{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T22:22:57Z","timestamp":1770157377337,"version":"3.49.0"},"reference-count":24,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T00:00:00Z","timestamp":1585785600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,5,29]]},"abstract":"<jats:p>A recent trend of the information technology is cloud computing technology where many complex tasks are simplified with increased speed and low cost. However, cloud authentication plays a crucial role once all the data\u2019s are uploaded in the cloud. In this paper, multi-biometric template security based on generation of unique graph is proposed to ensure a safe and secured cloud authentication mechanism. To overcome the vulnerability issues of traditional password and token based authentication methods, in this work, a multi-biometric system is proposed. The left, right fingerprint and palm print multi modal traits are given as input to the system. After preprocessing, all the features are combined to generate a weighted graph called as branching factor graph. In the end, the node and edge values of the branching factor graph will be stored in the cloud database. Experimental study shows that the proposed method achieved a very low equal error rate than the other existing works.<\/jats:p>","DOI":"10.3233\/jifs-179724","type":"journal-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T10:49:11Z","timestamp":1585910951000},"page":"6437-6444","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Multi-biometric cryptosystem using graph for secure cloud authentication"],"prefix":"10.1177","volume":"38","author":[{"given":"R. Ashoka","family":"Rajan","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, School of Computing, SASTRA Deemed to be University, Thanjavur, India"}]},{"given":"P.","family":"Kumaran","sequence":"additional","affiliation":[{"name":"Post-Doc Fellow, NIT-Trichy, India"}]}],"member":"179","published-online":{"date-parts":[[2020,4,2]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","DOI":"10.1117\/12.777738","article-title":"Multi-biometric templates using fingerprint and voice","volume":"6944","author":"Camlikaya E.","year":"2008","unstructured":"CamlikayaE., KholmatovA. and YanikogluB., Multi-biometric templates using fingerprint and voice, In Biometric Technology for Human Identification V6944 (2008), p. 69440I. International Society for Optics and Photonics.","journal-title":"In Biometric Technology for Human Identification V"},{"issue":"1","key":"e_1_3_1_3_2","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/TIFS.2014.2363951","article-title":"Learning fingerprint reconstruction: From minutiae to image","volume":"10","author":"Cao K.","year":"2014","unstructured":"CaoK. and JainA.K., Learning fingerprint reconstruction: From minutiae to image, IEEE Transactions on Information Forensics and Security10(1) (2014), pp. 104\u2013117.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"FarooqF. BolleR.M. JeaT.Y. and RathaN. Anonymous and revocable fingerprint recognition In 2007 IEEE conference on computer vision and pattern recognition (2007) pp. 1\u20137.","DOI":"10.1109\/CVPR.2007.383382"},{"issue":"2","key":"e_1_3_1_5_2","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","article-title":"Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition","volume":"23","author":"Galbally J.","year":"2013","unstructured":"GalballyJ., MarcelS. and FierrezJ., Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition, IEEE transactions on image processing23(2) (2013), 710\u2013724.","journal-title":"IEEE transactions on image processing"},{"issue":"6","key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1049\/iet-bmt.2016.0192","article-title":"Constructing cancellable template with synthetic minutiae","volume":"6","author":"Gao Q.","year":"2017","unstructured":"GaoQ. and ZhangC., Constructing cancellable template with synthetic minutiae, IET Biometrics6(6) (2017), 448\u2013456.","journal-title":"IET Biometrics"},{"issue":"2","key":"e_1_3_1_7_2","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TIFS.2011.2172429","article-title":"Index codes for multibiometric pattern retrieval","volume":"7","author":"Gyaourova A.","year":"2011","unstructured":"GyaourovaA. and RossA., Index codes for multibiometric pattern retrieval, IEEE Transactions on Information Forensics and Security7(2) (2011), pp. 518\u2013529.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"e_1_3_1_8_2","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1109\/TIFS.2007.908179","article-title":"Collusion-resistant video fingerprinting for large user group","volume":"2","author":"He S.","year":"2007","unstructured":"HeS. and WuM., Collusion-resistant video fingerprinting for large user group, IEEE Transactions on Information Forensics and Security2(4) (2007), 697\u2013709.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"e_1_3_1_9_2","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TIFS.2006.873597","article-title":"Joint coding and embedding techniques for Multimedia Fingerprinting","volume":"1","author":"He S.","year":"2006","unstructured":"HeS. and WuM., Joint coding and embedding techniques for Multimedia Fingerprinting, IEEE Transactions on Information Forensics and Security1(2) (2006), pp. 231\u2013247.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"e_1_3_1_10_2","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","article-title":"Biohashing: two factor authentication featuring fingerprint data and tokenised random number","volume":"37","author":"Jin A.T.B.","year":"2004","unstructured":"JinA.T.B., LingD.N.C. and GohA., Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognition37(11) (2004), 2245\u20132255.","journal-title":"Pattern Recognition"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"issue":"7","key":"e_1_3_1_12_2","doi-asserted-by":"crossref","first-page":"1810","DOI":"10.1109\/TIFS.2018.2804890","article-title":"Liveness detection and automatic template updating using fusion of ECG and fingerprint","volume":"13","author":"Komeili M.","year":"2018","unstructured":"KomeiliM., ArmanfardN. and HatzinakosD., Liveness detection and automatic template updating using fusion of ECG and fingerprint, IEEE Transactions on Information Forensics and Security13(7) (2018), pp. 1810\u20131822.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TIFS.2015.2402593","article-title":"A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion","volume":"10","author":"Li C.","year":"2015","unstructured":"LiC., HuJ., PieprzykJ. and SusiloW., A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion, IEEE transactions on Information Forensics and Security10(6) (2015), 1193\u20131206.","journal-title":"IEEE transactions on Information Forensics and Security"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","unstructured":"LiC. and HuJ. A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystemusing pair-polarminutiae structures. IEEE Transactions on Information Forensics and Security 11(3) (2015) pp. 543\u2013555.","DOI":"10.1109\/TIFS.2015.2505630"},{"issue":"2","key":"e_1_3_1_15_2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/LSP.2010.2097592","article-title":"Privacy protection of fingerprint database","volume":"18","author":"Li S.","year":"2010","unstructured":"LiS. and KotA.C., Privacy protection of fingerprint database, IEEE Signal Processing Letters18(2) (2010), pp. 115\u2013118.","journal-title":"IEEE Signal Processing Letters"},{"issue":"1","key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TIFS.2011.2166545","article-title":"Multibiometric cryptosystems based on feature-level fusion","volume":"7","author":"Nagar A.","year":"2011","unstructured":"NagarA., NandakumarK. and JainA.K., Multibiometric cryptosystems based on feature-level fusion, IEEE Transactions on Information Forensics and Security7(1) (2011), 255\u2013268.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1109\/TIFS.2012.2223676","article-title":"On mixing fingerprints","volume":"8","author":"Othman A.","year":"2012","unstructured":"OthmanA. and RossA., On mixing fingerprints, IEEE Transactions on Information Forensics and security8(1) (2012), pp. 260\u2013267.","journal-title":"IEEE Transactions on Information Forensics and security"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"issue":"1","key":"e_1_3_1_19_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/TIFS.2010.2097252","article-title":"Visual cryptography for biometric privacy","volume":"6","author":"Ross A.","year":"2010","unstructured":"RossA. and OthmanA., Visual cryptography for biometric privacy, IEEE Transactions on Information Forensics and Security6(1) (2010), pp. 70\u201381.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TIFS.2017.2691658","article-title":"Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems","volume":"12","author":"Roy A.","year":"2017","unstructured":"RoyA., MemonN. and RossA., Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems, IEEE Transactions on Information Forensics and Security12(9) (2017), pp. 2013\u20132025.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0034"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"SutcuY. LiQ. and MemonN. Secure biometric templates from fingerprint-face features In 2007 IEEE Conference on Computer Vision and Pattern Recognition (2007) pp. 1\u20136.","DOI":"10.1109\/CVPR.2007.383385"},{"key":"e_1_3_1_23_2","unstructured":"TomkoG.J. SoutarC. and SchmidtG.J. Mytec Tech Inc Fingerprint controlled public key cryptographic system (1996) U.S. Patent 5 541 994"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2009.04.002"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2011.2165600"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179724","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179724","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T09:16:17Z","timestamp":1770110177000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,2]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,5,29]]}},"alternative-id":["10.3233\/JIFS-179724"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179724","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,2]]}}}