{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T19:22:31Z","timestamp":1770232951374,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21345-z","type":"journal-article","created":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T21:33:23Z","timestamp":1769981603000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel approach to generate cancellable biometric templates using style transfer and hash codes"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7060-9105","authenticated-orcid":false,"given":"Ketki","family":"Deshmukh","sequence":"first","affiliation":[]},{"given":"Vaishali","family":"Kulkarni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,1]]},"reference":[{"key":"21345_CR1","doi-asserted-by":"publisher","first-page":"5994","DOI":"10.1109\/ACCESS.2018.2889996","volume":"7","author":"Z Rui","year":"2018","unstructured":"Rui Z et al (2018) A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE Access 7:5994\u20136009","journal-title":"IEEE Access"},{"key":"21345_CR2","doi-asserted-by":"crossref","unstructured":"Manisha, Kumar N (2020) Cancelable biometrics: a comprehensive survey. Artif Intell Rev 53(5):3403\u20133446","DOI":"10.1007\/s10462-019-09767-8"},{"issue":"37","key":"21345_CR3","doi-asserted-by":"publisher","first-page":"27721","DOI":"10.1007\/s11042-020-09197-7","volume":"79","author":"A Sarkar","year":"2020","unstructured":"Sarkar A, Singh BK (2020) A review on performance, security and various biometric template protection schemes for biometric authentication systems. Multimed Tools Appl 79(37):27721\u201327776","journal-title":"Multimed Tools Appl"},{"key":"21345_CR4","doi-asserted-by":"crossref","unstructured":"Lalithamani N, Soman KP (2009) An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics. In: 2009 International conference on advances in recent technologies in communication and computing, pp 47\u201352","DOI":"10.1109\/ARTCom.2009.193"},{"key":"21345_CR5","doi-asserted-by":"publisher","first-page":"105263","DOI":"10.1109\/ACCESS.2020.2999656","volume":"8","author":"A Sardar","year":"2020","unstructured":"Sardar A, Umer S, Pero C, Nappi M (2020) A novel cancelable facehashing technique based on non-invertible transformation with encryption and decryption template. IEEE Access 8:105263\u2013105277","journal-title":"IEEE Access"},{"key":"21345_CR6","first-page":"1","volume":"2011","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011:1\u201325","journal-title":"EURASIP J Inf Secur"},{"key":"21345_CR7","doi-asserted-by":"publisher","first-page":"8531","DOI":"10.1109\/ACCESS.2023.3239387","volume":"11","author":"JC Bernal-Romero","year":"2023","unstructured":"Bernal-Romero JC, Ramirez-Cortes JM, Rangel-Magdaleno JDJ, Gomez-Gil P, Peregrina-Barreto H, Cruz-Vega I (2023) A review on protection and cancelable techniques in biometric systems. IEEE Access 11:8531\u20138568","journal-title":"IEEE Access"},{"key":"21345_CR8","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27"},{"issue":"1","key":"21345_CR9","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s10489-021-02401-7","volume":"52","author":"M Tarek","year":"2022","unstructured":"Tarek M, Hamouda E, Abohamama AS (2022) Multi-instance cancellable biometrics schemes based on generative adversarial network. Appl Intell 52(1):501\u2013513","journal-title":"Appl Intell"},{"issue":"7","key":"21345_CR10","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.3390\/sym15071426","volume":"15","author":"A Sedik","year":"2023","unstructured":"Sedik A, El-Latif AAA, El-Affendi M, Mostafa H (2023) A cancelable biometric system based on deep style transfer and symmetry check for double-phase user authentication. Symmetry 15(7):1426","journal-title":"Symmetry"},{"issue":"2","key":"21345_CR11","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1007\/s10489-021-03153-0","volume":"53","author":"BA El-Rahiem","year":"2023","unstructured":"El-Rahiem BA, Samie FEAE, Amin M (2023) Efficient cancellable multi-biometric recognition system based on deep learning and bio-hashing. Appl Intell 53(2):1792\u20131806","journal-title":"Appl Intell"},{"key":"21345_CR12","unstructured":"Eldin SMS, Sedik A, Alshamrani SS, Ayoup AM (2023) Cancellable multi-biometric feature veins template generation based on SHA-3 hashing. Comput Mater Continua 75(1)"},{"key":"21345_CR13","doi-asserted-by":"crossref","unstructured":"Dong X-B, Jin Z, Wong K (2018) A generalized approach for cancellable template and its realization for minutia cylinder-code. In: 2018 Asia-pacific signal and information processing association annual summit and conference (APSIPA ASC), pp 908\u2013915","DOI":"10.23919\/APSIPA.2018.8659731"},{"key":"21345_CR14","doi-asserted-by":"crossref","unstructured":"Ayoup AM, Khalaf AA, El-Shafai W, El-Samie FEA, Alraddady F, Eldin SMS (2022) Cancellable multi-biometric template generation based on arnold cat map and aliasing. Comput Mater Continua 72(2)","DOI":"10.32604\/cmc.2022.025902"},{"key":"21345_CR15","unstructured":"Trainys T, Venckauskas A (2018) Encryption keys generation based on bio-cryptography finger vein method. In: CEUR workshop proceedings, vol 2145, pp 106\u2013111"},{"issue":"16","key":"21345_CR16","doi-asserted-by":"publisher","first-page":"2427","DOI":"10.1016\/j.patrec.2007.08.008","volume":"28","author":"S Tulyakov","year":"2007","unstructured":"Tulyakov S, Farooq F, Mansukhani P, Govindaraju V (2007) Symmetric hash functions for secure fingerprint biometric systems. Pattern Recogn Lett 28(16):2427\u20132436","journal-title":"Pattern Recogn Lett"},{"key":"21345_CR17","doi-asserted-by":"crossref","unstructured":"Arepalli GS, Boobalan P (2024) Enhanced security in biometrics: a cancelable multi-instance iris authentication utilizing quotient filter. Traitement du Signal 41(2)","DOI":"10.18280\/ts.410230"},{"key":"21345_CR18","doi-asserted-by":"crossref","unstructured":"Khandelwal SS (2014) Multitier biometric template security using cryptographic salts and personal image identification. ELCVIA: electronic letters on computer vision and image analysis 13(3)","DOI":"10.5565\/rev\/elcvia.558"},{"key":"21345_CR19","doi-asserted-by":"crossref","unstructured":"Abd El-Rahiem B, Abd El Samie FE, Amin M. (2023) Efficient cancellable multi-biometric recognition system based on deep learning and bio-hashing. Appl Intell 53(2):1792-1806. 2(53):1792\u20131802","DOI":"10.1007\/s10489-021-03153-0"},{"key":"21345_CR20","unstructured":"Omotosho SF (2024) An efficient biometric template transformation protection technique using residue number system"},{"issue":"16","key":"21345_CR21","doi-asserted-by":"publisher","first-page":"23217","DOI":"10.1007\/s11042-022-12655-z","volume":"81","author":"S Rafiq","year":"2022","unstructured":"Rafiq S, Selwal A (2022) Block-XOR based cancellable template protection scheme for multi-instance iris biometric system. Multimed Tools Appl 81(16):23217\u201323235","journal-title":"Multimed Tools Appl"},{"key":"21345_CR22","doi-asserted-by":"publisher","first-page":"8531","DOI":"10.1109\/ACCESS.2023.3239387","volume":"11","author":"JC Bernal-Romero","year":"2023","unstructured":"Bernal-Romero JC, Ramirez-Cortes JM, Rangel-Magdaleno JDJ, Gomez-Gil P, Peregrina-Barreto H, Cruz-Vega I (2023) A review on protection and cancelable techniques in biometric systems. IEEE Access 11:8531\u20138568","journal-title":"IEEE Access"},{"issue":"2","key":"21345_CR23","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.32604\/iasc.2022.024381","volume":"33","author":"A Ayoup","year":"2022","unstructured":"Ayoup A, Khalaf A, Alraddady F, El-Samie FA, El-Shafai W (2022) Cancelable multi-biometric template generation based on dual-tree complex wavelet transform. Intell Autom Soft Comput 33(2):1289\u20131304","journal-title":"Intell Autom Soft Comput"},{"issue":"1","key":"21345_CR24","first-page":"932","volume":"19","author":"L Wang","year":"2024","unstructured":"Wang L, Zhang J, Liu Y, Chen X, Wang Z (2024) TransCBT: Transformer-based cancelable biometric template generation with attention-guided feature fusion. IEEE Trans Inf Forensics Secur 19(1):932\u2013947","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"21345_CR25","unstructured":"Liu H, Yang W, Sun Z, Tan T (2023) DiffusionCBT: Diffusion model-based cancelable biometric templates with provable security guarantees. Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 14872\u201314881"},{"issue":"1","key":"21345_CR26","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TBIOM.2024.3349857","volume":"6","author":"R Chen","year":"2024","unstructured":"Chen R, Damer N, Boutros F, Kirchbuchner F (2024) HybridCBT: A hybrid CNN-Transformer architecture for efficient and robust cancelable biometric template generation. IEEE Trans Biometrics Behav Identity Sci 6(1):118\u2013131","journal-title":"IEEE Trans Biometrics Behav Identity Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21345-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21345-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21345-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T21:33:26Z","timestamp":1769981606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21345-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,1]]},"references-count":26,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["21345"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21345-z","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,1]]},"assertion":[{"value":"22 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest. (Adapted from \"There is no conflict of interest.\")","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest\/Competing Interests"}},{"value":"Not applicable. (This study does not seem to involve human\/animal experiments requiring ethics approval based on the description. Please verify.)","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"Not applicable. (If no individual person\u2019s data is presented. Please verify.)","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"80"}}