Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server
In recent years, biometric authentication system ( BAS ) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems ( MBS ) have been extensively accepted in various fields. The m...
Saved in:
| Published in: | Applied intelligence (Dordrecht, Netherlands) Vol. 50; no. 9; pp. 2848 - 2866 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Springer US
01.09.2020
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0924-669X, 1573-7497 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In recent years, biometric authentication system (
BAS
) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems (
MBS
) have been extensively accepted in various fields. The main step in
MBS
is information fusion. On the other hand, directly storing the fused templates into a centralized server leads to privacy concerns. Recently, many
BAS
based on homomorphic encryption has been introduced to provide confidentiality for the fused templates. However, most of the existing solutions rely on an implication of the assumption that the server is “Honest-but-Curious”. As a result, the compromise of such server results into entire system vulnerability. To address this, we propose a novel
P
rivacy
P
reserving (
PP
) multi-instance iris remote authentication system to accord with attacks at the malicious server and over the transmission channel. Our scheme uses
F
ully
H
omomorphic
E
ncryption (
FHE
) to achieve the confidentiality of the fused iris templates and polynomial factorization algorithm to achieve the integrity of the matching result. We propose a
PP
iris authentication system using
P
rivate
M
ulti-
C
lass
P
erceptron (
PMCP
) by using the properties of
FHE
. Moreover, we propose
C
ontradistinguish
S
imilarity
A
nalysis (
CSA
), a feature level fusion technique that minimizes the between-class correlations and maximizes the pair-wise correlations. Our method has experimented on IITD and CASIA-V3-Interval iris databases to check the effectiveness and robustness. Experimental results show that our method provides improved accuracy, and eliminates the need to trust the cloud server when compared to the state-of-the-art approaches. |
|---|---|
| AbstractList | In recent years, biometric authentication system (
BAS
) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems (
MBS
) have been extensively accepted in various fields. The main step in
MBS
is information fusion. On the other hand, directly storing the fused templates into a centralized server leads to privacy concerns. Recently, many
BAS
based on homomorphic encryption has been introduced to provide confidentiality for the fused templates. However, most of the existing solutions rely on an implication of the assumption that the server is “Honest-but-Curious”. As a result, the compromise of such server results into entire system vulnerability. To address this, we propose a novel
P
rivacy
P
reserving (
PP
) multi-instance iris remote authentication system to accord with attacks at the malicious server and over the transmission channel. Our scheme uses
F
ully
H
omomorphic
E
ncryption (
FHE
) to achieve the confidentiality of the fused iris templates and polynomial factorization algorithm to achieve the integrity of the matching result. We propose a
PP
iris authentication system using
P
rivate
M
ulti-
C
lass
P
erceptron (
PMCP
) by using the properties of
FHE
. Moreover, we propose
C
ontradistinguish
S
imilarity
A
nalysis (
CSA
), a feature level fusion technique that minimizes the between-class correlations and maximizes the pair-wise correlations. Our method has experimented on IITD and CASIA-V3-Interval iris databases to check the effectiveness and robustness. Experimental results show that our method provides improved accuracy, and eliminates the need to trust the cloud server when compared to the state-of-the-art approaches. In recent years, biometric authentication system (BAS) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems (MBS) have been extensively accepted in various fields. The main step in MBS is information fusion. On the other hand, directly storing the fused templates into a centralized server leads to privacy concerns. Recently, many BAS based on homomorphic encryption has been introduced to provide confidentiality for the fused templates. However, most of the existing solutions rely on an implication of the assumption that the server is “Honest-but-Curious”. As a result, the compromise of such server results into entire system vulnerability. To address this, we propose a novel P rivacy P reserving (PP) multi-instance iris remote authentication system to accord with attacks at the malicious server and over the transmission channel. Our scheme uses F ully H omomorphic E ncryption (FHE) to achieve the confidentiality of the fused iris templates and polynomial factorization algorithm to achieve the integrity of the matching result. We propose a PP iris authentication system using P rivate M ulti-C lass P erceptron (PMCP) by using the properties of FHE. Moreover, we propose C ontradistinguish S imilarity A nalysis (CSA), a feature level fusion technique that minimizes the between-class correlations and maximizes the pair-wise correlations. Our method has experimented on IITD and CASIA-V3-Interval iris databases to check the effectiveness and robustness. Experimental results show that our method provides improved accuracy, and eliminates the need to trust the cloud server when compared to the state-of-the-art approaches. |
| Author | Morampudi, Mahesh Kumar Raju, U. S. N. Prasad, Munaga V. N. K. Veldandi, Sowmya |
| Author_xml | – sequence: 1 givenname: Mahesh Kumar orcidid: 0000-0002-6888-4637 surname: Morampudi fullname: Morampudi, Mahesh Kumar email: morampudimahesh@gmail.com organization: Centre for Affordable Technologies Lab, Institute for Development and Research in Banking Technology, National Institute of Technology – sequence: 2 givenname: Sowmya surname: Veldandi fullname: Veldandi, Sowmya organization: Atal Bihari Vajpayee Indian Institute of Information Technology and Management – sequence: 3 givenname: Munaga V. N. K. surname: Prasad fullname: Prasad, Munaga V. N. K. organization: Centre for Affordable Technologies Lab, Institute for Development and Research in Banking Technology – sequence: 4 givenname: U. S. N. surname: Raju fullname: Raju, U. S. N. organization: National Institute of Technology |
| BookMark | eNp9kMtKAzEUhoNUsK2-gKsB19FkkpkkSyneQHGj4C6kmdM2ZSZTk0zBtzd2BMFFIXAW-b9z-WZo4nsPCF1Sck0JETeREi4VJiXBhNaSYnWCprQSDAuuxARNiSo5rmv1cYZmMW4JIYwROkWbl6FNDjsfk_EWChdcLAJ0fYLCDGkDPjlrkut9MUTn18UuuL3Jn92Bs62JsdhBsLBLIYfy60zrrOuHWNi2H5oiQthDOEenK9NGuPitc_R-f_e2eMTPrw9Pi9tnbBlVCVO-pMRUXBjBuKpk1VC7LJXJp9QrkGBF2XDGBUjb0LquSUPBKlWxDAhQhs3R1dh3F_rPAWLS234IPo_UJS9lKSSlJKfKMWVDH2OAlc53dSZ8aUr0j1E9GtXZqD4Y1SpD8h9kXTq4ScG49jjKRjTmOX4N4W-rI9Q3oTiOnw |
| CitedBy_id | crossref_primary_10_1007_s41870_021_00819_3 crossref_primary_10_1007_s10489_021_02401_7 crossref_primary_10_1109_ACCESS_2024_3501368 crossref_primary_10_1088_1742_6596_2030_1_012063 crossref_primary_10_1007_s10489_022_03193_0 crossref_primary_10_1088_1742_6596_1650_3_032075 |
| Cites_doi | 10.1109/TIFS.2016.2569061 10.1186/1687-417X-2011-3 10.1109/MSP.2018.3761723 10.1016/j.patcog.2009.08.016 10.1016/j.patcog.2004.12.013 10.1109/MSECP.2003.1193209 10.1109/MSP.2015.2434151 10.1002/sec.1164 10.1109/TCSVT.2003.818350 10.1109/MSP.2015.2437652 10.1016/j.patcog.2017.01.024 10.1007/s10623-012-9720-4 10.1186/s13635-016-0049-9 10.1007/s10623-015-0079-1 10.1016/j.eswa.2019.01.010 10.1186/1687-417X-2007-037343 10.1109/TIFS.2015.2416688 10.1016/S0031-3203(02)00262-5 10.1109/TIFS.2011.2108650 10.1109/83.913594 10.1155/2008/579416 10.1109/TIFS.2014.2384735 10.1016/j.patcog.2019.04.010 10.1016/j.asoc.2018.02.047 10.1109/TIFS.2011.2108288 10.1098/rspb.2001.1696 10.1108/IJPCC-02-2015-0012 10.1007/s11042-017-4668-z 10.1145/581571.581573 10.1007/s10044-017-0656-1 10.1007/3-540-48910-X_16 10.1109/CCC.2010.26 10.1007/978-3-642-36362-7_1 10.1109/TETC.2018.2794611 10.1109/ICCUBEA.2018.8697811 10.1007/978-3-642-13190-5_1 10.1109/CCST.2006.313444 10.1007/978-3-642-14623-7_25 10.1145/1101149.1101236 10.1007/978-3-642-42045-0_16 10.1007/978-1-4471-6784-6_16 10.1007/978-3-642-29011-4_28 10.1007/s10462-019-09776-7 10.1007/978-3-642-23822-2_11 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8FD 8FE 8FG 8FK 8FL ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L6V L7M L~C L~D M0C M0N M7S P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PSYQQ PTHSS Q9U |
| DOI | 10.1007/s10489-020-01681-9 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Global (Alumni Edition) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Materials Science & Engineering Collection ProQuest Central (Alumni Edition) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection ProQuest Technology Collection ProQuest One Community College ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest One Psychology Engineering Collection ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business ProQuest One Psychology Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Engineering Collection Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing Engineering Database ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7497 |
| EndPage | 2866 |
| ExternalDocumentID | 10_1007_s10489_020_01681_9 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C -~X .86 .DC .VR 06D 0R~ 0VY 1N0 1SB 2.D 203 23M 28- 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 77K 7WY 8FE 8FG 8FL 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABIVO ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTAH ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW L6V LAK LLZTM M0C M0N M4Y M7S MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PSYQQ PT4 PT5 PTHSS Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7X Z7Z Z81 Z83 Z88 Z8M Z8N Z8R Z8T Z8U Z8W Z92 ZMTXR ZY4 ~A9 ~EX 77I AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D PKEHL PQEST PQUKI Q9U |
| ID | FETCH-LOGICAL-c319t-14b10a547a7349585d1cb29a5736fe8ec72d4347e8cd16660d1ec99537a77e9a3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000522011800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0924-669X |
| IngestDate | Wed Nov 05 14:50:12 EST 2025 Tue Nov 18 22:24:54 EST 2025 Sat Nov 29 05:33:20 EST 2025 Fri Feb 21 02:26:54 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 9 |
| Keywords | Fully homomorphic encryption Contradistinguish similarity analysis Correlation analysis Private multi-class perceptron Multi-biometric systems |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-14b10a547a7349585d1cb29a5736fe8ec72d4347e8cd16660d1ec99537a77e9a3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6888-4637 |
| PQID | 2428278110 |
| PQPubID | 326365 |
| PageCount | 19 |
| ParticipantIDs | proquest_journals_2428278110 crossref_primary_10_1007_s10489_020_01681_9 crossref_citationtrail_10_1007_s10489_020_01681_9 springer_journals_10_1007_s10489_020_01681_9 |
| PublicationCentury | 2000 |
| PublicationDate | 20200900 2020-09-00 20200901 |
| PublicationDateYYYYMMDD | 2020-09-01 |
| PublicationDate_xml | – month: 9 year: 2020 text: 20200900 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Boston |
| PublicationSubtitle | The International Journal of Research on Intelligent Systems for Real Life Complex Problems |
| PublicationTitle | Applied intelligence (Dordrecht, Netherlands) |
| PublicationTitleAbbrev | Appl Intell |
| PublicationYear | 2020 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Fan, Vercauteren (CR38) 2012; 2012 Kumar, Passi (CR47) 2010; 43 CR39 CR36 CR35 Orlandi, Piva, Barni (CR43) 2007; 2007 Gomez-Barrero, Maiorana, Galbally, Campisi, Fierrez (CR28) 2017; 67 CR33 Libert, Peters, Joye, Yung (CR37) 2015; 77 CR31 Sun, Zeng, Liu, Heng, Xia (CR9) 2005; 38 Hadid, Evans, Marcel, Fierrez (CR52) 2015; 32 CR2 Jain, Nandakumar, Nagar (CR20) 2008; 2008 Maiorana, Hine, Campisi (CR21) 2014; 10 CR4 CR3 Yasuda, Shimoyama, Kogure, Yokoyama, Koshiba (CR30) 2015; 8 CR6 Al-Waisy, Qahwaji, Ipson, Al-Fahdawi, Nagem (CR12) 2018; 21 CR48 CR46 CR44 Smart, Vercauteren (CR40) 2014; 71 CR41 Daugman (CR1) 2004; 14 Liu, Huang, Rong, Wang, Xian (CR32) 2015; 10 Mosca (CR49) 2018; 16 Liu, Wechsler (CR7) 2001; 10 Yang, Jy, Zhang, Jf (CR8) 2003; 36 Rathgeb, Uhl (CR23) 2011; 2011 Alberto Torres, Bhattacharjee, Srinivasan (CR29) 2015; 11 Rathgeb, Tams, Wagner, Busch (CR13) 2016; 2016 Venugopalan, Savvides (CR19) 2011; 6 CR18 CR11 Anderson, Cobb, Korpela, Lebofsky, Werthimer (CR45) 2002; 45 CR51 Setty, McPherson, Blumberg, Walfish (CR34) 2012; 1 CR50 Barni, Failla, Lazzeretti, Sadeghi, Schneider (CR42) 2011; 6 Haghighat, Abdel-Mottaleb, Alhalabi (CR10) 2016; 11 Patel, Ratha, Chellappa (CR24) 2015; 32 Barpanda, Sa, Marques, Majhi, Bakshi (CR14) 2018; 77 Sardar, Mitra, Shankar (CR15) 2018; 67 Zhao, Kumar (CR17) 2019; 93 Fontaine, Galand (CR25) 2007; 2007 CR27 CR26 Prabhakar, Pankanti, Jain (CR22) 2003; 2 Daugman, Downing (CR5) 2001; 268 Arsalan, Kim, Lee, Owais, Park (CR16) 2019; 122 1681_CR41 J Yang (1681_CR8) 2003; 36 J Liu (1681_CR32) 2015; 10 M Yasuda (1681_CR30) 2015; 8 ST Setty (1681_CR34) 2012; 1 C Liu (1681_CR7) 2001; 10 C Orlandi (1681_CR43) 2007; 2007 WA Alberto Torres (1681_CR29) 2015; 11 DP Anderson (1681_CR45) 2002; 45 B Libert (1681_CR37) 2015; 77 AK Jain (1681_CR20) 2008; 2008 J Daugman (1681_CR5) 2001; 268 AS Al-Waisy (1681_CR12) 2018; 21 1681_CR48 S Prabhakar (1681_CR22) 2003; 2 C Rathgeb (1681_CR13) 2016; 2016 1681_CR44 E Maiorana (1681_CR21) 2014; 10 A Kumar (1681_CR47) 2010; 43 1681_CR46 1681_CR31 M Mosca (1681_CR49) 2018; 16 M Arsalan (1681_CR16) 2019; 122 VM Patel (1681_CR24) 2015; 32 Z Zhao (1681_CR17) 2019; 93 1681_CR39 NP Smart (1681_CR40) 2014; 71 1681_CR33 1681_CR36 SS Barpanda (1681_CR14) 2018; 77 1681_CR35 M Barni (1681_CR42) 2011; 6 J Daugman (1681_CR1) 2004; 14 1681_CR27 1681_CR26 1681_CR2 M Haghighat (1681_CR10) 2016; 11 1681_CR3 1681_CR4 S Venugopalan (1681_CR19) 2011; 6 QS Sun (1681_CR9) 2005; 38 1681_CR6 1681_CR51 J Fan (1681_CR38) 2012; 2012 1681_CR50 M Sardar (1681_CR15) 2018; 67 C Rathgeb (1681_CR23) 2011; 2011 M Gomez-Barrero (1681_CR28) 2017; 67 A Hadid (1681_CR52) 2015; 32 1681_CR18 C Fontaine (1681_CR25) 2007; 2007 1681_CR11 |
| References_xml | – volume: 11 start-page: 1984 issue: 9 year: 2016 end-page: 1996 ident: CR10 article-title: Discriminant correlation analysis: real-time feature level fusion for multimodal biometric recognition publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2016.2569061 – volume: 2011 start-page: 3 issue: 1 year: 2011 ident: CR23 article-title: A survey on biometric cryptosystems and cancelable biometrics publication-title: EURASIP J Inf Secur doi: 10.1186/1687-417X-2011-3 – volume: 16 start-page: 38 issue: 5 year: 2018 end-page: 41 ident: CR49 article-title: Cybersecurity in an era with quantum computers: will we be ready? publication-title: IEEE Secur Privacy doi: 10.1109/MSP.2018.3761723 – volume: 43 start-page: 1016 issue: 3 year: 2010 end-page: 1026 ident: CR47 article-title: Comparison and combination of iris matchers for reliable personal authentication publication-title: Pattern Recogn doi: 10.1016/j.patcog.2009.08.016 – volume: 38 start-page: 2437 issue: 12 year: 2005 end-page: 2448 ident: CR9 article-title: A new method of feature fusion and its application in image recognition publication-title: Pattern Recogn doi: 10.1016/j.patcog.2004.12.013 – ident: CR4 – volume: 2 start-page: 33 year: 2003 end-page: 42 ident: CR22 article-title: Biometric recognition: security and privacy concerns publication-title: IEEE Secur Privac doi: 10.1109/MSECP.2003.1193209 – ident: CR39 – volume: 32 start-page: 54 issue: 5 year: 2015 end-page: 65 ident: CR24 article-title: Cancelable biometrics: a review publication-title: IEEE Signal Process Mag doi: 10.1109/MSP.2015.2434151 – volume: 8 start-page: 2194 issue: 13 year: 2015 end-page: 2213 ident: CR30 article-title: New packing method in somewhat homomorphic encryption and its applications publication-title: Secur Commun Netw doi: 10.1002/sec.1164 – volume: 14 start-page: 21 issue: 1 year: 2004 end-page: 30 ident: CR1 article-title: How iris recognition works publication-title: IEEE Trans Cir and Sys for Video Technol doi: 10.1109/TCSVT.2003.818350 – ident: CR51 – volume: 32 start-page: 20 issue: 5 year: 2015 end-page: 30 ident: CR52 article-title: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned publication-title: IEEE Signal Process Mag doi: 10.1109/MSP.2015.2437652 – ident: CR35 – volume: 67 start-page: 149 year: 2017 end-page: 163 ident: CR28 article-title: Multi-biometric template protection based on homomorphic encryption publication-title: Pattern Recogn doi: 10.1016/j.patcog.2017.01.024 – volume: 71 start-page: 57 issue: 1 year: 2014 end-page: 81 ident: CR40 article-title: Fully homomorphic simd operations publication-title: Des Codes Cryptogr doi: 10.1007/s10623-012-9720-4 – volume: 2016 start-page: 26 issue: 1 year: 2016 ident: CR13 article-title: Unlinkable improved multi-biometric iris fuzzy vault publication-title: EURASIP J Inf Secur doi: 10.1186/s13635-016-0049-9 – volume: 77 start-page: 441 issue: 2-3 year: 2015 end-page: 477 ident: CR37 article-title: Linearly homomorphic structure-preserving signatures and their applications publication-title: Des Codes Crypt doi: 10.1007/s10623-015-0079-1 – ident: CR46 – volume: 122 start-page: 217 year: 2019 end-page: 241 ident: CR16 article-title: Fred-net: fully residual encoder–decoder network for accurate iris segmentation publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2019.01.010 – ident: CR50 – volume: 2007 start-page: 037343 issue: 1 year: 2007 ident: CR43 article-title: Oblivious neural network computing via homomorphic encryption publication-title: EURASIP J Inform Secur doi: 10.1186/1687-417X-2007-037343 – volume: 10 start-page: 1513 issue: 7 year: 2015 end-page: 1528 ident: CR32 article-title: Privacy-preserving public auditing for regenerating-code-based cloud storage publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2015.2416688 – ident: CR11 – ident: CR36 – volume: 36 start-page: 1369 issue: 6 year: 2003 end-page: 1381 ident: CR8 article-title: Feature fusion: parallel strategy vs. serial strategy publication-title: Pattern Recogn doi: 10.1016/S0031-3203(02)00262-5 – volume: 6 start-page: 452 issue: 2 year: 2011 end-page: 468 ident: CR42 article-title: Privacy-preserving ecg classification with branching programs and neural networks publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2011.2108650 – volume: 10 start-page: 598 issue: 4 year: 2001 end-page: 608 ident: CR7 article-title: A shape- and texture-based enhanced fisher classifier for face recognition publication-title: IEEE Trans Image Proc: Publ IEEE Signal Process Soc doi: 10.1109/83.913594 – ident: CR26 – volume: 1 start-page: 17 year: 2012 ident: CR34 article-title: Making argument systems for outsourced computation practical (sometimes) publication-title: NDSS – ident: CR18 – volume: 2012 start-page: 144 year: 2012 ident: CR38 article-title: Somewhat practical fully homomorphic encryption publication-title: IACR Cryptology ePrint Archive – volume: 2008 start-page: 113 year: 2008 ident: CR20 article-title: Biometric template security publication-title: EURASIP J Adv Signal Process doi: 10.1155/2008/579416 – volume: 10 start-page: 900 issue: 5 year: 2014 end-page: 915 ident: CR21 article-title: Hill-climbing attacks on multibiometrics recognition systems publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2014.2384735 – ident: CR2 – volume: 93 start-page: 546 year: 2019 end-page: 557 ident: CR17 article-title: A deep learning based unified framework to detect, segment and recognize irises using spatially corresponding features publication-title: Pattern Recogn doi: 10.1016/j.patcog.2019.04.010 – volume: 67 start-page: 61 year: 2018 end-page: 69 ident: CR15 article-title: Iris localization using rough entropy and csa: a soft computing approach publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2018.02.047 – volume: 2007 start-page: 15 year: 2007 ident: CR25 article-title: A survey of homomorphic encryption for nonspecialists publication-title: EURASIP J Inf Secur – ident: CR33 – volume: 6 start-page: 385 issue: 2 year: 2011 end-page: 395 ident: CR19 article-title: How to generate spoofed irises from an iris code template publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2011.2108288 – ident: CR6 – volume: 268 start-page: 1737 issue: 1477 year: 2001 end-page: 40 ident: CR5 article-title: Epigenetic randomness, complexity and singularity of human iris patterns publication-title: Proc Biol Sci/ R Soc doi: 10.1098/rspb.2001.1696 – ident: CR27 – ident: CR44 – volume: 11 start-page: 151 issue: 2 year: 2015 end-page: 168 ident: CR29 article-title: Privacy-preserving biometrics authentication systems using fully homomorphic encryption publication-title: Int J Pervasive Comput Commun doi: 10.1108/IJPCC-02-2015-0012 – ident: CR48 – volume: 77 start-page: 7637 issue: 6 year: 2018 end-page: 7674 ident: CR14 article-title: Iris recognition with tunable filter bank based feature publication-title: Multimed Tools Appl doi: 10.1007/s11042-017-4668-z – ident: CR3 – ident: CR31 – volume: 45 start-page: 56 issue: 11 year: 2002 end-page: 61 ident: CR45 article-title: Seti@ home: an experiment in public-resource computing publication-title: Commun ACM doi: 10.1145/581571.581573 – ident: CR41 – volume: 21 start-page: 783 issue: 3 year: 2018 end-page: 802 ident: CR12 article-title: A multi-biometric iris recognition system based on a deep learning approach publication-title: Pattern Anal Applic doi: 10.1007/s10044-017-0656-1 – volume: 11 start-page: 151 issue: 2 year: 2015 ident: 1681_CR29 publication-title: Int J Pervasive Comput Commun doi: 10.1108/IJPCC-02-2015-0012 – volume: 268 start-page: 1737 issue: 1477 year: 2001 ident: 1681_CR5 publication-title: Proc Biol Sci/ R Soc doi: 10.1098/rspb.2001.1696 – volume: 8 start-page: 2194 issue: 13 year: 2015 ident: 1681_CR30 publication-title: Secur Commun Netw doi: 10.1002/sec.1164 – volume: 11 start-page: 1984 issue: 9 year: 2016 ident: 1681_CR10 publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2016.2569061 – ident: 1681_CR3 – volume: 93 start-page: 546 year: 2019 ident: 1681_CR17 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2019.04.010 – volume: 2007 start-page: 037343 issue: 1 year: 2007 ident: 1681_CR43 publication-title: EURASIP J Inform Secur doi: 10.1186/1687-417X-2007-037343 – volume: 77 start-page: 7637 issue: 6 year: 2018 ident: 1681_CR14 publication-title: Multimed Tools Appl doi: 10.1007/s11042-017-4668-z – volume: 71 start-page: 57 issue: 1 year: 2014 ident: 1681_CR40 publication-title: Des Codes Cryptogr doi: 10.1007/s10623-012-9720-4 – ident: 1681_CR27 doi: 10.1007/3-540-48910-X_16 – volume: 67 start-page: 149 year: 2017 ident: 1681_CR28 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2017.01.024 – ident: 1681_CR50 doi: 10.1109/CCC.2010.26 – volume: 2011 start-page: 3 issue: 1 year: 2011 ident: 1681_CR23 publication-title: EURASIP J Inf Secur doi: 10.1186/1687-417X-2011-3 – volume: 32 start-page: 54 issue: 5 year: 2015 ident: 1681_CR24 publication-title: IEEE Signal Process Mag doi: 10.1109/MSP.2015.2434151 – volume: 10 start-page: 1513 issue: 7 year: 2015 ident: 1681_CR32 publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2015.2416688 – ident: 1681_CR41 doi: 10.1007/978-3-642-36362-7_1 – volume: 14 start-page: 21 issue: 1 year: 2004 ident: 1681_CR1 publication-title: IEEE Trans Cir and Sys for Video Technol doi: 10.1109/TCSVT.2003.818350 – ident: 1681_CR33 – volume: 1 start-page: 17 year: 2012 ident: 1681_CR34 publication-title: NDSS – volume: 122 start-page: 217 year: 2019 ident: 1681_CR16 publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2019.01.010 – ident: 1681_CR31 doi: 10.1109/TETC.2018.2794611 – volume: 2007 start-page: 15 year: 2007 ident: 1681_CR25 publication-title: EURASIP J Inf Secur – volume: 77 start-page: 441 issue: 2-3 year: 2015 ident: 1681_CR37 publication-title: Des Codes Crypt doi: 10.1007/s10623-015-0079-1 – volume: 6 start-page: 452 issue: 2 year: 2011 ident: 1681_CR42 publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2011.2108650 – ident: 1681_CR11 doi: 10.1109/ICCUBEA.2018.8697811 – volume: 38 start-page: 2437 issue: 12 year: 2005 ident: 1681_CR9 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2004.12.013 – volume: 6 start-page: 385 issue: 2 year: 2011 ident: 1681_CR19 publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2011.2108288 – volume: 36 start-page: 1369 issue: 6 year: 2003 ident: 1681_CR8 publication-title: Pattern Recogn doi: 10.1016/S0031-3203(02)00262-5 – ident: 1681_CR2 – ident: 1681_CR48 doi: 10.1007/978-3-642-13190-5_1 – volume: 45 start-page: 56 issue: 11 year: 2002 ident: 1681_CR45 publication-title: Commun ACM doi: 10.1145/581571.581573 – volume: 10 start-page: 598 issue: 4 year: 2001 ident: 1681_CR7 publication-title: IEEE Trans Image Proc: Publ IEEE Signal Process Soc doi: 10.1109/83.913594 – ident: 1681_CR51 doi: 10.1109/CCST.2006.313444 – ident: 1681_CR35 doi: 10.1007/978-3-642-14623-7_25 – ident: 1681_CR46 – volume: 67 start-page: 61 year: 2018 ident: 1681_CR15 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2018.02.047 – volume: 2016 start-page: 26 issue: 1 year: 2016 ident: 1681_CR13 publication-title: EURASIP J Inf Secur doi: 10.1186/s13635-016-0049-9 – volume: 16 start-page: 38 issue: 5 year: 2018 ident: 1681_CR49 publication-title: IEEE Secur Privacy doi: 10.1109/MSP.2018.3761723 – ident: 1681_CR6 doi: 10.1145/1101149.1101236 – volume: 10 start-page: 900 issue: 5 year: 2014 ident: 1681_CR21 publication-title: IEEE Trans Inform Forens Secur doi: 10.1109/TIFS.2014.2384735 – ident: 1681_CR4 – ident: 1681_CR36 doi: 10.1007/978-3-642-42045-0_16 – ident: 1681_CR39 doi: 10.1007/978-1-4471-6784-6_16 – ident: 1681_CR44 doi: 10.1007/978-3-642-29011-4_28 – volume: 32 start-page: 20 issue: 5 year: 2015 ident: 1681_CR52 publication-title: IEEE Signal Process Mag doi: 10.1109/MSP.2015.2437652 – volume: 2012 start-page: 144 year: 2012 ident: 1681_CR38 publication-title: IACR Cryptology ePrint Archive – volume: 2008 start-page: 113 year: 2008 ident: 1681_CR20 publication-title: EURASIP J Adv Signal Process doi: 10.1155/2008/579416 – ident: 1681_CR18 doi: 10.1007/s10462-019-09776-7 – volume: 2 start-page: 33 year: 2003 ident: 1681_CR22 publication-title: IEEE Secur Privac doi: 10.1109/MSECP.2003.1193209 – ident: 1681_CR26 doi: 10.1007/978-3-642-23822-2_11 – volume: 43 start-page: 1016 issue: 3 year: 2010 ident: 1681_CR47 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2009.08.016 – volume: 21 start-page: 783 issue: 3 year: 2018 ident: 1681_CR12 publication-title: Pattern Anal Applic doi: 10.1007/s10044-017-0656-1 |
| SSID | ssj0003301 |
| Score | 2.2707858 |
| Snippet | In recent years, biometric authentication system (
BAS
) has become the most promising and popular authentication system in identity management. Due to its... In recent years, biometric authentication system (BAS) has become the most promising and popular authentication system in identity management. Due to its... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2848 |
| SubjectTerms | Algorithms Artificial Intelligence Authentication Biometrics Computer Science Confidentiality Correlation analysis Data integration Encryption Machines Manufacturing Mechanical Engineering Polynomials Privacy Processes |
| SummonAdditionalLinks | – databaseName: Computer Science Database dbid: K7- link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFA86PXhxfuJ0Sg7eNNi0aT5OIuIQhOFBYbeSJqkOtJtdt7_fJEtXFNxF6K1JCPzeS957-b33ALi0HkOcMy0RJ0WOCI1yJIooQakqODEqNSyRvtkEGw75aCSeQ8BtFmiVzZnoD2o9US5GfmOvEh67tMjodvqFXNco97oaWmhsgi0cx9jJ-RNDq5PY-uq-Y571MRClYhSSZkLqHHFkodjRsijHSPy8mFpr89cDqb93Bt3_7ngP7AaLE94tRWQfbJjyAHSbbg4wKPchePe5uGjs7UVl4NiqP6yMhdJA6XjwZR3ie9CR5d-g3fDCWqrQcxKRcmY4nC55MpUdZL9Pa-QrR7KF6mMy19BFgE11BF4HDy_3jyj0YUDKKmiNMMlxJFPCJEusP8VTjVUeC5myhBaGG8ViTRLCDFfavUJGGhslRJrYCcwImRyDTjkpzQmAVOeS5pEmxnCiOJZFJIU1KQTDQkZU9QBuQMhUKFLuemV8ZG15ZQdcZoHLPHCZ6IGr1ZzpskTH2tH9Bq0sqOssa6HqgesG7_b336udrl_tDOzEXsQcJ60POnU1N-dgWy3q8ay68ML6DUN87_k priority: 102 providerName: ProQuest |
| Title | Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server |
| URI | https://link.springer.com/article/10.1007/s10489-020-01681-9 https://www.proquest.com/docview/2428278110 |
| Volume | 50 |
| WOSCitedRecordID | wos000522011800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1573-7497 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003301 issn: 0924-669X databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58Hby4PnF9LDl400Dapk1y1EURxGXxuXopaZrqgq7SXf39TrKtq6KCQgmUPAiTTPJN8k0GYActhjATuaaSFxnlCcuoKlhEY1NIbk1sRaR9sAnR6cheT3Urp7BhzXavryT9Sv3B2Y07ek_oiFSJDKiahlnc7qRTx7Pzq_f1Fy10HycPLQuaJKpXucp838bn7WiCMb9ci_rd5qjxv34uwkKFLsn-eDoswZQdLEOjjtxAKkVegXvvd0v7HhsaS_qo6qS0OGyWaMd5H4yqszziiPF3BLvwiqiUeP4hNQ5yk-cxJ6bEQvg9IqA3jlBLzMPTS07caa8tV-Hy6PCifUyrmAvUoDKOaMCzgOmYCy0itJ1knAcmC5WORZQUVlojwpxHXFhpcnfjyPLAGqXiCCsIq3S0BjODp4FdB5LkmU4ylnNrJTcy0AXTCuGDEoHSLDFNCGrRp6Z6kNzFxXhIJ08pO1GmKMrUizJVTdh9r_M8fo7j19Jb9YimlWoOU8QkMnT-tawJe_UITrJ_bm3jb8U3YT70k8Dx0bZgZlS-2G2YM6-j_rBswbS4vmnB7MFhp3uGfyeCYnrK2i4V55h249uWn9hvTkzssA |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VgkQvlE91oYAPcAILJ3Zi-1BVqKVq1bLiUKS9BceewEpld8lui_hT_EbG3qQrkNpbD0i5-UOK_Tyesd_4AbyiiCGvdXDcqKbmqhQ1t42QvPCNUegL1NIlsQk9HJrRyH5ag999LkykVfY2MRnqMPXxjPwdbSUmj2mRYnf2g0fVqHi72ktoLGFxjL9-Usg23znap_l9necHH073DnmnKsA9wW3BM1VnwhVKOy0pOjBFyHydW1doWTZo0Os8KKk0Gh_inZoIGXprC0kNNFonqd9bcFspWg6RKij2Li2_lEluWVBMw8vSjroknS5VT0VyUh5pYKXJuP17I1x5t_9cyKZ97mDzfxuh-3Cv86jZ--USeABrOHkIm71aBeuM1yP4lnKN-Tj5wx7ZmMwba5GgisxFnv9k0Z1fspgM8JXRAF2QJ84S55L7GGaw2ZIH1FIl-r5TEOMjiZj5s-l5YPGEG9vH8PlG_vcJrE-mE9wCVobalbUICtEobzLXCGfJZbI6s06UfgBZP-mV7x5hj1ogZ9Xq-egIlIqAUiWgVHYAby7bzJZPkFxbe7tHR9WZo3m1gsYA3vb4WhVf3dvT63t7CXcPTz-eVCdHw-NnsJEneEf-3TasL9pzfA53_MViPG9fpIXC4MtN4-4PisdLWw |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9MwGH41NoS4sPExUdiGD3ACa07sxPZhmhBbxVRU7QBSb8GxHai0tSXthvhr_Dpeu84qJm23HSblFttSnMfvh_28fgDeYsaQ19IZqkRTU1GymuqGcVrYRglvCy-5iWITcjhUo5E-XYO_XS1MoFV2NjEaaje1YY98H12JykNZJNtvEi3i9Kh_OPtFg4JUOGnt5DSWEBn4P78xfZsfnBzhv36X5_3jr58-06QwQC1Cb0EzUWfMFEIayTFTUIXLbJ1rU0heNl55K3MnuJBeWRfO15jLvNW64NhBem04jvsANtALF2GNDSS98gKcR-llhvkNLUs9SgU7qWxPBKJSHihhpcqo_t8priLda4ez0ef1N-_zbG3BkxRpk4_LpfEU1vzkGWx2KhYkGbXn8DPWINNxjJOtJ2M0e6T1CGFPTOD_TxZpX5OEIoEfBCfrEiN0ErmY1Ib0g8yW_KAWG-FzjsmNDeRiYs-mF46EnW_fvoBvd_K927A-mU78SyClq01ZMye8V8KqzDTMaAyltMy0YaXtQdYBoLLpcvagEXJWra6VDqCpEDRVBE2le_D-qs9seTXJra13OqRUyUzNqxVMevChw9rq9c2jvbp9tDfwCOFWfTkZDl7D4zwiPdDydmB90V74XXhoLxfjebsX1wyB73cNu38KaVQB |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi-instance+iris+remote+authentication+using+private+multi-class+perceptron+on+malicious+cloud+server&rft.jtitle=Applied+intelligence+%28Dordrecht%2C+Netherlands%29&rft.au=Morampudi%2C+Mahesh+Kumar&rft.au=Veldandi%2C+Sowmya&rft.au=Prasad%2C+Munaga+V.+N.+K.&rft.au=Raju%2C+U.+S.+N.&rft.date=2020-09-01&rft.issn=0924-669X&rft.eissn=1573-7497&rft.volume=50&rft.issue=9&rft.spage=2848&rft.epage=2866&rft_id=info:doi/10.1007%2Fs10489-020-01681-9&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10489_020_01681_9 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-669X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-669X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-669X&client=summon |