{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:25:49Z","timestamp":1773984349107,"version":"3.50.1"},"reference-count":43,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063227","type":"journal-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:56:20Z","timestamp":1742964980000},"page":"1727-1752","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Approach to Enhanced Cancelable Multi-Biometrics Personal Identification Based on Incremental Deep Learning"],"prefix":"10.32604","volume":"83","author":[{"given":"Ali","family":"Batouche","sequence":"first","affiliation":[]},{"given":"Souham","family":"Meshoul","sequence":"additional","affiliation":[]},{"given":"Hadil","family":"Shaiba","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Batouche","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"2667","DOI":"10.3390\/electronics13132667","article-title":"The role of machine learning in advanced biometric systems","volume":"13","author":"Ghilom","year":"2024 Jul 7","journal-title":"Electronics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"102716","DOI":"10.1016\/j.inffus.2024.102716","article-title":"Deep learning techniques for hand vein biometrics: a comprehensive review","volume":"114","author":"Hemis","year":"2025 Feb","journal-title":"Inf Fusion"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3403","DOI":"10.1007\/s10462-019-09767-8","article-title":"Cancelable biometrics: a comprehensive survey","volume":"53","author":"Kumar","year":"2020 Jun","journal-title":"Artif Intell Rev"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3614","DOI":"10.1109\/TPAMI.2020.2981604","article-title":"Recent advances in open set recognition: a survey","volume":"43","author":"Geng","year":"2021 Oct","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref5","series-title":"SpringerBriefs in computer science","first-page":"1","article-title":"Continuous biometric authentication systems","author":"Smith-Creasey","year":"2024 [cited 2024 Nov 22]"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1147\/sj.403.0614","article-title":"Enhancing security and privacy in biometrics-based authentication systems","volume":"40","author":"Ratha","year":"2001","journal-title":"IBM Syst J"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"6039","DOI":"10.3390\/s22166039","article-title":"Convolutional neural network approach based on multimodal biometric system with fusion of face and finger vein features","volume":"22","author":"Wang","year":"2022 Aug 12","journal-title":"Sensors"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3653","DOI":"10.3390\/s23073653","article-title":"Recognition performance analysis of a multimodal biometric system based on the fusion of 3D ultrasound hand-geometry and palmprint","volume":"23","author":"Micucci","year":"2023 Mar 31","journal-title":"Sensors"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"5362","DOI":"10.1109\/TPAMI.2024.3367329","article-title":"A comprehensive survey of continual learning: theory, method and application","volume":"46","author":"Wang","year":"2024 Aug","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.inffus.2019.12.004","article-title":"Continual learning for robotics: definition, framework, learning strategies, opportunities and challenges","volume":"58","author":"Lesort","year":"2020 Jun","journal-title":"Inf Fusion"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1007\/978-3-030-01252-6_33","author":"Chaudhry","year":"2018 [cited 2024 Sep 26]","journal-title":"Computer vision\u2014ECCV 2018 [Internet]"},{"key":"ref12","unstructured":"Lopez-Paz D, Ranzato M. Gradient episodic memory for continual learning. arXiv:1706.08840. 2017."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"8647","DOI":"10.1007\/s10462-022-10237-x","article-title":"Biometrics recognition using deep learning: a survey","volume":"56","author":"Minaee","year":"2023 Aug","journal-title":"Artif Intell Rev"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"15189","DOI":"10.1007\/s00500-020-04856-1","article-title":"Fusion of deep-learned and hand-crafted features for cancelable recognition systems","volume":"24","author":"Abdellatef","year":"2020 Oct","journal-title":"Soft Comput"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"31557","DOI":"10.1007\/s11042-019-07848-y","article-title":"Cancelable fusion-based face recognition","volume":"78","author":"Abdellatef","year":"2019 Nov","journal-title":"Multimed Tools Appl"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"5810","DOI":"10.1016\/j.jksuci.2022.01.014","article-title":"A cancelable biometric identification scheme based on bloom filter and format-preserving encryption","volume":"34","author":"Bansal","year":"2022 Sep","journal-title":"J King Saud Univ\u2014Comput Inf Sci"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"8531","DOI":"10.1109\/ACCESS.2023.3239387","article-title":"A review on protection and cancelable techniques in biometric systems","volume":"11","author":"Bernal-Romero","year":"2023","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TSMCB.2009.2037131","article-title":"An analysis of random projection for changeable and privacy-preserving biometric verification","volume":"40","author":"Yongjin","year":"2010 Oct","journal-title":"IEEE Trans Syst, Man, Cybern B"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.3390\/s21051568","article-title":"Efficiently updating ECG-based biometric authentication based on incremental learning","volume":"21","author":"Kim","year":"2021 Feb 24","journal-title":"Sensors"},{"key":"ref20","article-title":"Online person identification based on multitask learning","volume":"13","author":"Anak Joseph","year":"2021 Feb 11 [cited 2024 Sep 25]","journal-title":"IJIE [Internet]"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.neucom.2021.09.055","article-title":"A generic framework for deep incremental cancelable template generation","volume":"467","author":"Singh","year":"2022 Jan","journal-title":"Neurocomputing"},{"key":"ref22","first-page":"100210","article-title":"A-iLearn: an adaptive incremental learning model for spoof fingerprint detection","volume":"7","author":"Agarwal","year":"2022 Mar","journal-title":"Mach Learn Appl"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.knosys.2017.03.014","article-title":"Distributed incremental fingerprint identification with reduced database penetration rate using a hierarchical classification based on feature fusion and selection","volume":"126","author":"Peralta","year":"2017 Jun","journal-title":"Knowl Based Syst"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.patcog.2015.11.013","article-title":"Incremental granular relevance vector machine: a case study in multimodal biometrics","volume":"56","author":"Mehrotra","year":"2016 Aug","journal-title":"Pattern Recognit"},{"key":"ref25","series-title":"2020 IEEE International Joint Conference on Biometrics (IJCB) [Internet]","first-page":"1","article-title":"iLGaCo: incremental learning of gait covariate factors","author":"Mu","year":"2020 [cited 2024 Nov 22]"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/978-3-031-20233-9_43","author":"Kang","year":"2022 [cited 2024 Nov 22]","journal-title":"Biometric recognition [Internet]"},{"key":"ref27","series-title":"2021 IEEE International Symposium on Information Theory (ISIT) [Internet]","first-page":"3196","article-title":"Incremental design of secure biometric identification and authentication","author":"Zhou","year":"2021 [cited 2024 Nov 22]"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1589","DOI":"10.1109\/JIOT.2023.3289935","article-title":"IncreAuth: incremental-learning-based behavioral biometric authentication on smartphones","volume":"11","author":"Shen","year":"2024 Jan 1","journal-title":"IEEE Internet Things J"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"108885","DOI":"10.1016\/j.patcog.2022.108885","article-title":"Incremental learning from low-labelled stream data in open-set video face recognition","volume":"131","author":"Lopez-Lopez","year":"2022 Nov","journal-title":"Pattern Recognit"},{"key":"ref30","unstructured":"Shehu YI, Ruiz-Garcia A, Palade V, James A. Sokoto coventry fingerprint dataset [Internet]. arXiv:1807.10609. 2018."},{"key":"ref31","unstructured":"Face recognition dataset [Internet]. [cited 2024 Sep 26]. Available from: https:\/\/www.kaggle.com\/datasets\/vasukipatel\/face-recognition-dataset."},{"key":"ref32","first-page":"5","article-title":"Iris biometrics: a legal invasion of privacy?","volume":"2013","author":"Gold","year":"2013 Mar","journal-title":"Biom Technol Today"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"15151","DOI":"10.1007\/s11042-021-10622-8","article-title":"Soft biometrics: a survey: benchmark analysis, open challenges and recommendations","volume":"83","author":"Hassan","year":"2021 Mar 2","journal-title":"Multimed Tools Appl"},{"key":"ref34","unstructured":"Arpit D, Nwogu I, Srivastava G, Govindaraju V. An analysis of random projections in cancelable biometrics [Internet].  2014 [cited 2025 Feb 1]. Available from: https:\/\/arxiv.org\/abs\/1401.4489."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1002\/rsa.10073","article-title":"An elementary proof of a theorem of Johnson and Lindenstrauss","volume":"22","author":"Dasgupta","year":"2003 Jan","journal-title":"Random Struct Algorithms"},{"key":"ref36","unstructured":"Almondo4\/BioIncremt [Internet]. GitHub. [cited 2025 Jan 4]. Available from: https:\/\/github.com\/Almondo4\/BioIncremt."},{"key":"ref37","first-page":"1","article-title":"Avalanche: a pytorch library for deep continual learning","volume":"24","author":"Carta","year":"2023","journal-title":"J Mach Learn Res"},{"key":"ref38","series-title":"2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","first-page":"3595","article-title":"Avalanche: an end-to-end library for continual learning","author":"Lomonaco","year":"2021"},{"key":"ref39","unstructured":"Kirkpatrick J, Pascanu R, Rabinowitz N, Veness J, Desjardins G, Rusu AA, et al. Overcoming catastrophic forgetting in neural networks. 2016 [cited 2023 Aug 12]. Available from: https:\/\/arxiv.org\/abs\/1612.00796."},{"key":"ref40","series-title":"Proceedings of the 32nd International Conference on Very Large Data Bases","first-page":"607","article-title":"On biased reservoir sampling in the presence of stream evolution","author":"Aggarwal","year":"2006"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"104285","DOI":"10.1016\/j.cose.2024.104285","article-title":"A classifications framework for continuous biometric authentication (2018\u20132024)","volume":"150","author":"Boshoff","year":"2025 Mar","journal-title":"Comput Secur"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"102144","DOI":"10.1016\/j.inffus.2023.102144","article-title":"Biometric template attacks and recent protection mechanisms: a survey","volume":"103","author":"Abdullahi","year":"2024 Mar","journal-title":"Inf Fusion"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"3828","DOI":"10.1109\/TDSC.2022.3213704","article-title":"Cancelable fingerprint template construction using vector permutation and shift-ordering","volume":"20","author":"Abdullahi","year":"2023 Sep 1","journal-title":"IEEE Trans Dependable Secure Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_63227\/TSP_CMC_63227.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:07:45Z","timestamp":1763341665000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":43,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063227","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}