{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T05:14:18Z","timestamp":1748409258834,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"37","license":[{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18621-1","type":"journal-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T08:03:59Z","timestamp":1716969839000},"page":"85065-85078","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quaternion double random phase encoding for privacy-preserving cancelable biometrics"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9649-0398","authenticated-orcid":false,"given":"Mahmoud","family":"Nasr","sequence":"first","affiliation":[]},{"given":"Adam","family":"Pi\u00f3rkowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8749-9518","authenticated-orcid":false,"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"18621_CR1","first-page":"323","volume-title":"Biometric template protection: a systematic literature review of approaches and modalities","author":"M Sandhya","year":"2017","unstructured":"Sandhya M, Prasad MV (2017) Biometric template protection: a systematic literature review of approaches and modalities. Opportunities & Challenges in The Big Data Era, Biometric Security and Privacy, pp 323\u2013370"},{"key":"18621_CR2","doi-asserted-by":"crossref","unstructured":"Jain AK, Ross AA, Nandakumar K, Jain AK, Ross AA, Nandakumar K (2011) Security of biometric systems. Introduction Biom 259\u2013306","DOI":"10.1007\/978-0-387-77326-1_7"},{"key":"18621_CR3","unstructured":"Jain AK, Li SZ (2011) Handbook of Face Recognition vol 1. Springer, 2011"},{"key":"18621_CR4","doi-asserted-by":"crossref","unstructured":"Choudhury B, Then PH, Issac B, Raman V, Haldar MK (2018) A survey on biometrics and cancelable biometrics systems. Int J Image Graph 18:1850006:1\u20131850006:39","DOI":"10.1142\/S0219467818500067"},{"issue":"5","key":"18621_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2015.2434151","volume":"32","author":"VM Patel","year":"2015","unstructured":"Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Proc Mag 32(5):54\u201365","journal-title":"IEEE Signal Proc Mag"},{"key":"18621_CR6","doi-asserted-by":"crossref","unstructured":"Bernal-Romero JC, Ramirez-Cortes JM, Rangel-Magdaleno J, Peregrina-Barreto H, Cruz-Vega I et al (2023) A review on protection and cancelable techniques in biometric systems. IEEE Access","DOI":"10.1109\/ACCESS.2023.3239387"},{"issue":"2","key":"18621_CR7","first-page":"61","volume":"11","author":"SV Gaddam","year":"2010","unstructured":"Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. Int J Netw Secur 11(2):61\u201369","journal-title":"Int J Netw Secur"},{"key":"18621_CR8","doi-asserted-by":"publisher","unstructured":"Nasr M, Pi\u00f3rkowski A, Essam M, Abd\u00a0El-Samie FE (2023) Cancelable biometric system based on the quaternion implementation of double random phase encoding. In: 2023 3rd International conference on electronic engineering (ICEEM), pp 1\u20137. https:\/\/doi.org\/10.1109\/ICEEM58740.2023.10319630","DOI":"10.1109\/ICEEM58740.2023.10319630"},{"issue":"3","key":"18621_CR9","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614\u2013634","journal-title":"IBM Syst J"},{"key":"18621_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.laa.2023.01.013","volume":"664","author":"P-L Poirion","year":"2023","unstructured":"Poirion P-L, Louren\u00e7o BF, Takeda A (2023) Random projections of linear and semidefinite problems with linear inequalities. Linear Algebra Appl 664:24\u201360","journal-title":"Linear Algebra Appl"},{"key":"18621_CR11","doi-asserted-by":"crossref","unstructured":"Tarek M (2023) Face templates encryption technique based on random projection and deep learning. Comput Syst Sci Eng 44(3)","DOI":"10.32604\/csse.2023.027139"},{"key":"18621_CR12","volume":"58","author":"W Yang","year":"2021","unstructured":"Yang W, Wang S, Shahzad M, Zhou W (2021) A cancelable biometric authentication system based on feature-adaptive random projection. J Inf Secur Appl 58:102704","journal-title":"J Inf Secur Appl"},{"key":"18621_CR13","doi-asserted-by":"publisher","first-page":"15189","DOI":"10.1007\/s00500-020-04856-1","volume":"24","author":"E Abdellatef","year":"2020","unstructured":"Abdellatef E, Omran EM, Soliman RF, Ismail NA, Abd Elrahman SES, Ismail KN, Rihan M, Abd El-Samie FE, Eisa AA (2020) Fusion of deep-learned and hand-crafted features for cancelable recognition systems. Soft Comput 24:15189\u201315208","journal-title":"Soft Comput"},{"issue":"7","key":"18621_CR14","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.3390\/sym15071426","volume":"15","author":"A Sedik","year":"2023","unstructured":"Sedik A, El-Latif AAA, El-Affendi M, Mostafa H (2023) A cancelable biometric system based on deep style transfer and symmetry check for double-phase user authentication. Symmetry 15(7):1426","journal-title":"Symmetry"},{"issue":"5","key":"18621_CR15","doi-asserted-by":"publisher","first-page":"7917","DOI":"10.1007\/s11042-022-13646-w","volume":"82","author":"H Djebli","year":"2023","unstructured":"Djebli H, Ait-Aoudia S, Michelucci D (2023) Quantized random projections of sift features for cancelable fingerprints. Multimed Tools Appl 82(5):7917\u20137937","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"18621_CR16","first-page":"643","volume":"22","author":"G Meena","year":"2019","unstructured":"Meena G, Choudhary S (2019) Biometric authentication in internet of things: A conceptual view. J Stat Manag Syst 22(4):643\u2013652","journal-title":"J Stat Manag Syst"},{"issue":"2","key":"18621_CR17","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s11042-022-13314-z","volume":"82","author":"P Garg","year":"2023","unstructured":"Garg P, Jain A (2023) A robust technique for biometric image authentication using invisible watermarking. Multimed Tools Appl 82(2):2237\u20132253","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"18621_CR18","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Optics letters 20(7):767\u2013769","journal-title":"Optics letters"},{"issue":"16","key":"18621_CR19","doi-asserted-by":"publisher","first-page":"10253","DOI":"10.1364\/OE.15.010253","volume":"15","author":"Y Frauel","year":"2007","unstructured":"Frauel Y, Castro A, Naughton TJ, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Optics Express 15(16):10253\u201310265","journal-title":"Optics Express"},{"issue":"21","key":"18621_CR20","doi-asserted-by":"publisher","first-page":"37816","DOI":"10.1364\/OE.466101","volume":"30","author":"GM Salama","year":"2022","unstructured":"Salama GM, El-Gazar S, Omar B, Nassar RM, Khalaf AA, El-Banby GM, Hamed HF, El-Shafai W, Abd El-Samie FE (2022) Cancelable biometric system for iot applications based on optical double random phase encoding. Optics Express 30(21):37816\u201337832","journal-title":"Optics Express"},{"key":"18621_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11082-016-0461-x","volume":"48","author":"AM Elshamy","year":"2016","unstructured":"Elshamy AM, Abd El-Samie FE, Faragallah OS, Elshamy EM, El-sayed HS, El-Zoghdy S, Rashed AN, Mohamed AE-NA, Alhamad AQ (2016) Optical image cryptosystem using double random phase encoding and arnold\u2019s cat map. Opt Quant Electron 48:1\u201318","journal-title":"Opt Quant Electron"},{"issue":"1","key":"18621_CR22","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/0165-1684(95)00076-P","volume":"46","author":"HM Ozaktas","year":"1995","unstructured":"Ozaktas HM, Ayt\u00fcr O (1995) Fractional fourier domains. Signal Processing 46(1):119\u2013124","journal-title":"Signal Processing"},{"key":"18621_CR23","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.optcom.2016.11.002","volume":"388","author":"SK Rajput","year":"2017","unstructured":"Rajput SK, Nishchal NK (2017) Optical double image security using random phase fractional fourier domain encoding and phase-retrieval algorithm. Opt Commun 388:38\u201346","journal-title":"Opt Commun"},{"issue":"35","key":"18621_CR24","doi-asserted-by":"publisher","first-page":"10305","DOI":"10.1364\/AO.57.010305","volume":"57","author":"RF Soliman","year":"2018","unstructured":"Soliman RF, El Banby GM, Algarni AD, Elsheikh M, Soliman NF, Amin M, Abd El-Samie FE (2018) Double random phase encoding for cancelable face and iris recognition. Appl Opt 57(35):10305\u201310316","journal-title":"Appl Opt"},{"issue":"14","key":"18621_CR25","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1364\/OL.29.001584","volume":"29","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) Double random-phase encoding in the fresnel domain. Opt Lett 29(14):1584\u20131586","journal-title":"Opt Lett"},{"key":"18621_CR26","unstructured":"Essam M, Ahmed M, Shoukralla E, Abd\u00a0El-atty SM, Abd\u00a0El-Samie FE (2019) Quaternion based on cancelable biometrics"},{"issue":"20","key":"18621_CR27","doi-asserted-by":"publisher","first-page":"1856","DOI":"10.1016\/j.ijleo.2010.11.016","volume":"122","author":"X Wang","year":"2011","unstructured":"Wang X, Zhai H, Li Z, Ge Q (2011) Double random-phase encryption based on discrete quaternion fourier-transforms. Optik 122(20):1856\u20131859","journal-title":"Optik"},{"key":"18621_CR28","unstructured":"Cambridge University Department of Engineering (2018) ORL Database. https:\/\/www.cl.cam.ac.uk\/research\/dtg\/attarchive\/facedatabase.html. Accessed Sept 2018"},{"issue":"1","key":"18621_CR29","doi-asserted-by":"publisher","first-page":"929","DOI":"10.32604\/iasc.2023.031386","volume":"36","author":"LA Abou Elazm","year":"2023","unstructured":"Abou Elazm LA, El-Shafai W, Ibrahim S, Egila MG, Shawkey H, Elsaid MK, Soliman NF, AlEisa HN, Abd El-Samie FE (2023) Efficient hardware design of a secure cancellable biometric cryptosystem. Intell Autom Soft Comput 36(1):929\u2013955","journal-title":"Intell Autom Soft Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18621-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18621-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18621-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T08:11:47Z","timestamp":1731658307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18621-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,29]]},"references-count":29,"journal-issue":{"issue":"37","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["18621"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18621-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,5,29]]},"assertion":[{"value":"17 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors contributed and accepted to submit the current work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors accepted to submit and publish the submitted work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have neither relevant financial nor non-financial interests to disclose.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they have no conflict of interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}