{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T04:11:03Z","timestamp":1772943063850,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s13198-025-03000-2","type":"journal-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T09:49:54Z","timestamp":1761040194000},"page":"662-678","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced fingerprint authentication: a deep learning and error correction-based biometric cryptosystem"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7995-0528","authenticated-orcid":false,"given":"Netha Merin","family":"Mathew","sequence":"first","affiliation":[]},{"given":"A.","family":"Muthukumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,21]]},"reference":[{"key":"3000_CR1","doi-asserted-by":"crossref","unstructured":"Aanjanadevi S, Aanjankumar S, Ramela KR, and Palanisamy V (2023) Face attribute convolutional neural network system for data security with improved crypto biometrics. Computer Systems Science & Engineering. 46(1).","DOI":"10.32604\/csse.2023.031893"},{"issue":"2","key":"3000_CR2","first-page":"3515","volume":"74","author":"I Almomani","year":"2023","unstructured":"Almomani I, El-Shafai W, AlKhayer A, Alsumayt A, Aljameel S, Alissa K (2023) Proposed biometric security system based on deep learning and chaos algorithms. Comput Mater Contin 74(2):3515\u20133537","journal-title":"Comput Mater Contin"},{"key":"3000_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109485","volume":"119","author":"R Alrawili","year":"2024","unstructured":"Alrawili R, AlQahtani AAS, Khan MK (2024) Comprehensive survey: Biometric user authentication application, evaluation, and discussion. Comput Electr Eng 119:109485","journal-title":"Comput Electr Eng"},{"key":"3000_CR4","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.comcom.2021.02.002","volume":"170","author":"JA Alzubi","year":"2021","unstructured":"Alzubi JA (2021) Blockchain-based Lamport Merkle digital signature: authentication tool in IoT healthcare. Comput Commun 170:200\u2013208","journal-title":"Comput Commun"},{"issue":"11","key":"3000_CR5","doi-asserted-by":"publisher","first-page":"8566","DOI":"10.1007\/s11227-020-03144-x","volume":"76","author":"OA Alzubi","year":"2020","unstructured":"Alzubi OA, Alzubi JA, Dorgham O, Alsayyed M (2020) Cryptosystem design based on Hermitian curves for IoT security. J Supercomput 76(11):8566\u20138589","journal-title":"J Supercomput"},{"issue":"1","key":"3000_CR6","doi-asserted-by":"publisher","first-page":"5415","DOI":"10.1038\/s41467-019-13055-y","volume":"10","author":"AC Belkina","year":"2019","unstructured":"Belkina AC, Ciccolella CO, Anno R, Halpert R, Spidlen J, Snyder-Cappione JE (2019) Automated optimized parameters for T-distributed stochastic neighbor embedding improve visualization and analysis of large datasets. Nat Commun 10(1):5415","journal-title":"Nat Commun"},{"issue":"2","key":"3000_CR7","doi-asserted-by":"publisher","first-page":"153","DOI":"10.3233\/ICA-210673","volume":"29","author":"B Bordel","year":"2022","unstructured":"Bordel B, Alcarria R, Robles T (2022) Lightweight encryption for short-range wireless biometric authentication systems in Industry 4.0. Integr Comput-Aided Eng 29(2):153\u2013173","journal-title":"Integr Comput-Aided Eng"},{"key":"3000_CR8","unstructured":"Cox A (2014) Palmprint biometric data acquisition: extracting a consistent Region of Interest (ROI) for method evaluation (Master's thesis)."},{"issue":"2","key":"3000_CR9","doi-asserted-by":"publisher","first-page":"e0291084","DOI":"10.1371\/journal.pone.0291084","volume":"19","author":"AS El-Rahman","year":"2024","unstructured":"El-Rahman AS, Alluhaidan AS (2024) Enhanced multimodal biometric recognition systems based on deep learning and traditional methods in smart environments. PLoS ONE 19(2):e0291084","journal-title":"PLoS ONE"},{"issue":"2\u20133","key":"3000_CR10","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.forsciint.2004.11.007","volume":"155","author":"J Gonzalez-Rodriguez","year":"2005","unstructured":"Gonzalez-Rodriguez J, Fierrez-Aguilar J, Ramos-Castro D, Ortega-Garcia J (2005) Bayesian analysis of fingerprint, face and signature evidences with automatic biometric systems. Forensic Sci Int 155(2\u20133):126\u2013140","journal-title":"Forensic Sci Int"},{"key":"3000_CR11","unstructured":"https:\/\/arxiv.org\/abs\/1807.10609"},{"issue":"11","key":"3000_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MC.2012.364","volume":"45","author":"AK Jain","year":"2012","unstructured":"Jain AK, Nandakumar K (2012) Biometric authentication: system security and user privacy. Computer 45(11):87\u201392","journal-title":"Computer"},{"key":"3000_CR13","doi-asserted-by":"crossref","unstructured":"Jogin M, Madhulika MS, Divya GD, Meghana RK, and Apoorva S (2018) Feature extraction using convolution neural networks (CNN) and deep learning. In: 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 2319\u20132323). IEEE","DOI":"10.1109\/RTEICT42901.2018.9012507"},{"key":"3000_CR14","unstructured":"Khan A et al. (2024) Parameters estimation of AC transmission line by an improved moth flame optimization method. IET Generation, Transmission & Distribution."},{"key":"3000_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e38555","author":"K Kumar","year":"2024","unstructured":"Kumar K et al (2024) An improved expeditious meta-heuristic clustering method for classifying student psychological issues with homogeneous characteristics. Heliyon. https:\/\/doi.org\/10.1016\/j.heliyon.2024.e38555","journal-title":"Heliyon"},{"key":"3000_CR16","doi-asserted-by":"crossref","unstructured":"Kuznetsov O, Zakharov D, and Frontoni E (2023) Deep learning-based biometric cryptographic key generation with post-quantum security. Multimedia Tools and Applications. 1\u201330.","DOI":"10.21203\/rs.3.rs-2913502\/v1"},{"issue":"3","key":"3000_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MSECP.2003.1203221","volume":"1","author":"V Matyas","year":"2003","unstructured":"Matyas V, Riha Z (2003) Toward reliable user authentication through biometrics. IEEE Secur Priv 1(3):45\u201349","journal-title":"IEEE Secur Priv"},{"key":"3000_CR18","unstructured":"Modi K and Devaraj L (2022) Advancements in biometric technology with artificial intelligence. arXiv preprint arXiv:2212.13187."},{"issue":"6","key":"3000_CR19","first-page":"37","volume":"9","author":"EO Nwachukwu","year":"2015","unstructured":"Nwachukwu EO (2015) An efficient image preprocessing in an improved intelligent multi biometric authentication system. Int J Appl Inf Syst 9(6):37\u201342","journal-title":"Int J Appl Inf Syst"},{"key":"3000_CR20","doi-asserted-by":"publisher","first-page":"33637","DOI":"10.1007\/s11042-023-14607-7","volume":"82","author":"P Parida","year":"2023","unstructured":"Parida P, Pradhan C, Alzubi JA et al (2023) Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network. Multimed Tools Appl 82:33637\u201333662. https:\/\/doi.org\/10.1007\/s11042-023-14607-7","journal-title":"Multimed Tools Appl"},{"key":"3000_CR21","unstructured":"van de Pavert L (2011) Reed-Solomon encoding and decoding: a visual representation."},{"key":"3000_CR22","doi-asserted-by":"crossref","unstructured":"Qiang W, Ren K, Wu Y, Zou D, and Jin H (2024) DeepFPD: browser fingerprinting detection via deep learning with multimodal learning and attention. IEEE Transactions on Reliability.","DOI":"10.1109\/TR.2024.3355233"},{"key":"3000_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s00607-024-01393-9","volume":"107","author":"I Qiqieh","year":"2025","unstructured":"Qiqieh I, Alzubi J, Alzubi O (2025) DNA cryptography-based security framework for health-cloud data. Computing 107:35. https:\/\/doi.org\/10.1007\/s00607-024-01393-9","journal-title":"Computing"},{"key":"3000_CR24","unstructured":"Said EH (2007) Image segmentation for biometric identification systems."},{"issue":"3","key":"3000_CR25","doi-asserted-by":"publisher","first-page":"703","DOI":"10.3390\/math11030703","volume":"11","author":"A Sedik","year":"2023","unstructured":"Sedik A, El-Latif AA, Wani MA, El-Samie FE, Bauomy NA, Hashad FG (2023) Efficient multi-biometric secure-storage scheme based on deep learning and crypto-mapping techniques. Mathematics 11(3):703","journal-title":"Mathematics"},{"issue":"2","key":"3000_CR26","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1049\/smt2.12023","volume":"15","author":"MS Shaikh","year":"2021","unstructured":"Shaikh MS, Hua C, Jatoi MA, Ansari MM, Qader AA (2021a) Application of grey wolf optimisation algorithm in parameter calculation of overhead transmission line system. IET Sci Meas Technol 15(2):218\u2013231","journal-title":"IET Sci Meas Technol"},{"issue":"3","key":"3000_CR27","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/ICJECE.2021.3069143","volume":"44","author":"MS Shaikh","year":"2021","unstructured":"Shaikh MS, Hua C, Jatoi MA, Ansari MM, Qader AA (2021b) Parameter estimation of AC transmission line considering different bundle conductors using flux linkage technique. IEEE Can J Electr Comput Eng 44(3):313\u2013320","journal-title":"IEEE Can J Electr Comput Eng"},{"key":"3000_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100182","volume":"6","author":"MS Shaikh","year":"2023","unstructured":"Shaikh MS, Raj S, Babu R, Kumar S, Sagrolikar K (2023) A hybrid moth\u2013flame algorithm with particle swarm optimization with application in power transmission and distribution. Decis Anal J 6:100182","journal-title":"Decis Anal J"},{"issue":"1","key":"3000_CR29","doi-asserted-by":"publisher","first-page":"27427","DOI":"10.1038\/s41598-024-78781-w","volume":"14","author":"MS Shaikh","year":"2024","unstructured":"Shaikh MS, Zheng G, Wang C, Wang C, Dong X, Zervoudakis K (2024) A classification system based on improved global exploration and convergence to examine student psychological fitness. Sci Rep 14(1):27427","journal-title":"Sci Rep"},{"key":"3000_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115972","author":"M Sharma","year":"2024","unstructured":"Sharma M et al (2024) A chaotic chimp sine cosine algorithm for optimizing hydrothermal power scheduling. Chaos, Solitons Fractals. https:\/\/doi.org\/10.1016\/j.chaos.2024.115972","journal-title":"Chaos, Solitons Fractals"},{"key":"3000_CR31","doi-asserted-by":"publisher","first-page":"2023019","DOI":"10.1051\/sands\/2023019","volume":"3","author":"G Shen","year":"2024","unstructured":"Shen G, Zhang J (2024) Exploration of transferable deep learning-aided radio frequency fingerprint identification systems. Secur Safety 3:2023019","journal-title":"Secur Safety"},{"key":"3000_CR32","unstructured":"Singh R et al. (2024) Optimizing transmission line parameter estimation with hybrid evolutionary techniques. Mathematics, vol. 12, no. 11."},{"key":"3000_CR33","doi-asserted-by":"crossref","unstructured":"Tarek M (2023) Face templates encryption technique based on random projection and deep learning. Computer Systems Science & Engineering. 44(3).","DOI":"10.32604\/csse.2023.027139"},{"issue":"3","key":"3000_CR34","first-page":"763","volume":"12","author":"J Valisireddy","year":"2024","unstructured":"Valisireddy J, Anjaneyulu GSGN, Mohan LN (2024) Fingerprint recognition based on biometric cryptosystem. J Integr Sci Technol 12(3):763\u2013763","journal-title":"J Integr Sci Technol"},{"key":"3000_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103080","volume":"188","author":"X Wang","year":"2021","unstructured":"Wang X, Yan Z, Zhang R, Zhang P (2021) Attacks and defenses in user authentication systems: a survey. J Netw Comput Appl 188:103080","journal-title":"J Netw Comput Appl"},{"issue":"7","key":"3000_CR36","doi-asserted-by":"publisher","first-page":"4329","DOI":"10.1002\/int.22782","volume":"37","author":"Z Wu","year":"2022","unstructured":"Wu Z, Lv Z, Kang J, Ding W, Zhang J (2022) Fingerprint bio-key generation based on a deep neural network. Int J Intell Syst 37(7):4329\u20134358","journal-title":"Int J Intell Syst"},{"key":"3000_CR37","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-78781-w","author":"H Zhang","year":"2024","unstructured":"Zhang H et al (2024) A classification system based on improved global exploration and convergence to examine student psychological fitness. Sci Rep. https:\/\/doi.org\/10.1038\/s41598-024-78781-w","journal-title":"Sci Rep"},{"issue":"6","key":"3000_CR38","doi-asserted-by":"publisher","first-page":"613","DOI":"10.3390\/e22060613","volume":"22","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Kang J, Zhang X (2020) A cooperative coevolutionary approach to discretization-based feature selection for high-dimensional data. Entropy 22(6):613","journal-title":"Entropy"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-03000-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-03000-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-03000-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T12:22:55Z","timestamp":1772886175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-03000-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,21]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["3000"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-03000-2","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,21]]},"assertion":[{"value":"4 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research does not involve any human participants and\/or animals. Human fingerprints are obtained from sokoto coventry fingerprint dataset which is available online.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animal participants"}},{"value":"Here the work entitled\u201dEnhanced Fingerprint Authentication: A Deep Learning and Error-correction based biometric cryptosystem\u201d approach to fingerprint identification is mostly based on feature extraction techniques mixed with error correction approaches to improve accuracy and reliability. This study presents a novel biometric cryptosystem that combines deep learning (DL) with Reed-Solomon (RS) error-correcting codes to increase the reliability of fingerprint-based identification, utilizing the Sokoto Coventry Fingerprint (SOCOFing) dataset.There is no risk involved in this work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}