{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:48Z","timestamp":1773615588626,"version":"3.50.1"},"reference-count":30,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700834","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:45Z","timestamp":1741962165000},"page":"1204-1211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of the Reliability of Template Storage When Implementing Modern Biometric Technologies in Information Security Systems"],"prefix":"10.3103","volume":"58","author":[{"given":"L. Kh.","family":"Safiullina","sequence":"first","affiliation":[]},{"given":"A. R.","family":"Kasimova","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Alekseeva","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7782_CR1","unstructured":"Global survey 2022: Full report and press release in English. https:\/\/www.isaps.org\/discover\/about-isaps\/global-statistics\/reports-and-press-releases\/global-survey-2022-full-report-and-press-releases. Cited March 20, 2024."},{"key":"7782_CR2","doi-asserted-by":"publisher","first-page":"8841021","DOI":"10.1155\/2020\/8841021","volume":"2020","author":"V. Rajasekar","year":"2020","unstructured":"Rajasekar, V., Premalatha, J., and Sathya, K., Enhanced biometric recognition for secure authentication using iris preprocessing and hyperelliptic curve cryptography, Wireless Communications and Mobile Computing, 2020, vol. 2020, p. 8841021. https:\/\/doi.org\/10.1155\/2020\/8841021","journal-title":"Wireless Communications and Mobile Computing"},{"key":"7782_CR3","doi-asserted-by":"publisher","unstructured":"Makarova, E.A. and Kruglova, O.V., Biometric technologies in the field of banking services in Russia, Nauka. Issledovaniya. Praktika. Sbornik statei mezhdunarodnoi nauchnoi konferentsii (Science, Research, Practice: Proceedings of the International Scientific Conference), Vyborg, Leningrad oblast, 2023, St. Petersburg: Gumanitarnyi Natsional\u2019nyi Issledovatel\u2019skii Institut Natsrazvitie, 2023, pp. 27\u201329. https:\/\/doi.org\/10.37539\/230424.2023.50.18.001","DOI":"10.37539\/230424.2023.50.18.001"},{"key":"7782_CR4","unstructured":"Merkushev, O.Yu. and Sidorkina, I.G., Security of biometric access control subsystems based on fuzzy extractor, Vestnik Volzhskogo Universiteta im. V. N. Tatishcheva, 2011, no. 18, pp. 104\u2013109."},{"key":"7782_CR5","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/tpami.2007.1004","volume":"29","author":"N.K. Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, Sh., Connell, J.H., and Bolle, R.M., Generating cancelable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intell., 2007, vol. 29, no. 4, pp. 561\u2013572. https:\/\/doi.org\/10.1109\/tpami.2007.1004","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7782_CR6","doi-asserted-by":"publisher","unstructured":"Boult, T., Robust distance measures for face-recognition supporting revocable biometric tokens, 7th International Conference on Automatic Face and Gesture Recognition (FGR06), Southampton, United Kingdom, 2006, IEEE, 2006, pp. 560\u2013566. https:\/\/doi.org\/10.1109\/FGR.2006.94","DOI":"10.1109\/FGR.2006.94"},{"key":"7782_CR7","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/tsmca.2010.2041653","volume":"40","author":"E. Maiorana","year":"2010","unstructured":"Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., and Neri, A., Cancelable templates for sequence-based biometrics with application to on-line signature recognition, IEEE Trans. Syst., Man, Cybern., Part A: Syst. Hum., 2010, vol. 40, no. 3, pp. 525\u2013538. https:\/\/doi.org\/10.1109\/tsmca.2010.2041653","journal-title":"IEEE Trans. Syst., Man, Cybern., Part A: Syst. Hum."},{"key":"7782_CR8","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/tpami.2006.250","volume":"28","author":"A.B.J. Teoh","year":"2006","unstructured":"Teoh, A.B.J., Goh, A., and Ngo, D.C.L., Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs, IEEE Trans. Pattern Anal. Mach. Intell., 2006, vol. 28, no. 12, pp. 1892\u20131901. https:\/\/doi.org\/10.1109\/tpami.2006.250","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7782_CR9","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F. Hao","year":"2006","unstructured":"Hao, F., Anderson, R., and Daugman, J., Combining crypto with biometrics effectively, IEEE Trans. Comput., 2006, vol. 55, no. 9, pp. 1081\u20131088. https:\/\/doi.org\/10.1109\/TC.2006.138","journal-title":"IEEE Trans. Comput."},{"key":"7782_CR10","doi-asserted-by":"publisher","unstructured":"Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and Zemor, G., Optimal iris fuzzy sketches, First IEEE International Conference on Biometrics: Theory, Applications, and Systems, Crystal City, VA, 2007, pp. 1\u20136. https:\/\/doi.org\/10.1109\/BTAS.2007.4401904","DOI":"10.1109\/BTAS.2007.4401904"},{"key":"7782_CR11","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1108\/09685220210436949","volume":"10","author":"H. Feng","year":"2002","unstructured":"Feng, H. and Choong Wah, Ch., Private key generation from on-line handwritten signatures, Information Management & Computer Security, 2002, vol. 10, no. 4, pp. 159\u2013164. https:\/\/doi.org\/10.1108\/09685220210436949","journal-title":"Information Management & Computer Security"},{"key":"7782_CR12","doi-asserted-by":"crossref","unstructured":"Vielhauer, C., Steinmetz, R., and Mayerhofer, A., Biometric hash based on statistical features of online signatures, 2002 International Conference on Pattern Recognition, Quebec City, Canada, 2002, IEEE, 2002, vol. 1, pp.\u00a0123\u2013126.","DOI":"10.1109\/ICPR.2002.1044628"},{"key":"7782_CR13","doi-asserted-by":"publisher","unstructured":"Monrose, F., Reiter, M.K., Li, Q., and Wetzel, S., Cryptographic key generation from voice, Proceedings 2001 IEEE Symposium on Security and Privacy. S &P 2001, Oakland, CA, IEEE, 2000, pp. 202\u2013213. https:\/\/doi.org\/10.1109\/secpri.2001.924299","DOI":"10.1109\/secpri.2001.924299"},{"key":"7782_CR14","doi-asserted-by":"publisher","unstructured":"Clancy, T.Ch., Kiyavash, N., and Lin, D.J., Secure smartcardbased fingerprint authentication, Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications\u2014WBMA \u201903, Berkeley, CA, 2003, New York: Association for Computing Machinery, 2003, pp. 45\u201352. https:\/\/doi.org\/10.1145\/982507.982516","DOI":"10.1145\/982507.982516"},{"key":"7782_CR15","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/tifs.2007.908165","volume":"2","author":"K. Nandakumar","year":"2007","unstructured":"Nandakumar, K., Jain, A.K., and Pankanti, Sh., Fingerprint-based fuzzy vault: Implementation and performance, IEEE Trans. Inf. Forensics Secur., 2007, vol. 2, no. 4, pp. 744\u2013757. https:\/\/doi.org\/10.1109\/tifs.2007.908165","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7782_CR16","doi-asserted-by":"publisher","unstructured":"Wu, Yo. and Qiu, B., Transforming a pattern identifier into biometric key generators, 2010 IEEE International Conference on Multimedia and Expo, Singapore, 2010, IEEE, 2010, pp. 78\u201382. https:\/\/doi.org\/10.1109\/icme.2010.5583388","DOI":"10.1109\/icme.2010.5583388"},{"key":"7782_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.24892\/RIJIE\/20230101","volume":"10","author":"A.I. Nikonorov","year":"2023","unstructured":"Nikonorov, A.I., Estimation of the unacceptable productivity risk in the machine selection problem, Mashinostroenie: Setevoi Elektronnyi Nauchnyi Zhurnal, 2023, vol. 10, no. 1, pp. 3\u20138. https:\/\/doi.org\/10.24892\/RIJIE\/20230101","journal-title":"Mashinostroenie: Setevoi Elektronnyi Nauchnyi Zhurnal"},{"key":"7782_CR18","doi-asserted-by":"publisher","first-page":"34541","DOI":"10.1109\/access.2021.3061589","volume":"9","author":"R. Ryu","year":"2021","unstructured":"Ryu, R., Yeom, S., Kim, S.-H., and Herbert, D., Continuous multimodal biometric authentication schemes: A\u00a0systematic review, IEEE Access, 2021, vol. 9, pp. 34541\u201334557. https:\/\/doi.org\/10.1109\/access.2021.3061589","journal-title":"IEEE Access"},{"key":"7782_CR19","doi-asserted-by":"publisher","first-page":"e1365","DOI":"10.1002\/widm.1365","volume":"10","author":"G. Dahia","year":"2020","unstructured":"Dahia, G., Jesus, L., and Pamplona Segundo, M., Continuous authentication using biometrics: An advanced review, WIREs Data Mining and Knowledge Discovery, 2020, vol. 10, no. 4, p. e1365. https:\/\/doi.org\/10.1002\/widm.1365","journal-title":"WIREs Data Mining and Knowledge Discovery"},{"key":"7782_CR20","doi-asserted-by":"publisher","first-page":"82","DOI":"10.18287\/2412-6179-co-567","volume":"44","author":"A.E. Sulavko","year":"2020","unstructured":"Sulavko, A.E., Highly reliable two-factor biometric authentication based on handwritten and voice passwords using flexible neural networks, Komp\u2019yuternaya Opt., 2020, vol. 44, no. 1, pp. 82\u201391. https:\/\/doi.org\/10.18287\/2412-6179-co-567","journal-title":"Komp\u2019yuternaya Opt."},{"key":"7782_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.21822\/2073-6185-2023-50-3-46-56","volume":"50","author":"K.N. Vlasov","year":"2023","unstructured":"Vlasov, K.N., Tolstykh, O.V., and Isaev, O.V., Using biometric data to protect information, Vestnik Dagestanskogo Gosudarstvennogo Tekhnicheskogo Universiteta. \n               Tekhnicheskie Nauki, 2023, vol. 50, no. 3, pp. 46\u201356. https:\/\/doi.org\/10.21822\/2073-6185-2023-50-3-46-56","journal-title":"Tekhnicheskie Nauki"},{"key":"7782_CR22","doi-asserted-by":"publisher","unstructured":"Sharipov, R., Tumbinskaya, M., and Safiullina, A., User authentication modeling based on the dynamics of keystrokes in the industrial control systems, Advances in Automation II. RusAutoCon 2020, Radionov, A.A. and Gasiyarov, V.R., Eds., Lecture Notes in Electrical Engineering, vol. 729, Cham: Springer, 2021, pp. 569\u2013579. https:\/\/doi.org\/10.1007\/978-3-030-71119-1_56","DOI":"10.1007\/978-3-030-71119-1_56"},{"key":"7782_CR23","first-page":"143","volume":"22","author":"R.R. Sharipov","year":"2019","unstructured":"Sharipov, R.R. and Sitnikov, A.N., Problems in developing the systems of recongizing users by their keyboard usage patterns, Vestnik Tekhnologicheskogo Universiteta, 2019, vol. 22, no. 10, pp. 143\u2013147.","journal-title":"Vestnik Tekhnologicheskogo Universiteta"},{"key":"7782_CR24","doi-asserted-by":"publisher","unstructured":"Howard, A.G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., Weyand, T., Andreetto, M., and Adam, H., MobileNets: Efficient convolutional neural networks for mobile vision applications, arXiv Preprint, 2017. https:\/\/doi.org\/10.48550\/arXiv.1704.04861","DOI":"10.48550\/arXiv.1704.04861"},{"key":"7782_CR25","unstructured":"ICAO Document 9303: Machine readable travel documents, part 9: Deployment of biometric identification and electronic storage of data in eMRTDs, Montreal: International Civil Aviation Organization, 2021, 8th ed. https:\/\/www.icao.int\/publications\/Documents\/9303_p9_cons_en.pdf. Cited March 21, 2024."},{"key":"7782_CR26","unstructured":"Lee, J., Fujitsu smartphone powered by Delta ID iris recognition, 2016. https:\/\/www.biometricupdate.com\/201612\/fujitsus-latest-smartphone-using-delta-id-iris-recognition-technology. Cited March 21, 2024."},{"key":"7782_CR27","unstructured":"Fujitsu develops prototype smartphone with iris authentication, 2015. http:\/\/www.fujitsu.com\/global\/about\/resources\/news\/press-releases\/2015\/0302-03.html. Cited March 21, 2024."},{"key":"7782_CR28","unstructured":"Keyboard handwriting recognition: A threat to online anonymity?, 2015. https:\/\/stakhanovets.ru\/blog\/raspoznavanie-klaviaturnogo-pocherka-ugroza-anonimnosti-v-seti\/. Cited March 21, 2024."},{"key":"7782_CR29","doi-asserted-by":"publisher","unstructured":"Chastikova, V.A., Titova, A.A., and Voylova, D.O., Analytical review of personal identification methods based on biometric characteristics, Vestnik Adygeiskogo Gosudarstvennogo Universiteta. Seriya Estestvenno-Matematicheskie i Tekhnicheskie Nauki, 2022, no. 1, pp. 92\u2013112. https:\/\/doi.org\/10.53598\/2410-3225-2022-1-296-92-112","DOI":"10.53598\/2410-3225-2022-1-296-92-112"},{"key":"7782_CR30","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.3103\/s0146411623080023","volume":"57","author":"A.I. Almuhamedov","year":"2023","unstructured":"Almuhamedov, A.I. and Kolomoitcev, V.S., Application of machine learning methods to the problem of searching for a region of interest for biometric identification based on the pattern of palm veins, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 1126\u20131134. https:\/\/doi.org\/10.3103\/s0146411623080023","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700834.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700834","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700834.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:56Z","timestamp":1773612116000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7782"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700834","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"1 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}