{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T03:58:43Z","timestamp":1776916723696,"version":"3.51.2"},"reference-count":30,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2021,4]]},"abstract":"<jats:p> The IT security paradigm evolves from secret-based to biometric identity-based. Biometric identification has gradually become more popular in recent years for handheld devices. Privacy-preserving is a key concern when biometrics is used in authentication systems in the present world today. Nowadays, the declaration of biometric traits has been imposed not only by the government but also by many private entities. There are no proper mechanisms and assurance that biometric traits will be kept safe by such entities. The encryption of biometric traits to avoid privacy attacks is a giant problem. Hence, state-of-the-art safety and security technological solutions must be devised to prevent the loss and misuse of such biometric traits. In this paper, we have identified different cancelable biometrics methods with the possible attacks on the biometric traits and directions on possible countermeasures in order to design a secure and privacy-preserving biometric authentication system. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation and Index of max hashing. We tested and evaluated the proposed novel method on a standard dataset and achieved good results. <\/jats:p>","DOI":"10.1142\/s021946782150025x","type":"journal-article","created":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T07:36:47Z","timestamp":1604129807000},"page":"2150025","source":"Crossref","is-referenced-by-count":3,"title":["Significance of the Transition to Biometric Template Protection: Explore the Future"],"prefix":"10.1142","volume":"21","author":[{"given":"Ayesha S.","family":"Shaikh","sequence":"first","affiliation":[{"name":"Gujarat Technological University, Ahmedabad 382424, Gujarat, India"}]},{"given":"Vibha D.","family":"Patel","sequence":"additional","affiliation":[{"name":"Vishwakarma Government Engineering College, Ahmedabad 382424, Gujarat, India"}]}],"member":"219","published-online":{"date-parts":[[2020,12,19]]},"reference":[{"key":"S021946782150025XBIB001","volume":"2008","author":"Jain A. K.","year":"2008","journal-title":"J. Adv. Signal Process."},{"key":"S021946782150025XBIB002","volume":"45","author":"Jain A. K.","year":"2012","journal-title":"IEEE Comput."},{"key":"S021946782150025XBIB003","volume-title":"Security and Privacy in Biometrics","author":"Jain A. K.","year":"2013"},{"key":"S021946782150025XBIB004","doi-asserted-by":"crossref","DOI":"10.1142\/S0219467818500067","volume":"18","author":"Choudhury B.","year":"2018","journal-title":"Int. J. Image Graph."},{"key":"S021946782150025XBIB005","doi-asserted-by":"crossref","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"Ratha N. K.","year":"2007","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"S021946782150025XBIB006","volume":"2017","author":"Pagnin E.","year":"2017","journal-title":"Security Commun. Netw."},{"key":"S021946782150025XBIB008","volume-title":"14th Annual Conf. Privacy, Security and Trust (PST), 2016","author":"Guo L.","year":"2016"},{"key":"S021946782150025XBIB010","author":"Dwivedi R.","year":"2018","journal-title":"Pattern Recogn. Lett."},{"key":"S021946782150025XBIB011","volume":"13","author":"Jin Z.","year":"2018","journal-title":"IEEE Trans. Inform. Forensics Security"},{"key":"S021946782150025XBIB012","volume":"61","author":"Wang S.","year":"2017","journal-title":"Pattern Recogn."},{"key":"S021946782150025XBIB013","series-title":"International Society for Optics and Photonics","volume-title":"Media Forensics and Security II","volume":"7541","author":"Nagar A.","year":"2010"},{"key":"S021946782150025XBIB015","volume-title":"Int. Conf. Biometrics (ICB)","author":"Sandhya M.","year":"2015"},{"key":"S021946782150025XBIB016","doi-asserted-by":"crossref","DOI":"10.1016\/j.procs.2015.06.077","volume":"54","author":"Kaur H.","year":"2015","journal-title":"Proc. Comput. Sci."},{"key":"S021946782150025XBIB017","author":"Murakami T.","year":"2018","journal-title":"Pattern Recogn. Lett."},{"key":"S021946782150025XBIB018","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1587\/transfun.E94.A.233","volume":"94","author":"Takahashi K.","year":"2011","journal-title":"IEICE Trans."},{"key":"S021946782150025XBIB019","doi-asserted-by":"crossref","DOI":"10.1142\/S0218001414560138","volume":"28","author":"Prasad M. V.","year":"2014","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"key":"S021946782150025XBIB020","volume":"14","author":"Jain A. K.","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"S021946782150025XBIB021","first-page":"271292","volume-title":"Handbook of Biometrics","author":"Ross A.","year":"2008"},{"key":"S021946782150025XBIB022","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"S021946782150025XBIB023","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.patcog.2018.01.026","volume":"78","author":"Yang W.","year":"2018","journal-title":"Pattern Recogn."},{"key":"S021946782150025XBIB024","volume":"2018","author":"Yang W.","year":"2018","journal-title":"Wireless Commun. Mobile Comput."},{"key":"S021946782150025XBIB025","volume":"39","author":"Jin Z.","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"S021946782150025XBIB026","volume":"42","author":"Jin Z.","year":"2014","journal-title":"Pattern Recogn. Lett."},{"key":"S021946782150025XBIB027","author":"Akdogan D.","year":"2018","journal-title":"Computer Networks"},{"key":"S021946782150025XBIB028","volume":"33","author":"Lee C.","year":"2010","journal-title":"J. Network Comput. Appl."},{"key":"S021946782150025XBIB029","volume":"45","author":"Das P.","year":"2012","journal-title":"Pattern Recogn."},{"key":"S021946782150025XBIB030","volume-title":"Biometric Consortium Conf., 2006 Biometrics Symposium: Special Session on Research","author":"Jeong M.","year":"2006"},{"key":"S021946782150025XBIB031","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2011.03.015","volume":"44","author":"Ahmad T.","year":"2011","journal-title":"Pattern Recogn."},{"key":"S021946782150025XBIB032","doi-asserted-by":"crossref","DOI":"10.1049\/iet-bmt.2013.0049","volume":"3","author":"Rathgeb C.","year":"2014","journal-title":"IET Biometrics"},{"key":"S021946782150025XBIB033","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.patrec.2015.12.013","volume":"79","author":"Jain A. K.","year":"2016","journal-title":"Pattern Recogn. Lett."}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021946782150025X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T09:42:04Z","timestamp":1620121324000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S021946782150025X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,19]]},"references-count":30,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10.1142\/S021946782150025X"],"URL":"https:\/\/doi.org\/10.1142\/s021946782150025x","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"value":"0219-4678","type":"print"},{"value":"1793-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,19]]}}}