{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T19:29:55Z","timestamp":1772479795330,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006261","name":"Taif University Researchers Supporting Project Number","doi-asserted-by":"publisher","award":["TURSP-2020\/147"],"award-info":[{"award-number":["TURSP-2020\/147"]}],"id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006261","name":"Taif university, Taif, Saudi Arabia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3082940","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T19:47:47Z","timestamp":1621885667000},"page":"77675-77692","source":"Crossref","is-referenced-by-count":59,"title":["Efficient and Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"Walid","family":"El-Shafai","sequence":"first","affiliation":[{"name":"Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6062-6625","authenticated-orcid":false,"given":"Fatma A. Hossam Eldein","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering, Alexandria University, Alexandria, Egypt"}]},{"given":"Hassan M. A.","family":"Elkamchouchi","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering, Alexandria University, Alexandria, Egypt"}]},{"given":"Mohammed","family":"Abd-Elnaby","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia"}]},{"given":"Ahmed","family":"Elshafee","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Ahram Canadian University, 6th October City, Egypt"}]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Efficient cancelable Iris recognition scheme based on modified logistic map","author":"soliman","year":"2018","journal-title":"Proc Nat Acad Sci India A Phys Sci"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2018.8405512"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2016.0192"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.04.013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7871-2_26"},{"key":"ref30","first-page":"1","article-title":"Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication","volume":"710","author":"faragallah","year":"2021","journal-title":"J Ambient Intell Humanized Comput"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001417560043"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98734-7_19"},{"key":"ref34","first-page":"378","article-title":"A cancelable ranking based hashing method for fingerprint template protection","author":"jin","year":"2017","journal-title":"Proc Int Conf Mobile Netw Manage"},{"key":"ref60","year":"2020","journal-title":"FVC2002 (DB1) Database"},{"key":"ref61","year":"2020","journal-title":"FVC2002 (DB2) Database"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08322-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08190-z"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106333"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/e22121361"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09881-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.07.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2434151"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref24","article-title":"One-factor cancelable fingerprint template protection based on feature enhanced hashing","author":"zhang","year":"2021","journal-title":"Proc 12th Int Conf Graph Image Process (ICGIP)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31254-0_27"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043689"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063031"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6300-2"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.10.005"},{"key":"ref59","year":"2020","journal-title":"LFW database"},{"key":"ref58","year":"2020","journal-title":"FERET Database"},{"key":"ref57","year":"2020","journal-title":"ORL database"},{"key":"ref56","first-page":"498","article-title":"Pre-image resistant cancelable biometrics scheme using bidirectional memory model","volume":"19","author":"tarek","year":"2017","journal-title":"IJ Netw Secur"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72395-2_51"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02937-5_5"},{"key":"ref53","first-page":"226","article-title":"Genetic algorithm based image cryptography","volume":"5","author":"machado","year":"2016","journal-title":"Int J Innov Res Sci Eng Technol"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886573"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974226"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58139-2_7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1364\/AO.57.010305"},{"key":"ref12","first-page":"423","article-title":"The application of information security encryption technology in military data system management","author":"zheng","year":"2017","journal-title":"Proc Int Conf Man-Mach -Environ Syst Eng"},{"key":"ref13","article-title":"A cancelable biometric authentication system based on feature-adaptive random projection","volume":"58","author":"yang","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.01.026"},{"key":"ref15","first-page":"347","article-title":"Biometric based user authentication and privacy preserving in cloud environment","volume":"12","author":"jaichandran","year":"2021","journal-title":"Turkish Journal of Computer and Mathematics Education"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.109257"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2020.101322"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10234-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107735"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008644"},{"key":"ref3","first-page":"1145","article-title":"Hardware implementation of cancellable biometric systems","author":"elazm","year":"2020","journal-title":"Proc 4th Int Conf I-SMAC (IoT Social Mobile Analytics Cloud) (I-SMAC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101690"},{"key":"ref5","first-page":"1","article-title":"Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption","volume":"79","author":"ibrahim","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/1.1906240"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.07.024"},{"key":"ref49","first-page":"1","article-title":"A new approach for data encryption using genetic algorithms and brain mu waves","volume":"2","author":"rajendra","year":"2011","journal-title":"Int J Sci Eng Res"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062403"},{"key":"ref46","first-page":"94","article-title":"Genetic algorithm for finding the key&#x2019;s length and cryptanalysis of the permutation cipher","volume":"15","author":"gorodilov","year":"2008","journal-title":"Int J Inf Theories Appl"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5121\/sipij.2011.2105"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2006.516.519"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2011.5952458"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139061346","author":"poon","year":"2014","journal-title":"Introduction to Modern Digital holography with MATLAB"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-018-1591-0"},{"key":"ref44","first-page":"546","article-title":"Bit-level encryption of images using genetic algorithm","volume":"3","author":"srikanth","year":"2010","journal-title":"Int J Comput Sci Commun Technol"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1364\/OPTICA.2.000476"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09439504.pdf?arnumber=9439504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T02:08:31Z","timestamp":1733882911000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9439504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3082940","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}