A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things
Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of b...
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 19; no. 13; p. 2985 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
06.07.2019
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique—steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques. |
---|---|
AbstractList | Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique-steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique-steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques. Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique—steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques. |
Author | Valli, Craig Yang, Wencheng Hu, Jiankun Ibrahim, Ahmed Wang, Song Johnstone, Michael N. Macedo, Marcelo Jose Zheng, Guanglou |
AuthorAffiliation | 1 Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia 2 Department of Engineering, La Trobe University, Melbourne, VIC 3083, Australia 3 School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2600, Australia |
AuthorAffiliation_xml | – name: 3 School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2600, Australia – name: 2 Department of Engineering, La Trobe University, Melbourne, VIC 3083, Australia – name: 1 Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia |
Author_xml | – sequence: 1 givenname: Wencheng orcidid: 0000-0001-7800-2215 surname: Yang fullname: Yang, Wencheng – sequence: 2 givenname: Song surname: Wang fullname: Wang, Song – sequence: 3 givenname: Jiankun surname: Hu fullname: Hu, Jiankun – sequence: 4 givenname: Ahmed orcidid: 0000-0002-4760-3533 surname: Ibrahim fullname: Ibrahim, Ahmed – sequence: 5 givenname: Guanglou orcidid: 0000-0002-2307-9562 surname: Zheng fullname: Zheng, Guanglou – sequence: 6 givenname: Marcelo Jose surname: Macedo fullname: Macedo, Marcelo Jose – sequence: 7 givenname: Michael N. surname: Johnstone fullname: Johnstone, Michael N. – sequence: 8 givenname: Craig surname: Valli fullname: Valli, Craig |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/31284592$$D View this record in MEDLINE/PubMed |
BookMark | eNplkstuEzEUhi1URC-w4AWQJTawGOr7eDZIIeISqRKLtmvjmTlOJprYwfZUytvjJG3VlpXt4_98-s_lHJ344AGh95R84bwhl4k2lLNGy1fojAomKs0YOXlyP0XnKa0JYZxz_Qadcsq0kA07Q39meG59B6NtR8CLOKQKW9_j6wxL68My2u1qV32zCXp8myDi2ZRX4PPQ2TwEj693KcMGuxBxieOFzxA9ZBwcvlkNfpneotfOjgne3Z8X6PbH95v5r-rq98_FfHZVdUI1uYLaKqih7nRD-k5a17NWUmkp6SV1QvFay1YfnlYAsUI4Ryi0jkAjWtXwC7Q4cvtg12Ybh42NOxPsYA6BEJfGxmJ7BKMbUC1RXLHWCk6krvualI5o7YR0bs_6emRtp3YDfVfqjXZ8Bn3-44eVWYY7o5SkhKoC-HQPiOHvBCmbzZBKk0frIUzJMCaFJDWnukg_vpCuwxR9aZVhnNBaUSn3wA9PHT1aeRhkEVweBV0MKUVwphvyYUTF4DAaSsx-VczjqpSMzy8yHqD_a_8Bj9y8jg |
CitedBy_id | crossref_primary_10_1007_s11042_020_08971_x crossref_primary_10_32604_cmc_2021_014418 crossref_primary_10_1007_s11082_022_04456_3 crossref_primary_10_1109_OJCS_2022_3183003 crossref_primary_10_1186_s40662_024_00405_1 crossref_primary_10_1007_s11042_024_19693_9 crossref_primary_10_3390_s21237880 crossref_primary_10_1109_ACCESS_2020_3043689 crossref_primary_10_3390_s21186163 crossref_primary_10_3390_s24051624 crossref_primary_10_1109_OJCS_2021_3068385 crossref_primary_10_32604_csse_2023_028975 crossref_primary_10_3390_electronics11040513 crossref_primary_10_1049_cit2_12283 crossref_primary_10_1007_s10462_022_10334_x crossref_primary_10_3390_s23073566 crossref_primary_10_1007_s11042_023_15013_9 crossref_primary_10_1109_ACCESS_2020_3035812 |
Cites_doi | 10.1016/j.patcog.2017.01.019 10.1109/ICB.2013.6612976 10.1155/2018/4519548 10.1016/j.ins.2019.01.073 10.1109/TIFS.2014.2328095 10.1049/el.2014.4182 10.1109/ICPR.2010.222 10.3390/s18092782 10.1007/s11227-018-2266-0 10.1016/j.patcog.2013.10.001 10.1016/j.patcog.2016.10.035 10.1109/ICB.2013.6612960 10.1145/2968456.2973748 10.1007/978-3-642-04474-8_11 10.1049/iet-ipr.2012.0452 10.1109/TSP.2003.812753 10.1109/TIP.2004.827237 10.1109/ISCSCT.2008.226 10.3390/s18082429 10.1109/TPAMI.2007.1004 10.1016/j.patcog.2018.01.026 10.1109/ICIP.2011.6116352 10.1147/sj.403.0614 10.1049/iet-bmt.2015.0071 10.1109/CVPR.2009.5206646 10.3390/s19051141 10.1155/2018/7107295 10.1016/j.icte.2018.03.001 10.1002/cpe.3042 10.1109/ICASSP.2010.5495383 10.1109/MC.1998.4655281 10.1016/j.patcog.2016.08.017 10.1109/CloudNet.2015.7335286 10.1109/DCC.2009.86 |
ContentType | Journal Article |
Copyright | 2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2019 by the authors. 2019 |
Copyright_xml | – notice: 2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2019 by the authors. 2019 |
DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
DOI | 10.3390/s19132985 |
DatabaseName | CrossRef PubMed ProQuest Central (Corporate) ProQuest Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) ProQuest Hospital Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) ProQuest Health & Medical Collection Medical Database ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic CrossRef Publicly Available Content Database PubMed |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_89e6b06362ba430587d7012888f45ff9 PMC6651016 31284592 10_3390_s19132985 |
Genre | Journal Article |
GeographicLocations | Australia United States--US Italy |
GeographicLocations_xml | – name: United States--US – name: Italy – name: Australia |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M NPM 3V. 7XB 8FK AZQEC DWQXO K9. PJZUB PKEHL PPXIY PQEST PQUKI PRINS 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c469t-e7a6e7e7c890dc5afd2b515a10d51f463785b8a10d5a4e0a44ff01ebf0e94b693 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 01:16:54 EDT 2025 Thu Aug 21 18:07:41 EDT 2025 Fri Jul 11 06:59:41 EDT 2025 Fri Jul 25 20:17:59 EDT 2025 Thu Apr 03 07:04:14 EDT 2025 Tue Jul 01 00:42:01 EDT 2025 Thu Apr 24 23:08:39 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 13 |
Keywords | feature data protection iris cancelable steganography |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c469t-e7a6e7e7c890dc5afd2b515a10d51f463785b8a10d5a4e0a44ff01ebf0e94b693 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0001-7800-2215 0000-0002-4760-3533 0000-0002-2307-9562 |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s19132985 |
PMID | 31284592 |
PQID | 2301761556 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_89e6b06362ba430587d7012888f45ff9 pubmedcentral_primary_oai_pubmedcentral_nih_gov_6651016 proquest_miscellaneous_2254507318 proquest_journals_2301761556 pubmed_primary_31284592 crossref_citationtrail_10_3390_s19132985 crossref_primary_10_3390_s19132985 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20190706 |
PublicationDateYYYYMMDD | 2019-07-06 |
PublicationDate_xml | – month: 7 year: 2019 text: 20190706 day: 6 |
PublicationDecade | 2010 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationTitleAlternate | Sensors (Basel) |
PublicationYear | 2019 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | Dumitrescu (ref_37) 2003; 51 Yang (ref_15) 2014; 9 ref_14 ref_12 ref_11 Yang (ref_45) 2018; 5 ref_10 Yang (ref_40) 2015; 51 Yang (ref_33) 2018; 78 Ratha (ref_18) 2001; 40 Yang (ref_46) 2018; 2018 Yang (ref_16) 2014; 47 Ratha (ref_19) 2007; 29 ref_25 ref_24 ref_23 ref_22 Wang (ref_34) 2017; 61 ref_21 ref_20 Lai (ref_4) 2017; 64 Zhao (ref_50) 2018; 2018 ref_29 ref_27 Ashton (ref_1) 2009; 22 ref_26 Radman (ref_51) 2013; 7 ref_36 ref_35 ref_32 Ma (ref_31) 2004; 13 Johnson (ref_30) 1998; 31 ref_39 ref_38 Daugman (ref_48) 2016; 5 Wang (ref_17) 2017; 66 Li (ref_28) 2014; 26 Dhillon (ref_13) 2017; 34 ref_47 ref_44 ref_43 ref_42 ref_41 ref_3 ref_2 ref_49 ref_9 ref_8 ref_5 ref_7 ref_6 |
References_xml | – volume: 66 start-page: 295 year: 2017 ident: ref_17 article-title: Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2017.01.019 – ident: ref_5 – ident: ref_32 – ident: ref_26 doi: 10.1109/ICB.2013.6612976 – volume: 2018 start-page: 4519548 year: 2018 ident: ref_50 article-title: Iris Template Protection Based on Local Ranking publication-title: Secur. Commun. Netw. doi: 10.1155/2018/4519548 – ident: ref_39 – ident: ref_14 doi: 10.1016/j.ins.2019.01.073 – ident: ref_42 – volume: 9 start-page: 1179 year: 2014 ident: ref_15 article-title: A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection Using Topology Code for Local Registration and Security Enhancement publication-title: IEEE Trans. Inf. Forensics Sec. doi: 10.1109/TIFS.2014.2328095 – ident: ref_35 – volume: 51 start-page: 234 year: 2015 ident: ref_40 article-title: Mutual dependency of features in multimodal biometric systems publication-title: Electron. Lett. doi: 10.1049/el.2014.4182 – ident: ref_49 doi: 10.1109/ICPR.2010.222 – ident: ref_7 doi: 10.3390/s18092782 – ident: ref_41 doi: 10.1007/s11227-018-2266-0 – volume: 47 start-page: 1309 year: 2014 ident: ref_16 article-title: An Alignment-free Fingerprint Bio-cryptosystem based on Modified Voronoi Neighbor Structures publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2013.10.001 – volume: 64 start-page: 105 year: 2017 ident: ref_4 article-title: Cancellable iris template generation based on Indexing-First-One hashing publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2016.10.035 – ident: ref_25 doi: 10.1109/ICB.2013.6612960 – ident: ref_10 doi: 10.1145/2968456.2973748 – ident: ref_21 doi: 10.1007/978-3-642-04474-8_11 – volume: 7 start-page: 42 year: 2013 ident: ref_51 article-title: Fast and reliable iris segmentation algorithm publication-title: IET Image Process. doi: 10.1049/iet-ipr.2012.0452 – ident: ref_38 – volume: 51 start-page: 1995 year: 2003 ident: ref_37 article-title: Detection of LSB steganography via sample pair analysis publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2003.812753 – ident: ref_20 – volume: 13 start-page: 739 year: 2004 ident: ref_31 article-title: Efficient iris recognition by characterizing key local variations publication-title: IEEE Trans. Image Process. doi: 10.1109/TIP.2004.827237 – ident: ref_27 doi: 10.1109/ISCSCT.2008.226 – ident: ref_8 doi: 10.3390/s18082429 – ident: ref_3 – volume: 22 start-page: 97 year: 2009 ident: ref_1 article-title: That ‘internet of things’ thing publication-title: RFID J. – ident: ref_47 – ident: ref_11 – volume: 29 start-page: 561 year: 2007 ident: ref_19 article-title: Generating cancelable fingerprint templates publication-title: IEEE Trans. Pattern Anal. Mach. Intell. doi: 10.1109/TPAMI.2007.1004 – volume: 78 start-page: 242 year: 2018 ident: ref_33 article-title: A Fingerprint and Finger-vein Based Cancelable Multi-biometric System publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2018.01.026 – volume: 34 start-page: 255 year: 2017 ident: ref_13 article-title: A lightweight biometrics based remote user authentication scheme for IoT services publication-title: J. Inf. Secur. Appl. – ident: ref_24 doi: 10.1109/ICIP.2011.6116352 – volume: 40 start-page: 614 year: 2001 ident: ref_18 article-title: Enhancing security and privacy in biometrics-based authentication systems publication-title: IBM Syst. J. doi: 10.1147/sj.403.0614 – volume: 5 start-page: 65 year: 2016 ident: ref_48 article-title: Searching for doppelgängers: Assessing the universality of the IrisCode impostors distribution publication-title: IET Biom. doi: 10.1049/iet-bmt.2015.0071 – ident: ref_22 doi: 10.1109/CVPR.2009.5206646 – ident: ref_44 – ident: ref_6 doi: 10.3390/s19051141 – volume: 2018 start-page: 7107295 year: 2018 ident: ref_46 article-title: Biometrics based Privacy-Preserving Authentication and Mobile Template Protection publication-title: Wirel. Commun. Mob. Comput. doi: 10.1155/2018/7107295 – volume: 5 start-page: 37 year: 2018 ident: ref_45 article-title: Impact of feature proportion on matching performance of multi-biometric systems publication-title: ICT Express doi: 10.1016/j.icte.2018.03.001 – volume: 26 start-page: 1593 year: 2014 ident: ref_28 article-title: Attacks via record multiplicity on cancelable biometrics templates publication-title: Concurr. Comput. Pract. Exp. doi: 10.1002/cpe.3042 – ident: ref_23 doi: 10.1109/ICASSP.2010.5495383 – ident: ref_29 – ident: ref_2 – volume: 31 start-page: 26 year: 1998 ident: ref_30 article-title: Exploring steganography: Seeing the unseen publication-title: Computer doi: 10.1109/MC.1998.4655281 – ident: ref_12 – volume: 61 start-page: 447 year: 2017 ident: ref_34 article-title: A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2016.08.017 – ident: ref_9 doi: 10.1109/CloudNet.2015.7335286 – ident: ref_43 – ident: ref_36 doi: 10.1109/DCC.2009.86 |
SSID | ssj0023338 |
Score | 2.3879094 |
Snippet | Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks.... |
SourceID | doaj pubmedcentral proquest pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | 2985 |
SubjectTerms | Architectural engineering Biometric identification Biometrics cancelable Data compression Electrocardiography feature data protection International conferences Internet of Things iris Researchers Spread spectrum steganography Trust Wireless networks |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB5VnNoDKi2PwBa5iAOXaPNw_DgCAqFK7aWstLdgxzZUQlnEZv8_M3E22q2Qeukxtg_OzHhmPj--ATi3Fn1e7mRqFcJV7hqX2pDZFKOJ59KWeWHpvfPPX-Juxn_Mq_lGqS-6ExbpgaPgpkp7YTGOisIaoqdS0klyqkoFXoXQP93DmLcGUwPUKhF5RR6hEkH9dImopCw0FUzeiD49Sf97meXfFyQ3Is7tZ9gdUkV2Gae4Bx98-wU-bRAIfoWHS3ZNanumB1CMqsWnzLSO_e78o2kHNur0CiOVYzM0NkY7YnQ_KG7UschXzjBxZdjO4vag79gisFjQcx9mtzf313fpUDMhbRDodqmXRnjpZaN05prKBFdYTFlMnrkqD1yUUlVW9Z-G-8xwHkKWe9SP19wKXR7ATrto_REwm8uA-Umljea88ULxJte2cM4VdNYWErhYy7JuBkJxqmvxXCOwILHXo9gTOBuHvkQWjfcGXZFCxgFEfN03oDnUgznU_zKHBCZrddbDalzWCLNySQewIoHvYzeuIzocMa1frHAMImXMjdHFJXAYtT_OpKQgXukiAbllF1tT3e5p_zz1XN1CkNMTx__j307gI6Zrur8sLCaw072u_DdMiTp72lv_G9vmCT8 priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwEB5BucABlWfTFmQQBy5W83D8OFVtxVIhwQVW6i3YsV2QqqTtpv-fmcQbdlHFMc4cLI898814_A3AB-fQ5hVecacxXBW-9dzF3HH0JkEoVxWlo_fOX7_J86X4clFfpITbKpVVrm3iaKh931KO_AihcqHoEk0eX99w6hpFt6uphcZDeFSgp6GSLr34PAdcFcZfE5tQhaH90Qpjk6o01DZ5wweNVP334ct_yyQ3_M5iF54mwMhOJg0_gwehew5PNmgEX8DPE3ZGyruiZ1CMesZzZjvPvg_h0naJk5qfor_ybIlbjlFejKqEpnQdm1jLGcJXhuNsShKGgfWRTW09X8Jy8enH2TlPnRN4i-HuwIOyMqigWm1y39Y2-tIhcLFF7usiClkpXTs9floRcitEjHkRUEvBCCdN9Qp2ur4Le8BcoSKilNpYI0QbpBZtYVzpvS_pxi1m8HG9lk2baMWpu8VVg-EFLXszL3sG72fR64lL4z6hU1LILED01-NAf3vZpNPUaBOkQ3AlS2eJs0wrr8jTah1FHaPJ4HCtziadyVXzdwdl8G7-jaeJrkhsF_o7lMF4GREyGroMXk_an2dSkSuvTZmB2toXW1Pd_tP9_jUydktJpk_u_39aB_AY4ZgZi4HlIewMt3fhDUKewb0d9_UfhakB8Q priority: 102 providerName: ProQuest |
Title | A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things |
URI | https://www.ncbi.nlm.nih.gov/pubmed/31284592 https://www.proquest.com/docview/2301761556 https://www.proquest.com/docview/2254507318 https://pubmed.ncbi.nlm.nih.gov/PMC6651016 https://doaj.org/article/89e6b06362ba430587d7012888f45ff9 |
Volume | 19 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB71cYFDxZtAWRnEgUsgD8ePA0LdqkuF1AoBK-0t2LFdKq2ysE0l-PfMJNmoqfbQS6TYjmJ5bM_3-fENwFtrcc5LnYytQrrKXeViGxIbozfxXNo8zSzddz47F6dz_mVRLHZgE2Ozb8CrrdSO4knN18v3f__8-4QD_iMxTqTsH66Qc-SZVsUu7KNDkhTI4IwPmwlZnrcBrelOV4z-MOkEhsafjtxSq96_DXLePjl5wxXNHsBBjyHZUWf0h7Dj60dw_4ay4GP4ecSOyZ5LuhnFKIx8zEzt2PfGX5i6l6mOp-jCHJtjL2S0VEYHh7oVPNYJmTNEtAzTWbdu6Bu2CqyL9PkE5rOTH8encR9MIa6QATexl0Z46WWldOKqwgSXWcQyJk1ckQYucqkKq9pXw31iOA8hST0azmtuhc6fwl69qv1zYDaVAYFLoY3mvPJC8SrVNnPOZbQJFyJ4t2nLsuqVxingxbJExkHNXg7NHsGboejvTl5jW6EpGWQoQIrYbcJqfVH2A6xU2guLeEtk1pCMmZJOkvNVKvAiBB3B4cac5aaXlci_Ukk7syKC10M2DjDaNTG1X11jGaTQCJpx7ovgWWf9oSY5efdCZxHIUb8YVXWcU1_-akW8haDZULy4w39fwj2Eabo9JCwOYa9ZX_tXCIUaO4FduZD4VLPPE9ifnpx__TZplxUm7RD4D21hC6U |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB5V5QAcEK9CoIBBIPUSNQ_Hjg8ItYXtlj4udKXeUju2C1KVlG4qxJ_iNzKTF7uo6q3H2D444_HMNx77G4D3xqDNi60MTY7hKrelDY2PTIjexHFp0jgx9N758EhMZ_zrSXayAn-GtzB0rXKwia2htnVJZ-SbCJVjSUk08eniZ0hVoyi7OpTQ6NRi3_3-hSHb_OPeZ1zfD0ky-XK8Mw37qgJhiaFgEzqphZNOlrmKbJlpbxODTl3Hkc1iz0Uq88zk7afmLtKcex_FDv_AKW4EkS-hyb_DU_Tk9DJ9sjsGeCnGex17EXZGm3OMhdJEUZnmBZ_Xlga4Ds_-fy1zwc9NHsKDHqCyrU6jHsGKqx7D_QXawidwusV2SFnO6dkVoxr1IdOVZd8ad6arngM73Eb_aNkMVZzRORzdSuqOB1nHks4QLjNsZ92hpGtY7VlXRvQpzG5FpmuwWtWVew7MxNIjKsqUVpyXTuS8jJVJrLUJZfh8ABuDLIuypzGnahrnBYYzJPZiFHsA78ahFx13x3WDtmlBxgFEt9021JdnRb97i1w5YRDMicRo4kjLpZXk2fPc88x7FcD6sJxFbwPmxT-NDeDt2I27l1IyunL1FY7B-BwRORrWAJ51qz_OJCXokKkkALmkF0tTXe6pfnxvGcKFIFMrXtw8rTdwd3p8eFAc7B3tv4R7CAVVexFZrMNqc3nlXiHcaszrVscZnN72pvoLICM_uw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB1VWwnBAfFNoIBBIHGJNh-OHR8Q6rZdtRRWFbBSb6kd2wWpSko3FeKv8euYSbJhF1Xcekzig2OPZ96zx28AXhuDPi-2MjQ50lVuSxsaH5kQo4nj0qRxYui-86eZ2J_zD8fZ8Qb8Xt6FobTKpU9sHbWtS9ojHyNUjiUdoomx79Mijnan789_hFRBik5al-U0OhM5dL9-In1bvDvYxbl-kyTTva87-2FfYSAskRY2oZNaOOlkmavIlpn2NjEY4HUc2Sz2XKQyz0zePmruIs2591Hs8G-c4kaQEBO6_01JrGgEm5O92dHnge6lyP46LaM0VdF4gcwoTRQVbV6JgG2hgKvQ7b9JmitRb3oHbvdwlW139nUXNlx1D26tiBjeh5NttkOmc0aXsBhVrA-Zriz70rhTXfWK2OEEo6VlczR4RrtylKPUbRayTjOdIXhm-J51W5SuYbVnXVHRBzC_llF9CKOqrtxjYCaWHjFSprTivHQi52WsTGKtTei8zwfwdjmWRdmLmlNtjbMCyQ0NezEMewCvhqbnnZLHVY0mNCFDAxLfbl_UF6dFv5aLXDlhENqJxGhSTMullRTn89zzzHsVwNZyOoveIyyKv_YbwMvhM65lOqDRlasvsQ2ydcTn6GYDeNTN_tCTlIBEppIA5JpdrHV1_Uv1_VurFy4EOV7x5P_degE3cEEVHw9mh0_hJuJC1WYliy0YNReX7hlir8Y8742cwcl1r6s_JLJFTQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Cancelable+Iris-+and+Steganography-Based+User+Authentication+System+for+the+Internet+of+Things&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Yang%2C+Wencheng&rft.au=Wang%2C+Song&rft.au=Hu%2C+Jiankun&rft.au=Ibrahim%2C+Ahmed&rft.date=2019-07-06&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=19&rft.issue=13&rft_id=info:doi/10.3390%2Fs19132985&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |