{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T15:40:40Z","timestamp":1776872440778,"version":"3.51.2"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T00:00:00Z","timestamp":1776816000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T00:00:00Z","timestamp":1776816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21555-5","type":"journal-article","created":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T14:47:16Z","timestamp":1776869236000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving fingerprint authentication based on cancelable biometrics"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7861-9442","authenticated-orcid":false,"given":"Ayesha S.","family":"Shaikh","sequence":"first","affiliation":[]},{"given":"Vibha D.","family":"Patel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,22]]},"reference":[{"key":"21555_CR1","doi-asserted-by":"crossref","unstructured":"Misra, G., Hazela, B., Chaurasia, B. (2024). Privacy Preserving Authentication of IoMT in Cloud Computing. EAI Endorsed Transactions on Internet of Things, 10","DOI":"10.4108\/eetiot.6235"},{"key":"21555_CR2","doi-asserted-by":"crossref","unstructured":"A. K. Jain, K. Nandakumar, and A. Nagar, (2008) Biometric template security. EURASIP Journal on advances in signal processing","DOI":"10.1155\/2008\/579416"},{"key":"21555_CR3","doi-asserted-by":"crossref","unstructured":"Shaikh, Ayesha S., and Vibha D. Patel. (2021) \"Significance of the Transition to Biometric Template Protection: Explore the Future.\" International Journal of Image and Graphics","DOI":"10.1142\/S021946782150025X"},{"key":"21555_CR4","doi-asserted-by":"crossref","unstructured":"A. K. Jain, K. Nandakumar, and A. Ross, (2016) 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters","DOI":"10.1016\/j.patrec.2015.12.013"},{"key":"21555_CR5","unstructured":"Joshi, Mahesh, Bodhisatwa Mazumdar, and Somnath Dey. (2018) \"Security vulnerabilities against fingerprint biometric system.\" arXiv preprint arXiv:1805.07116"},{"key":"21555_CR6","doi-asserted-by":"crossref","unstructured":"Nandakumar, K. (2010, December). A fingerprint cryptosystem based on minutiae phase spectrum. In 2010 IEEE International Workshop on Information Forensics and Security (pp. 1-6). IEEE","DOI":"10.1109\/WIFS.2010.5711456"},{"key":"21555_CR7","doi-asserted-by":"crossref","unstructured":"Rathgeb, Christian, et al. (2014) \"On application of bloom filters to iris biometrics.\" IET Biometrics","DOI":"10.1049\/iet-bmt.2013.0049"},{"key":"21555_CR8","doi-asserted-by":"crossref","unstructured":"Lee, Chulhan, and Jaihie Kim. (2010) \"Cancelable fingerprint templates using minutiae-based bit-strings.\" Journal of network and computer applications","DOI":"10.1016\/j.jnca.2009.12.011"},{"key":"21555_CR9","doi-asserted-by":"crossref","unstructured":"Dwivedi, Rudresh, and Somnath Dey. (2018) \"A non-invertible cancelable fingerprint template generation based on ridge feature transformation.\" arXiv preprint arXiv:1805.10853","DOI":"10.1117\/1.JEI.27.5.053031"},{"key":"21555_CR10","doi-asserted-by":"crossref","unstructured":"Dong, Xingbo, et al. (2020) \"Open-set face identification with index-of-max hashing by learning.\" Pattern Recognition 103","DOI":"10.1016\/j.patcog.2020.107277"},{"key":"21555_CR11","doi-asserted-by":"crossref","unstructured":"Z. Jin, J. Y. Hwang, Y.-L. Lai, S. Kim, and A. B. J. Teoh, (2018) Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing,. IEEE Transactions on Information Forensics and Security, vol. 13","DOI":"10.1109\/TIFS.2017.2753172"},{"key":"21555_CR12","doi-asserted-by":"crossref","unstructured":"Ratha, Nalini K., et al. (2007) \"Generating cancelable fingerprint templates.\" IEEE Transactions on pattern analysis and machine intelligence","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"21555_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.patcog.2016.02.024","volume":"56","author":"Z Jin","year":"2016","unstructured":"Jin Z, Teoh ABJ, Goi BM, Tay YH (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 56:50\u201362","journal-title":"Pattern Recogn"},{"key":"21555_CR14","doi-asserted-by":"crossref","unstructured":"Maltoni, D., Maio, D., Jain, A. K., Prabhakar, S. (2009). Handbook of fingerprint recognition. Springer Science and Business Media","DOI":"10.1007\/978-1-84882-254-2"},{"key":"21555_CR15","doi-asserted-by":"crossref","unstructured":"Jin, Zhe, et al. (2010) \"A revocable fingerprint template for security and privacy preserving.\" KSII Transactions on Internet and Information Systems (TIIS)","DOI":"10.3837\/tiis.2010.12.020"},{"key":"21555_CR16","doi-asserted-by":"crossref","unstructured":"Nagar, A., Rane, S., Vetro, A. (2010, March). Privacy and security of features extracted from minutiae aggregates. In 2010 IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 1826-1829). IEEE","DOI":"10.1109\/ICASSP.2010.5495392"},{"issue":"12","key":"21555_CR17","doi-asserted-by":"publisher","first-page":"4129","DOI":"10.1016\/j.patcog.2012.05.004","volume":"45","author":"S Wang","year":"2012","unstructured":"Wang S, Hu J (2012) Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach. Pattern Recogn 45(12):4129\u20134137","journal-title":"Pattern Recogn"},{"key":"21555_CR18","doi-asserted-by":"crossref","unstructured":"Prasad, Munaga VNK, et al. (2014) \"Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates.\" International Journal of Pattern Recognition and Artificial Intelligence","DOI":"10.1142\/S0218001414560138"},{"key":"21555_CR19","doi-asserted-by":"crossref","unstructured":"Jin, A. T. B., Ling, D. N. C., Goh, A. (2004). Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition, 37","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"21555_CR20","unstructured":"Teoh, A. B. J., Ngo, D. C. L. (2006). Cancellable biometrics realization through biophasoring. In Proceedings of 9th IEEE international conference on control, automation, robotics and vision"},{"key":"21555_CR21","doi-asserted-by":"crossref","unstructured":"Murakami, Takao, et al. (2019) \"Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification.\" Pattern Recognition Letters 126","DOI":"10.1016\/j.patrec.2018.04.005"},{"key":"21555_CR22","doi-asserted-by":"crossref","unstructured":"Pintelas, E., Livieris, I. E., Pintelas, P. E. (2021). A Convolutional Autoencoder Topology for Classification in High-Dimensional Noisy Image Datasets. Sensors (Basel, Switzerland), 21(22), 7731. https:\/\/doi.org\/10.3390\/s21227731","DOI":"10.3390\/s21227731"},{"key":"21555_CR23","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/LSP.2020.3030533","volume":"27","author":"RS Kuzu","year":"2020","unstructured":"Kuzu RS, Maiorana E, Campisi P (2020) Vein-based biometric verification using densely-connected convolutional autoencoder. IEEE Signal Process Lett 27:1869\u20131873","journal-title":"IEEE Signal Process Lett"},{"issue":"24","key":"21555_CR24","doi-asserted-by":"publisher","first-page":"8948","DOI":"10.3390\/app10248948","volume":"10","author":"M Kaji","year":"2020","unstructured":"Kaji M, Parvizian J, van de Venn HW (2020) Constructing a reliable health indicator for bearings using convolutional autoencoder and continuous wavelet transform. Appl Sci 10(24):8948","journal-title":"Appl Sci"},{"key":"21555_CR25","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.patcog.2016.01.001","volume":"54","author":"S Wang","year":"2016","unstructured":"Wang S, Hu J (2016) A blind system identification approach to cancelable fingerprint templates. Pattern Recogn 54:14\u201322","journal-title":"Pattern Recogn"},{"key":"21555_CR26","doi-asserted-by":"crossref","unstructured":"Abe, N., Yamada, S., Shinzaki, T. (2015). Irreversible fingerprint template using minutiae relation code with bloom filter. In 2015 IEEE 7th international conference on biometrics theory, applications and systems (BTAS) (pp. 1-7). IEEE","DOI":"10.1109\/BTAS.2015.7358770"},{"key":"21555_CR27","doi-asserted-by":"publisher","first-page":"01","DOI":"10.1142\/S0219467818500067","volume":"18","author":"B Choudhury","year":"2018","unstructured":"Choudhury B et al (2018) A survey on biometrics and cancelable biometrics systems. International Journal of Image and Graphics 18:01","journal-title":"International Journal of Image and Graphics"},{"key":"21555_CR28","doi-asserted-by":"crossref","unstructured":"Wang, Song, Guang Deng, and Jiankun Hu. (2017) \"A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations.\" Pattern Recognition","DOI":"10.1016\/j.patcog.2016.08.017"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21555-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21555-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21555-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T14:47:32Z","timestamp":1776869252000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21555-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,22]]},"references-count":28,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2026,5]]}},"alternative-id":["21555"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21555-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,22]]},"assertion":[{"value":"6 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose, nor conflicting interests, nor competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}],"article-number":"457"}}