{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:31:17Z","timestamp":1759332677178,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["ECR\/2017\/000027"],"award-info":[{"award-number":["ECR\/2017\/000027"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s12652-019-01437-5","type":"journal-article","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T17:02:58Z","timestamp":1567616578000},"page":"1495-1509","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A fingerprint based crypto-biometric system for secure communication"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7836-2683","authenticated-orcid":false,"given":"Rudresh","family":"Dwivedi","sequence":"first","affiliation":[]},{"given":"Somnath","family":"Dey","sequence":"additional","affiliation":[]},{"given":"Mukul Anand","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Apurv","family":"Goel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,4]]},"reference":[{"key":"1437_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.comnet.2018.06.001","volume":"142","author":"D Akdogan","year":"2018","unstructured":"Akdogan D, Altop DK, Eskandarian L, Levi A (2018) Secure key agreement protocols: Pure biometrics and cancelable biometrics. Comput Netw 142:33\u201348","journal-title":"Comput Netw"},{"issue":"08","key":"1437_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(08):2129\u20132151","journal-title":"Int J Bifurc Chaos"},{"issue":"3","key":"1437_CR3","first-page":"226","volume":"7","author":"S Barman","year":"2015","unstructured":"Barman S, Samanta D, Chattopadhyay S (2015a) Approach to cryptographic key generation from fingerprint biometrics. Int J Biom 7(3):226\u2013248","journal-title":"Int J Biom"},{"issue":"1","key":"1437_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s13635-015-0020-1","volume":"2015","author":"S Barman","year":"2015","unstructured":"Barman S, Samanta D, Chattopadhyay S (2015b) Fingerprint-based crypto-biometric system for network security. EURASIP J Inf Secur 2015(1):3","journal-title":"EURASIP J Inf Secur"},{"key":"1437_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.compeleceng.2016.11.017","volume":"64","author":"S Barman","year":"2017","unstructured":"Barman S, Chattopadhyay S, Samanta D, Panchal G (2017) A novel secure key-exchange protocol using biometrics of the sender and receiver. Comput Electr Eng 64:65\u201382","journal-title":"Comput Electr Eng"},{"key":"1437_CR6","doi-asserted-by":"publisher","first-page":"38578","DOI":"10.1109\/ACCESS.2018.2854798","volume":"6","author":"S Barman","year":"2018","unstructured":"Barman S, Das AK, Samanta D, Chattopadhyay S, Rodrigues JJPC, Park Y (2018) Provably secure multi-server authentication protocol using fuzzy commitment. IEEE Access 6:38578\u201338594","journal-title":"IEEE Access"},{"key":"1437_CR7","doi-asserted-by":"publisher","first-page":"12557","DOI":"10.1109\/ACCESS.2019.2893185","volume":"7","author":"S Barman","year":"2019","unstructured":"Barman S, Shum HPH, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme. IEEE Access 7:12557\u201312574","journal-title":"IEEE Access"},{"key":"1437_CR8","doi-asserted-by":"crossref","unstructured":"Chen B, Chandran V (2007) Biometric based cryptographic key generation from faces. In: Proceedings of the 9th IEEE biennial conference of the Australian pattern recognition society on digital image computing techniques and applications, Washington, DC, USA, pp 394\u2013401","DOI":"10.1109\/DICTA.2007.4426824"},{"key":"1437_CR9","unstructured":"Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcard based fingerprint authentication. In: Proceedings of the ACM SIGMM workshop on biometrics methods and applications, Berkeley, California, USA, pp 45\u201352"},{"issue":"4","key":"1437_CR10","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1108\/09685220210436949","volume":"10","author":"H Feng","year":"2002","unstructured":"Feng H, Wah CC (2002) Private key generation from on-line handwritten signatures. Inf Manag Comput Secur 10(4):159\u2013164","journal-title":"Inf Manag Comput Secur"},{"key":"1437_CR11","doi-asserted-by":"crossref","unstructured":"Freier A, Karlton P, Kocher P (2011) The secure sockets layer (SSL) protocol version 3.0. Request for comments: 6101","DOI":"10.17487\/rfc6101"},{"issue":"9","key":"1437_CR12","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao F, Anderson R, Daugman J (2006) Combining crypto with biometrics effectively. IEEE Trans Comput 55(9):1081\u20131088","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"1437_CR13","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1007\/s12652-017-0516-2","volume":"9","author":"Q Jiang","year":"2018","unstructured":"Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput 9(4):1061\u20131073","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1437_CR14","first-page":"1327","volume":"4","author":"Z Jin","year":"2010","unstructured":"Jin Z, Teoh ABJ, Ong TS, Tee C (2010) A revocable fingerprint template for security and privacy preserving. KSII Trans Int Inf Syst 4:1327\u20131342","journal-title":"KSII Trans Int Inf Syst"},{"issue":"2","key":"1437_CR15","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels A, Sudan M (2006) A fuzzy vault scheme. Des Code Cryptogr 38(2):237\u2013257","journal-title":"Des Code Cryptogr"},{"key":"1437_CR16","doi-asserted-by":"crossref","unstructured":"Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on computer and communications security, New York, NY, USA, pp 28\u201336","DOI":"10.1145\/319709.319714"},{"key":"1437_CR18","doi-asserted-by":"crossref","unstructured":"Kanade S, Camara D, Krichen E, Petrovska-Delacretaz D, Dorizzi B (2008) Three factor scheme for biometric-based cryptographic key regeneration using iris. In: 6th Biometrics Symposium. pp 59\u201364","DOI":"10.1109\/BSYM.2008.4655523"},{"key":"1437_CR19","doi-asserted-by":"crossref","unstructured":"Kanade S, Petrovska-Delacretaz D, Dorizzi B (2010) Generating and sharing biometrics based session keys for secure cryptographic applications. In: Fourth IEEE international conference on biometrics: theory, applications and systems (BTAS). pp 1\u20137","DOI":"10.1109\/BTAS.2010.5634545"},{"key":"1437_CR17","unstructured":"Kanade SG, Petrovska-Delacretaz D, Dorizzi B (2012) A novel crypto-biometric scheme for establishing secure communication sessions between two clients. In: Proceedings of the IEEE international conference of biometrics special interest group (BIOSIG), Darmstadt, Germany, pp 1\u20136"},{"key":"1437_CR20","doi-asserted-by":"crossref","unstructured":"Kivinen T (2003) More modular exponential (MODP) Diffie\u2013Hellman groups for internet key exchange (IKE). Request for Comments (RFC) 3526","DOI":"10.17487\/rfc3526"},{"key":"1437_CR21","doi-asserted-by":"crossref","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) FVC2002: second fingerprint verification competition. In: 16th IEEE international conference on pattern recognition, vol 3, Quebec, Canada, pp 811\u2013814","DOI":"10.1109\/ICPR.2002.1048144"},{"key":"1437_CR22","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25948-0_1","volume-title":"International conference on biometric authentication","author":"D Maio","year":"2004","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2004) FVC2004: third fingerprint verification competition. In: Zhang D, Jain AK (eds) International conference on biometric authentication. Lecture notes in computer science, vol 3072. Springer, Berlin, Heidelberg, pp 1\u20137"},{"key":"1437_CR23","unstructured":"Masek L (2003) Recognition of human iris patterns for biometric identification. Tech. rep., Univ. of Western Australia"},{"key":"1437_CR24","doi-asserted-by":"crossref","unstructured":"Monrose F, Reiter MK, Li Q, Wetzel S (2001) Cryptographic key generation from voice. In: Proceedings of IEEE symposium on security and privacy, Oakland, CA, USA, pp 202\u2013213","DOI":"10.1109\/SECPRI.2001.924299"},{"key":"1437_CR25","unstructured":"Murillo-Escobar MA, Abundiz-P\u00e9rez F, Cruz-Hern\u00e1ndez C, L\u00f3pez-Guti\u00e9rrez RM (2014) A novel symmetric text encryption algorithm based on logistic map. In: Proceedings of the international conference on communications, signal processing and computers, pp 49\u201353"},{"issue":"21","key":"1437_CR26","doi-asserted-by":"publisher","first-page":"8198","DOI":"10.1016\/j.eswa.2015.06.035","volume":"42","author":"M Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar M, Cruz-Hern\u00e1ndez C, Abundiz-P\u00e9rez F, L\u00f3pez-Guti\u00e9rrez R (2015) A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst Appl 42(21):8198\u20138211","journal-title":"Expert Syst Appl"},{"key":"1437_CR27","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.compeleceng.2018.01.028","volume":"69","author":"G Panchal","year":"2018","unstructured":"Panchal G, Samanta D (2018) A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security. Comput Electr Eng 69:461\u2013478","journal-title":"Comput Electr Eng"},{"key":"1437_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4528-x","author":"G Panchal","year":"2017","unstructured":"Panchal G, Samanta D, Barman S (2017) Biometric-based cryptography for digital content protection without any key storage. Multimed Tools Appl. \nhttps:\/\/doi.org\/10.1007\/s11042-017-4528-x","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"1437_CR29","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561\u2013572","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"6","key":"1437_CR30","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1049\/iet-cvi.2010.0176","volume":"5","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb C, Uhl A (2011a) Context-based biometric key generation for iris. IET Comput Vis 5(6):389\u2013397","journal-title":"IET Comput Vis"},{"issue":"1","key":"1437_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/1687-417X-2011-3","volume":"2011","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb C, Uhl A (2011b) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):3","journal-title":"EURASIP J Inf Secur"},{"issue":"2","key":"1437_CR32","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s12652-018-0716-4","volume":"10","author":"AG Reddy","year":"2019","unstructured":"Reddy AG, Das AK, Odelu V, Ahmad A, Shin JS (2019) A privacy preserving three-factor authenticated key agreement protocol for client-server environment. J Ambient Intell Humaniz Comput 10(2):661\u2013680","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1437_CR33","unstructured":"Soutar C, Roberge D, Stoianov A, Gilroy R, Bhagavatula V (1998) Method for secure key management using a biometric. WO Patent App. PCT\/CA1998\/000,362"},{"issue":"4","key":"1437_CR34","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1007\/s12652-017-0474-8","volume":"9","author":"J Srinivas","year":"2018","unstructured":"Srinivas J, Mishra D, Mukhopadhyay S, Kumari S (2018) Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J Ambient Intell Humaniz Comput 9(4):875\u2013895","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1437_CR35","volume-title":"Cryptography and network security: principles and practices","author":"W Stallings","year":"2006","unstructured":"Stallings W (2006) Cryptography and network security: principles and practices. Pearson Education, Chennai"},{"issue":"6","key":"1437_CR36","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(6):948\u2013960","journal-title":"Proc IEEE"},{"key":"1437_CR37","unstructured":"Verifinger S (2010) VeriFinger SDK, fingerprint recognition technology, Neuro technology"},{"key":"1437_CR38","unstructured":"Watson CI, Wilson C (1992) NIST special database 4. In: Fingerprint database. National Institute of Standards and Technology, pp 1\u201314"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01437-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01437-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01437-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T23:32:43Z","timestamp":1599089563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01437-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,4]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1437"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01437-5","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2019,9,4]]},"assertion":[{"value":"28 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}