurosci 2021:1\u201312","journal-title":"Comput Intell Neurosci"},{"issue":"35","key":"15013_CR24","doi-asserted-by":"publisher","first-page":"10305","DOI":"10.1364\/AO.57.010305","volume":"57","author":"Soliman","year":"2018","unstructured":"Soliman et al (2018) Double random phase encoding for cancelable face and iris recognition. Appl Opt 57(35):10305\u201310316","journal-title":"Appl Opt"},{"issue":"2","key":"15013_CR25","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s40745-018-0172-1","volume":"6","author":"RF Soliman","year":"2019","unstructured":"Soliman RF, Amin M, El-Samie FEA (2019) A modified cancelable biometrics scheme using random projection. Ann Data Sci 6(2):223\u2013236","journal-title":"Ann Data Sci"},{"issue":"3","key":"15013_CR26","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1007\/s11042-019-08163-2","volume":"79","author":"RF Soliman","year":"2020","unstructured":"Soliman RF, Amin M, El-Samie A, Fathi E (2020) Cancelable Iris recognition system based on comb filter. Multimed Tools Appl 79(3):2521\u20132541","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"15013_CR27","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.3390\/s19132985","volume":"19","author":"W Yang","year":"2019","unstructured":"Yang W, Wang S, Hu J, Ibrahim A, Zheng G, Macedo MJ, Johnstone MN, Valli C (2019) A cancelable iris-and steganography-based user authentication system for the internet of things. Sensors 19(13):2985","journal-title":"Sensors"},{"key":"15013_CR28","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-030-05057-3_41","volume-title":"International conference on algorithms and architectures for parallel processing","author":"L You","year":"2018","unstructured":"You L, Li X (2018) A cancelable multi-biometric template generation algorithm based on bloom filter. In: International conference on algorithms and architectures for parallel processing, vol 11336. Springer, Cham, pp 547\u2013559"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15013-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15013-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15013-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T08:38:37Z","timestamp":1725352717000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15013-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,21]]},"references-count":28,"journal-issue":{"issue":"31","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["15013"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15013-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,21]]},"assertion":[{"value":"8 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Humans and animals are not involved in this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"There are no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}