{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T05:57:06Z","timestamp":1776837426819,"version":"3.51.2"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Kafr El Shiekh University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Security of Internet-of-Medical-Things (IoMT) networks has evolved as a vital issue in recent years. The IoMT networks are designed to link patients with caregivers. All reports, data, and medical signals are transferred over these networks. Hence, these networks require robust and secure access strategies for patients to send their vital data or reports. Hence, hacking of these networks may lead to harmful effects on patients. One of the vulnerable points to hacking in these networks is the access point. Access to these networks could be performed with biometrics. The popular biometric traits for this purpose are biomedical signals such as Electrocardiogram (ECG) signals, as they are continuously monitored and measured for patients. A common thread between all biometric authentication systems is the possibility of losing the biometric traits forever if hacking attempts manage to concur the biometric template storage. A new trend in the field of biometric authentication is to avoid the utilization of original biometrics in access control processes. A possible alternative is to use cancelable biometrics instead. Cancelable biometrics can be generated through encryption schemes or non-invertible transforms. This paper adopts both strategies in a unified framework for cancelable ECG signal recognition that can be used in the access step of IoMT networks. The proposed framework begins with applying a non-invertible transformation on the ECG signals through fuzzy logic to change the dynamic range of the signals. As this process is non-invertible in nature, it prevents the recovery of the original ECG signals from the processed versions, which is the main target of cancelable biometric systems. After that, lightweight encryption through XOR operation with user-specific patterns is implemented. Here, the high complexity of full encryption schemes that need a large processing burden is eliminated. The addition of the encryption stage enhances the security of cancelable biometric traits, allowing a hybrid nature of the proposed cancelable biometric framework through the merging of non-invertible transforms and encryption algorithms. Moreover, an FPGA hardware implementation is introduced for real implementation of the proposed ECG-based cancelable biometric recognition framework. This hardware can accompany the user to allow access of the IoMT network when requested. Experimental results show a promising performance of the proposed framework with a large Area under the Receiver Operating Characteristic curve (AROC) of 99.5% and an Equal Error Rate (EER) of 0.058%.<\/jats:p>","DOI":"10.1007\/s40747-023-01149-6","type":"journal-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T08:01:59Z","timestamp":1690272119000},"page":"435-454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Security enhancement of the access control scheme in IoMT applications based on fuzzy logic processing and lightweight encryption"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7789-9195","authenticated-orcid":false,"given":"Ghada M.","family":"El-Banby","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6211-9352","authenticated-orcid":false,"given":"Lamiaa A. Abou","family":"Elazm","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"Walid","family":"El-Shafai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4542-323X","authenticated-orcid":false,"given":"Nirmeen A.","family":"El-Bahnasawy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8749-9518","authenticated-orcid":false,"given":"Fathi E. Abd","family":"El-Samie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2456-695X","authenticated-orcid":false,"given":"Atef Abou","family":"Elazm","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7242-5281","authenticated-orcid":false,"given":"Ali I.","family":"Siam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,25]]},"reference":[{"key":"1149_CR1","doi-asserted-by":"publisher","first-page":"8707","DOI":"10.1109\/JIOT.2020.3045653","volume":"8","author":"A Ghubaish","year":"2021","unstructured":"Ghubaish A, Salman T, Zolanvari M et al (2021) Recent advances in the internet-of-medical-things (IoMT) systems security. IEEE Internet Things J 8:8707\u20138718. https:\/\/doi.org\/10.1109\/JIOT.2020.3045653","journal-title":"IEEE Internet Things J"},{"key":"1149_CR2","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/JBHI.2023.3234604","volume":"27","author":"TR Gadekallu","year":"2023","unstructured":"Gadekallu TR, Alazab M, Hemanth J, Wang W (2023) Guest editorial federated learning for privacy preservation of healthcare data in internet of medical things and patient monitoring. IEEE J Biomed Health Inform 27:648\u2013651. https:\/\/doi.org\/10.1109\/JBHI.2023.3234604","journal-title":"IEEE J Biomed Health Inform"},{"key":"1149_CR3","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1109\/JBHI.2021.3112693","volume":"26","author":"H Xiong","year":"2022","unstructured":"Xiong H, Jin C, Alazab M et al (2022) On the design of blockchain-based ECDSA with fault-tolerant batch verification protocol for blockchain-enabled IoMT. IEEE J Biomed Health Inform 26:1977\u20131986. https:\/\/doi.org\/10.1109\/JBHI.2021.3112693","journal-title":"IEEE J Biomed Health Inform"},{"key":"1149_CR4","doi-asserted-by":"publisher","first-page":"4485","DOI":"10.1109\/JIOT.2020.3027440","volume":"8","author":"A Almogren","year":"2021","unstructured":"Almogren A, Mohiuddin I, Din IU et al (2021) FTM-IoMT: fuzzy-based trust management for preventing sybil attacks in internet of medical things. IEEE Internet Things J 8:4485\u20134497. https:\/\/doi.org\/10.1109\/JIOT.2020.3027440","journal-title":"IEEE Internet Things J"},{"key":"1149_CR5","first-page":"450","volume":"1","author":"AI Siam","year":"2015","unstructured":"Siam AI, El-khobby HA, Abd Elkader HS et al (2015) Enhanced data security model for cloud computing platform. Int J Sci Res Sci Eng Technol 1:450\u2013460","journal-title":"Int J Sci Res Sci Eng Technol"},{"key":"1149_CR6","doi-asserted-by":"publisher","first-page":"21418","DOI":"10.1109\/ACCESS.2018.2815540","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin Y, Kong L, Liu Z et al (2018) Multimodal feature-level fusion for biometrics identification system on IoMT platform. IEEE Access 6:21418\u201321426. https:\/\/doi.org\/10.1109\/ACCESS.2018.2815540","journal-title":"IEEE Access"},{"key":"1149_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3207562","author":"AI Siam","year":"2022","unstructured":"Siam AI, El-Affendi MA, Abou Elazm A et al (2022) Portable and real-time IoT-based healthcare monitoring system for daily medical applications. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2022.3207562","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1149_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8016525","volume":"2021","author":"AI Siam","year":"2021","unstructured":"Siam AI, Almaiah MA, Al-Zahrani A et al (2021) Secure health monitoring communication systems based on IoT and cloud computing for medical emergency applications. Comput Intell Neurosci 2021:1\u201323. https:\/\/doi.org\/10.1155\/2021\/8016525","journal-title":"Comput Intell Neurosci"},{"key":"1149_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.21608\/mjeer.2019.76711","volume":"28","author":"AI Siam","year":"2019","unstructured":"Siam AI, Abou Elazm A, El-Bahnasawy NA et al (2019) Smart health monitoring system based on IoT and cloud computing. Menoufia J Electron Eng Res 28:37\u201342. https:\/\/doi.org\/10.21608\/mjeer.2019.76711","journal-title":"Menoufia J Electron Eng Res"},{"key":"1149_CR10","doi-asserted-by":"publisher","first-page":"97760","DOI":"10.1109\/ACCESS.2021.3095248","volume":"9","author":"AN Uwaechia","year":"2021","unstructured":"Uwaechia AN, Ramli DA (2021) A comprehensive survey on ECG signals as new biometric modality for human authentication: recent advances and future challenges. IEEE Access 9:97760\u201397802. https:\/\/doi.org\/10.1109\/ACCESS.2021.3095248","journal-title":"IEEE Access"},{"key":"1149_CR11","doi-asserted-by":"publisher","first-page":"26001","DOI":"10.1007\/s11042-021-10781-8","volume":"80","author":"AI Siam","year":"2021","unstructured":"Siam AI, Abou Elazm A, El-Bahnasawy NA et al (2021) PPG-based human identification using Mel-frequency cepstral coefficients and neural networks. Multimed Tools Appl 80:26001\u201326019. https:\/\/doi.org\/10.1007\/s11042-021-10781-8","journal-title":"Multimed Tools Appl"},{"key":"1149_CR12","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s11277-019-06453-4","volume":"108","author":"AI Siam","year":"2019","unstructured":"Siam AI, El-khobby HA, Abdelnaby MM et al (2019) A novel speech enhancement method using Fourier series decomposition and spectral subtraction for robust speaker identification. Wireless Pers Commun 108:1055\u20131068. https:\/\/doi.org\/10.1007\/s11277-019-06453-4","journal-title":"Wireless Pers Commun"},{"key":"1149_CR13","doi-asserted-by":"publisher","first-page":"108057","DOI":"10.1016\/j.compeleceng.2022.108057","volume":"101","author":"A Sharma","year":"2022","unstructured":"Sharma A, Tanwar RS, Singh Y et al (2022) Heart rate and blood pressure measurement based on photoplethysmogram signal using fast Fourier transform. Comput Electr Eng 101:108057. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108057","journal-title":"Comput Electr Eng"},{"key":"1149_CR14","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1007\/s40747-020-00194-9","volume":"7","author":"NM Mahmoud","year":"2021","unstructured":"Mahmoud NM, Fouad H, Soliman AM (2021) Smart healthcare solutions using the internet of medical things for hand gesture recognition system. Complex Intell Syst 7:1253\u20131264. https:\/\/doi.org\/10.1007\/s40747-020-00194-9","journal-title":"Complex Intell Syst"},{"key":"1149_CR15","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2015.2434151","volume":"32","author":"VM Patel","year":"2015","unstructured":"Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: a review. IEEE Signal Process Mag 32:54\u201365. https:\/\/doi.org\/10.1109\/MSP.2015.2434151","journal-title":"IEEE Signal Process Mag"},{"key":"1149_CR16","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/OJCS.2021.3068385","volume":"2","author":"QN Tran","year":"2021","unstructured":"Tran QN, Turnbull BP, Hu J (2021) Biometrics and privacy-preservation: how do they evolve? IEEE Open J Comput Soc 2:179\u2013191. https:\/\/doi.org\/10.1109\/OJCS.2021.3068385","journal-title":"IEEE Open J Comput Soc"},{"key":"1149_CR17","doi-asserted-by":"crossref","unstructured":"Zhang Y, Junjie Wu (2016) Practical human authentication method based on piecewise corrected Electrocardiogram. In: 2016 7th IEEE international conference on software engineering and service science (ICSESS). IEEE, pp 300\u2013303","DOI":"10.1109\/ICSESS.2016.7883071"},{"key":"1149_CR18","doi-asserted-by":"publisher","first-page":"48392","DOI":"10.1109\/ACCESS.2019.2904095","volume":"7","author":"J-N Lee","year":"2019","unstructured":"Lee J-N, Kwak K-C (2019) Personal identification using a robust eigen ECG network based on time-frequency representations of ECG signals. IEEE Access 7:48392\u201348404. https:\/\/doi.org\/10.1109\/ACCESS.2019.2904095","journal-title":"IEEE Access"},{"key":"1149_CR19","doi-asserted-by":"publisher","first-page":"2920","DOI":"10.3390\/s20102920","volume":"20","author":"A Barros","year":"2020","unstructured":"Barros A, Resque P, Almeida J et al (2020) Data improvement model based on ECG biometric for user authentication and identification. Sensors 20:2920. https:\/\/doi.org\/10.3390\/s20102920","journal-title":"Sensors"},{"key":"1149_CR20","doi-asserted-by":"crossref","unstructured":"Ghassemi M, Moody B, Lehman L, et al (2018) You snooze, you win: the physionet\/computing in cardiology challenge 2018. In: 2018 Computing in cardiology conference (CinC). IEEE","DOI":"10.22489\/CinC.2018.049"},{"key":"1149_CR21","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/TIFS.2020.3006384","volume":"16","author":"Y Huang","year":"2021","unstructured":"Huang Y, Yang G, Wang K et al (2021) Learning joint and specific patterns: a unified sparse representation for off-the-person ECG biometric recognition. IEEE Trans Inf Forensics Secur 16:147\u2013160. https:\/\/doi.org\/10.1109\/TIFS.2020.3006384","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1149_CR22","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.compbiomed.2018.09.027","volume":"102","author":"Z Zhao","year":"2018","unstructured":"Zhao Z, Zhang Y, Deng Y, Zhang X (2018) ECG authentication system design incorporating a convolutional neural network and generalized S-Transformation. Comput Biol Med 102:168\u2013179. https:\/\/doi.org\/10.1016\/j.compbiomed.2018.09.027","journal-title":"Comput Biol Med"},{"key":"1149_CR23","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1007\/s11042-018-6300-2","volume":"78","author":"M Hammad","year":"2019","unstructured":"Hammad M, Luo G, Wang K (2019) Cancelable biometric authentication system based on ECG. Multimed Tools Appl 78:1857\u20131887. https:\/\/doi.org\/10.1007\/s11042-018-6300-2","journal-title":"Multimed Tools Appl"},{"key":"1149_CR24","doi-asserted-by":"crossref","unstructured":"Kim H, Nguyen MP, Chun SY (2017) Cancelable ECG biometrics using GLRT and performance improvement using guided filter with irreversible guide signal. In: 2017 39th Annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE, pp 454\u2013457","DOI":"10.1109\/EMBC.2017.8036860"},{"key":"1149_CR25","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.patrec.2013.11.014","volume":"38","author":"MD Bugdol","year":"2014","unstructured":"Bugdol MD, Mitas AW (2014) Multimodal biometric system combining ECG and sound signals. Pattern Recogn Lett 38:107\u2013112. https:\/\/doi.org\/10.1016\/j.patrec.2013.11.014","journal-title":"Pattern Recogn Lett"},{"key":"1149_CR26","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.neucom.2018.12.015","volume":"332","author":"K Su","year":"2019","unstructured":"Su K, Yang G, Wu B et al (2019) Human identification using finger vein and ECG signals. Neurocomputing 332:111\u2013118. https:\/\/doi.org\/10.1016\/j.neucom.2018.12.015","journal-title":"Neurocomputing"},{"key":"1149_CR27","doi-asserted-by":"publisher","first-page":"2782","DOI":"10.3390\/s18092782","volume":"18","author":"J Blasco","year":"2018","unstructured":"Blasco J, Peris-Lopez P (2018) On the feasibility of low-cost wearable sensors for multi-modal biometric verification. Sensors 18:2782. https:\/\/doi.org\/10.3390\/s18092782","journal-title":"Sensors"},{"key":"1149_CR28","doi-asserted-by":"publisher","DOI":"10.1201\/b18019","volume-title":"Medical image processing: advanced fuzzy set theoretic techniques","author":"T Chaira","year":"2015","unstructured":"Chaira T (2015) Medical image processing: advanced fuzzy set theoretic techniques. CRC Press"},{"key":"1149_CR29","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0165-0114(78)90029-5","volume":"1","author":"L Zadeh","year":"1978","unstructured":"Zadeh L (1978) Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets Syst 1:3\u201328. https:\/\/doi.org\/10.1016\/0165-0114(78)90029-5","journal-title":"Fuzzy Sets Syst"},{"key":"1149_CR30","first-page":"1","volume":"20","author":"K Atanassov","year":"2016","unstructured":"Atanassov K (2016) Intuitionistic fuzzy sets. Int J Bioautomation 20:1","journal-title":"Int J Bioautomation"},{"key":"1149_CR31","first-page":"142","volume":"3","author":"PA Ejegwa","year":"2014","unstructured":"Ejegwa PA, Akowe SO, Otene PM, Ikyule JM (2014) An overview on intuitionistic fuzzy sets. Int J Sci Technol Res 3:142\u2013145","journal-title":"Int J Sci Technol Res"},{"key":"1149_CR32","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.patrec.2019.02.017","volume":"122","author":"H Verma","year":"2019","unstructured":"Verma H, Gupta A, Kumar D (2019) A modified intuitionistic fuzzy c-means algorithm incorporating hesitation degree. Pattern Recogn Lett 122:45\u201352. https:\/\/doi.org\/10.1016\/j.patrec.2019.02.017","journal-title":"Pattern Recogn Lett"},{"key":"1149_CR33","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1002\/ima.22437","volume":"30","author":"T Chaira","year":"2020","unstructured":"Chaira T (2020) Intuitionistic fuzzy approach for enhancement of low contrast mammogram images. Int J Imaging Syst Technol 30:1162\u20131172","journal-title":"Int J Imaging Syst Technol"},{"key":"1149_CR34","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.procs.2015.10.017","volume":"70","author":"R Kaushik","year":"2015","unstructured":"Kaushik R, Bajaj RK, Kumar T (2015) On intuitionistic fuzzy divergence measure with application to edge detection. Procedia Comput Sci 70:2\u20138. https:\/\/doi.org\/10.1016\/j.procs.2015.10.017","journal-title":"Procedia Comput Sci"},{"key":"1149_CR35","doi-asserted-by":"crossref","unstructured":"Vlachos IK, Sergiadis GD (2007) The role of entropy in intuitionistic fuzzy contrast enhancement. In: Foundations of fuzzy logic and soft computing: 12th international fuzzy systems association world congress, IFSA 2007, Cancun, Mexico, June 18\u201321, 2007. Proceedings 12. pp 104\u2013113","DOI":"10.1007\/978-3-540-72950-1_11"},{"key":"1149_CR36","unstructured":"Lugovaya TS (2005) Biometric human identification based on electrocardiogram. Master\u2019s thesis, Faculty of Computing Technologies and Informatics, Electrotechnical University \u2018LETI\u2019, Saint-Petersburg, Russian Federation"},{"key":"1149_CR37","unstructured":"Lugovaya TS ECG-ID Database. https:\/\/physionet.org\/content\/ecgiddb\/1.0.0\/. Accessed 14 Apr 2023"},{"key":"1149_CR38","doi-asserted-by":"publisher","unstructured":"Goldberger AL, Amaral LAN, Glass L et al (2000) PhysioBank, PhysioToolkit, and PhysioNet. Circulation. https:\/\/doi.org\/10.1161\/01.CIR.101.23.e215","DOI":"10.1161\/01.CIR.101.23.e215"},{"key":"1149_CR39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/51.932724","volume":"20","author":"GB Moody","year":"2001","unstructured":"Moody GB, Mark RG (2001) The impact of the MIT-BIH arrhythmia database. IEEE Eng Med Biol Mag 20:45\u201350. https:\/\/doi.org\/10.1109\/51.932724","journal-title":"IEEE Eng Med Biol Mag"},{"key":"1149_CR40","unstructured":"Moody GB, Mark RG MIT-BIH arrhythmia database. https:\/\/physionet.org\/content\/mitdb\/1.0.0\/. Accessed 14 Apr 2023"},{"key":"1149_CR41","unstructured":"Mark RG, Schluter PS, Moody G, et al (1982) An annotated ECG database for evaluating arrhythmia detectors. In: IEEE Transactions on Biomedical Engineering. IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, p 600"},{"key":"1149_CR42","unstructured":"Blasco J, Peris-Lopez P Low-cost sensors biometrics dataset. https:\/\/www.dropbox.com\/s\/lei4a27fcgp0ygr\/LowCostSensorsBiometrics.zip?dl=0. Accessed 14 Apr 2023"},{"key":"1149_CR43","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4685","author":"AI Siam","year":"2021","unstructured":"Siam AI, Sedik A, El-Shafai W et al (2021) Biosignal classification for human identification based on convolutional neural networks. Int J Commun Syst. https:\/\/doi.org\/10.1002\/dac.4685","journal-title":"Int J Commun Syst"},{"key":"1149_CR44","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s11082-018-1591-0","volume":"50","author":"RF Soliman","year":"2018","unstructured":"Soliman RF, Amin M, Abd El-Samie FE (2018) A double random phase encoding approach for cancelable iris recognition. Opt Quant Electron 50:326. https:\/\/doi.org\/10.1007\/s11082-018-1591-0","journal-title":"Opt Quant Electron"},{"key":"1149_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08428-w","author":"AI Siam","year":"2023","unstructured":"Siam AI, Gamel SA, Talaat FM (2023) Automatic stress detection in car drivers based on non-invasive physiological signals using machine learning techniques. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-023-08428-w","journal-title":"Neural Comput Appl"},{"key":"1149_CR46","first-page":"111","volume":"51","author":"M Christensen","year":"2006","unstructured":"Christensen M, Taylor FJ (2006) Fixed-point-IIR-filter challenges. EDN Netw 51:111\u2013122","journal-title":"EDN Netw"},{"key":"1149_CR47","doi-asserted-by":"publisher","first-page":"77675","DOI":"10.1109\/ACCESS.2021.3082940","volume":"9","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Mohamed FAHE, Elkamchouchi HMA et al (2021) Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access 9:77675\u201377692. https:\/\/doi.org\/10.1109\/ACCESS.2021.3082940","journal-title":"IEEE Access"},{"key":"1149_CR48","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s11042-019-08123-w","volume":"79","author":"PSVVN Chanukya","year":"2020","unstructured":"Chanukya PSVVN, Thivakaran TK (2020) Multimodal biometric cryptosystem for human authentication using fingerprint and ear. Multimed Tools Appl 79:659\u2013673. https:\/\/doi.org\/10.1007\/s11042-019-08123-w","journal-title":"Multimed Tools Appl"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01149-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01149-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01149-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T22:18:42Z","timestamp":1707603522000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01149-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,25]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1149"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01149-6","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,25]]},"assertion":[{"value":"13 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}