{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T11:47:01Z","timestamp":1747655221081,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11277-021-08342-1","type":"journal-article","created":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T04:35:53Z","timestamp":1615523753000},"page":"2517-2537","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Lightweight Bio-Chaos Crypt to Enhance the Security of Biometric Images in Internet of Things Applications"],"prefix":"10.1007","volume":"119","author":[{"given":"Rajendran","family":"Sujarani","sequence":"first","affiliation":[]},{"given":"Doraipandian","family":"Manivannan","sequence":"additional","affiliation":[]},{"given":"Ramachandran","family":"Manikandan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3820-2081","authenticated-orcid":false,"given":"Bhaskar","family":"Vidhyacharan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,12]]},"reference":[{"key":"8342_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.024","author":"H Hamidi","year":"2018","unstructured":"Hamidi, H. (2018). An approach to develop the smart health using internet of things and authentication based on biometric technology. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2018.09.024","journal-title":"Future Generation Computer Systems"},{"key":"8342_CR2","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.sysarc.2018.12.005","volume":"97","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A. K., Hussain, R., Succi, G., & Rodrigues, J. J. P. C. (2019). Authentication in cloud-driven IoT-based big data environment: Survey and outlook. Journal of Systems Architecture, 97, 185\u2013196. https:\/\/doi.org\/10.1016\/j.sysarc.2018.12.005","journal-title":"Journal of Systems Architecture"},{"key":"8342_CR3","doi-asserted-by":"publisher","unstructured":"Obaidat, M. S., Rana, S. P., & Maitra, T. (2018). Biometric Security and Internet of Things (IoT) Chapter 19 Biometric Security and Internet of Things (IoT). https:\/\/doi.org\/10.1007\/978-3-319-98734-7","DOI":"10.1007\/978-3-319-98734-7"},{"key":"8342_CR4","unstructured":"El, H. A., & Hosni, M. M. (2019). Secure IoT communications for smart healthcare monitoring system, 1\u201314."},{"key":"8342_CR5","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2019.01.007","volume":"83","author":"S Gupta","year":"2019","unstructured":"Gupta, S., Buriro, A., & Crispo, B. (2019). DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. Computers & Security, 83, 122\u2013139. https:\/\/doi.org\/10.1016\/j.cose.2019.01.007","journal-title":"Computers & Security"},{"key":"8342_CR6","doi-asserted-by":"publisher","unstructured":"Jain, A. K., Nandakumar, K., & Nagar, A. (2008). Biometric Template Security, 2008. https:\/\/doi.org\/10.1155\/2008\/579416","DOI":"10.1155\/2008\/579416"},{"key":"8342_CR7","doi-asserted-by":"publisher","first-page":"25487","DOI":"10.1007\/s11042-019-7617-1","volume":"78","author":"P Punithavathi","year":"2019","unstructured":"Punithavathi, P., & Geetha, S. (2019). Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications. Multimedia Tools and Applications, 78, 25487\u201325514.","journal-title":"Multimedia Tools and Applications"},{"key":"8342_CR8","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.amc.2006.07.030","volume":"185","author":"F Han","year":"2007","unstructured":"Han, F. (2007). Fingerprint images encryption via multi-scroll chaotic attractors. Applied Mathematics and Computation, 185, 931\u2013939. https:\/\/doi.org\/10.1016\/j.amc.2006.07.030","journal-title":"Applied Mathematics and Computation"},{"issue":"1","key":"8342_CR9","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.future.2010.11.012","volume":"28","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar, G., Wu, J., & Raman, B. (2012). Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission. Future Generation Computer Systems, 28(1), 254\u2013267. https:\/\/doi.org\/10.1016\/j.future.2010.11.012","journal-title":"Future Generation Computer Systems"},{"key":"8342_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0323-3","author":"G Bhatnagar","year":"2014","unstructured":"Bhatnagar, G., & Wu, Q. M. J. (2014). Enhancing the transmission security of biometric images using chaotic encryption. Multimedia Systems. https:\/\/doi.org\/10.1007\/s00530-013-0323-3","journal-title":"Multimedia Systems"},{"issue":"1","key":"8342_CR11","first-page":"55","volume":"13","author":"A Studies","year":"2013","unstructured":"Studies, A., & Playitas, Z. (2013). Double hyperchaotic encryption for security in biometric systems. Nonlinear Dynamics and Systems Theory, 13(1), 55\u201368.","journal-title":"Nonlinear Dynamics and Systems Theory"},{"key":"8342_CR12","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.sigpro.2015.01.024","volume":"113","author":"H Hsiao","year":"2015","unstructured":"Hsiao, H., & Lee, J. (2015). Fingerprint image cryptography based on multiple chaotic systems. Signal Processing, 113, 169\u2013181. https:\/\/doi.org\/10.1016\/j.sigpro.2015.01.024","journal-title":"Signal Processing"},{"key":"8342_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4938-9","author":"K Loukhaoukha","year":"2018","unstructured":"Loukhaoukha, K., Refaey, A., Zebbiche, K., & Shami, A. (2018). Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-017-4938-9","journal-title":"Multimedia Tools and Applications"},{"key":"8342_CR14","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1016\/j.procs.2018.10.387","volume":"143","author":"S Rajendran","year":"2018","unstructured":"Rajendran, S., & Doraipandian, M. (2018). Biometric template security triggered by two dimensional logistic sine map. Procedia Computer Science, 143, 794\u2013803.","journal-title":"Procedia Computer Science"},{"issue":"7","key":"8342_CR15","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.jksuci.2018.09.006","volume":"32","author":"NA Hikal","year":"2020","unstructured":"Hikal, N. A., & Eid, M. M. (2020). A new approach for palmprint image encryption based on hybrid chaotic maps. Journal of King Saud University - Computer and Information Sciences, 32(7), 870\u2013882.","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"8342_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.optlaseng.2015.03.007","volume":"71","author":"R Enayatifar","year":"2015","unstructured":"Enayatifar, R., Sadaei, H. J., Abdullah, A. H., Lee, M., & Isnin, I. F. (2015). A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Optics and Lasers in Engineering, 71, 33\u201341. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.03.007","journal-title":"Optics and Lasers in Engineering"},{"issue":"8","key":"8342_CR17","doi-asserted-by":"publisher","first-page":"4363","DOI":"10.1007\/s11042-015-2479-7","volume":"75","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Wang, J., Fan, J., & Gong, L. (2016). Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences. Multimedia Tools and Applications, 75(8), 4363\u20134382. https:\/\/doi.org\/10.1007\/s11042-015-2479-7","journal-title":"Multimedia Tools and Applications"},{"issue":"November 2016","key":"8342_CR18","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.image.2016.12.007","volume":"52","author":"X Chai","year":"2017","unstructured":"Chai, X., Gan, Z., Yang, K., Chen, Y., & Liu, X. (2017). An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Processing\u202f: Image Communication, 52(November 2016), 6\u201319. https:\/\/doi.org\/10.1016\/j.image.2016.12.007","journal-title":"Signal Processing : Image Communication"},{"issue":"20","key":"8342_CR19","doi-asserted-by":"publisher","first-page":"27017","DOI":"10.1007\/s11042-018-5902-z","volume":"77","author":"A Girdhar","year":"2018","unstructured":"Girdhar, A., & Kumar, V. (2018). A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimedia Tools and Applications, 77(20), 27017\u201327039. https:\/\/doi.org\/10.1007\/s11042-018-5902-z","journal-title":"Multimedia Tools and Applications"},{"issue":"September","key":"8342_CR20","doi-asserted-by":"publisher","first-page":"165661","DOI":"10.1016\/j.ijleo.2020.165661","volume":"224","author":"DN Yoosefian","year":"2020","unstructured":"Yoosefian, D. N., Safdarian, N., & Hoseini Zadeh, S. A. (2020). New method for fingerprint images encryption using DNA sequence and chaotic tent map. Optik, 224(September), 165661. https:\/\/doi.org\/10.1016\/j.ijleo.2020.165661","journal-title":"Optik"},{"issue":"4","key":"8342_CR21","first-page":"2077","volume":"7","author":"S Vijayakumar","year":"2020","unstructured":"Vijayakumar, S., Jansi, M., Lavanya, D., & Lavanya Sree, V. (2020). Delay efficient genetic algorithm with DNA based cryptography for fingerprint authentication. European Journal of Molecular and Clinical Medicine, 7(4), 2077\u20132080.","journal-title":"European Journal of Molecular and Clinical Medicine"},{"key":"8342_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08396-1","author":"S Rajendran","year":"2020","unstructured":"Rajendran, S., Krithivasan, K., & Doraipandian, M. (2020). Fast pre-processing hex Chaos triggered color image cryptosystem. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-019-08396-1","journal-title":"Multimedia Tools and Applications"},{"key":"8342_CR23","doi-asserted-by":"publisher","unstructured":"Soni, R., Johar, A., & Soni, V. (2013). An encryption and decryption algorithm for image based on DNA. In Proceedings\u20142013 international conference on communication systems and network technologies, CSNT 2013 (pp. 478\u2013481). https:\/\/doi.org\/10.1109\/CSNT.2013.105","DOI":"10.1109\/CSNT.2013.105"},{"issue":"23","key":"8342_CR24","doi-asserted-by":"publisher","first-page":"6276","DOI":"10.1016\/j.ijleo.2013.05.009","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang, Q., & Wei, X. (2013). A novel couple images encryption algorithm based on DNAsubsequence operation and chaotic system. Optik, 124(23), 6276\u20136281. https:\/\/doi.org\/10.1016\/j.ijleo.2013.05.009","journal-title":"Optik"},{"key":"8342_CR25","unstructured":"Biometrics Ideal Test. (2020). http:\/\/biometrics.idealtest.org"},{"key":"8342_CR26","doi-asserted-by":"publisher","unstructured":"Sun, Z., Tan, T., Wang, Y., & Li, S. Z. (2005). Ordinal palmprint represention for personal identification [represention read representation]. In IEEE computer society conference on computer vision and pattern recognition (CVPR\u201905), San Diego, CA, USA, (Vol. 1, pp. 279\u2013284). https:\/\/doi.org\/10.1109\/CVPR.2005.267","DOI":"10.1109\/CVPR.2005.267"},{"key":"8342_CR27","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","volume":"141","author":"J Wu","year":"2017","unstructured":"Wu, J., Liao, X., & Yang, B. (2017). Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Processing, 141, 109\u2013124. https:\/\/doi.org\/10.1016\/j.sigpro.2017.04.006","journal-title":"Signal Processing"},{"key":"8342_CR28","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai, X., Fu, X., Gan, Z., Lu, Y., & Chen, Y. (2019). A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 155, 44\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","journal-title":"Signal Processing"},{"issue":"December 2018","key":"8342_CR29","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.ijleo.2018.12.178","volume":"181","author":"C Han","year":"2019","unstructured":"Han, C. (2019). An image encryption algorithm based on modified logistic chaotic map. Optik, 181(December 2018), 779\u2013785. https:\/\/doi.org\/10.1016\/j.ijleo.2018.12.178","journal-title":"Optik"},{"key":"8342_CR30","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu, J., Liao, X., & Yang, B. (2018). Image encryption using 2D H\u00e9non-Sine map and DNA approach. Signal Processing, 153, 11\u201323. https:\/\/doi.org\/10.1016\/j.sigpro.2018.06.008","journal-title":"Signal Processing"},{"key":"8342_CR31","doi-asserted-by":"publisher","first-page":"24701","DOI":"10.1007\/s11042-018-5669-2","volume":"77","author":"G Maddodi","year":"2018","unstructured":"Maddodi, G., Awad, A., Awad, D., Awad, M., & Lee, B. (2018). A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding. Multimedia Tools and Applications, 77, 24701\u201324725.","journal-title":"Multimedia Tools and Applications."},{"key":"8342_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2019.164000","author":"A Babaei","year":"2020","unstructured":"Babaei, A., Motameni, H., & Enayatifar, R. (2020). A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence. Optik. https:\/\/doi.org\/10.1016\/j.ijleo.2019.164000","journal-title":"Optik"},{"issue":"15","key":"8342_CR33","doi-asserted-by":"publisher","first-page":"19193","DOI":"10.1007\/s11042-017-5391-5","volume":"77","author":"C Li","year":"2018","unstructured":"Li, C., Luo, G., & Li, C. (2018). A parallel image encryption algorithm based on chaotic Duffing oscillators. Multimedia Tools and Applications, 77(15), 19193\u201319208. https:\/\/doi.org\/10.1007\/s11042-017-5391-5","journal-title":"Multimedia Tools and Applications"},{"key":"8342_CR34","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.compbiomed.2015.10.011","volume":"67","author":"R Karaki\u015f","year":"2015","unstructured":"Karaki\u015f, R., G\u00fcler, I., \u00c7apraz, I., & Bilir, E. (2015). A novel fuzzy logic-based image steganography method to ensure medical data security. Computers in Biology and Medicine, 67, 172\u2013183. https:\/\/doi.org\/10.1016\/j.compbiomed.2015.10.011","journal-title":"Computers in Biology and Medicine"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08342-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08342-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08342-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T17:30:57Z","timestamp":1626715857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08342-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,12]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["8342"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08342-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,3,12]]},"assertion":[{"value":"19 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}