A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things

Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of b...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 19; no. 13; p. 2985
Main Authors Yang, Wencheng, Wang, Song, Hu, Jiankun, Ibrahim, Ahmed, Zheng, Guanglou, Macedo, Marcelo Jose, Johnstone, Michael N., Valli, Craig
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 06.07.2019
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique—steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.
AbstractList Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique-steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique-steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.
Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique—steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.
Author Valli, Craig
Yang, Wencheng
Hu, Jiankun
Ibrahim, Ahmed
Wang, Song
Johnstone, Michael N.
Macedo, Marcelo Jose
Zheng, Guanglou
AuthorAffiliation 1 Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia
2 Department of Engineering, La Trobe University, Melbourne, VIC 3083, Australia
3 School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2600, Australia
AuthorAffiliation_xml – name: 3 School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2600, Australia
– name: 2 Department of Engineering, La Trobe University, Melbourne, VIC 3083, Australia
– name: 1 Security Research Institute, Edith Cowan University, Perth, WA 6207, Australia
Author_xml – sequence: 1
  givenname: Wencheng
  orcidid: 0000-0001-7800-2215
  surname: Yang
  fullname: Yang, Wencheng
– sequence: 2
  givenname: Song
  surname: Wang
  fullname: Wang, Song
– sequence: 3
  givenname: Jiankun
  surname: Hu
  fullname: Hu, Jiankun
– sequence: 4
  givenname: Ahmed
  orcidid: 0000-0002-4760-3533
  surname: Ibrahim
  fullname: Ibrahim, Ahmed
– sequence: 5
  givenname: Guanglou
  orcidid: 0000-0002-2307-9562
  surname: Zheng
  fullname: Zheng, Guanglou
– sequence: 6
  givenname: Marcelo Jose
  surname: Macedo
  fullname: Macedo, Marcelo Jose
– sequence: 7
  givenname: Michael N.
  surname: Johnstone
  fullname: Johnstone, Michael N.
– sequence: 8
  givenname: Craig
  surname: Valli
  fullname: Valli, Craig
BackLink https://www.ncbi.nlm.nih.gov/pubmed/31284592$$D View this record in MEDLINE/PubMed
BookMark eNplkstuEzEUhi1URC-w4AWQJTawGOr7eDZIIeISqRKLtmvjmTlOJprYwfZUytvjJG3VlpXt4_98-s_lHJ344AGh95R84bwhl4k2lLNGy1fojAomKs0YOXlyP0XnKa0JYZxz_Qadcsq0kA07Q39meG59B6NtR8CLOKQKW9_j6wxL68My2u1qV32zCXp8myDi2ZRX4PPQ2TwEj693KcMGuxBxieOFzxA9ZBwcvlkNfpneotfOjgne3Z8X6PbH95v5r-rq98_FfHZVdUI1uYLaKqih7nRD-k5a17NWUmkp6SV1QvFay1YfnlYAsUI4Ryi0jkAjWtXwC7Q4cvtg12Ybh42NOxPsYA6BEJfGxmJ7BKMbUC1RXLHWCk6krvualI5o7YR0bs_6emRtp3YDfVfqjXZ8Bn3-44eVWYY7o5SkhKoC-HQPiOHvBCmbzZBKk0frIUzJMCaFJDWnukg_vpCuwxR9aZVhnNBaUSn3wA9PHT1aeRhkEVweBV0MKUVwphvyYUTF4DAaSsx-VczjqpSMzy8yHqD_a_8Bj9y8jg
CitedBy_id crossref_primary_10_1007_s11042_020_08971_x
crossref_primary_10_32604_cmc_2021_014418
crossref_primary_10_1007_s11082_022_04456_3
crossref_primary_10_1109_OJCS_2022_3183003
crossref_primary_10_1186_s40662_024_00405_1
crossref_primary_10_1007_s11042_024_19693_9
crossref_primary_10_3390_s21237880
crossref_primary_10_1109_ACCESS_2020_3043689
crossref_primary_10_3390_s21186163
crossref_primary_10_3390_s24051624
crossref_primary_10_1109_OJCS_2021_3068385
crossref_primary_10_32604_csse_2023_028975
crossref_primary_10_3390_electronics11040513
crossref_primary_10_1049_cit2_12283
crossref_primary_10_1007_s10462_022_10334_x
crossref_primary_10_3390_s23073566
crossref_primary_10_1007_s11042_023_15013_9
crossref_primary_10_1109_ACCESS_2020_3035812
Cites_doi 10.1016/j.patcog.2017.01.019
10.1109/ICB.2013.6612976
10.1155/2018/4519548
10.1016/j.ins.2019.01.073
10.1109/TIFS.2014.2328095
10.1049/el.2014.4182
10.1109/ICPR.2010.222
10.3390/s18092782
10.1007/s11227-018-2266-0
10.1016/j.patcog.2013.10.001
10.1016/j.patcog.2016.10.035
10.1109/ICB.2013.6612960
10.1145/2968456.2973748
10.1007/978-3-642-04474-8_11
10.1049/iet-ipr.2012.0452
10.1109/TSP.2003.812753
10.1109/TIP.2004.827237
10.1109/ISCSCT.2008.226
10.3390/s18082429
10.1109/TPAMI.2007.1004
10.1016/j.patcog.2018.01.026
10.1109/ICIP.2011.6116352
10.1147/sj.403.0614
10.1049/iet-bmt.2015.0071
10.1109/CVPR.2009.5206646
10.3390/s19051141
10.1155/2018/7107295
10.1016/j.icte.2018.03.001
10.1002/cpe.3042
10.1109/ICASSP.2010.5495383
10.1109/MC.1998.4655281
10.1016/j.patcog.2016.08.017
10.1109/CloudNet.2015.7335286
10.1109/DCC.2009.86
ContentType Journal Article
Copyright 2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2019 by the authors. 2019
Copyright_xml – notice: 2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2019 by the authors. 2019
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s19132985
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
ProQuest Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
ProQuest Hospital Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
ProQuest Health & Medical Collection
Medical Database
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList MEDLINE - Academic
CrossRef

Publicly Available Content Database
PubMed

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_89e6b06362ba430587d7012888f45ff9
PMC6651016
31284592
10_3390_s19132985
Genre Journal Article
GeographicLocations Australia
United States--US
Italy
GeographicLocations_xml – name: United States--US
– name: Italy
– name: Australia
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
NPM
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PJZUB
PKEHL
PPXIY
PQEST
PQUKI
PRINS
7X8
5PM
PUEGO
ID FETCH-LOGICAL-c469t-e7a6e7e7c890dc5afd2b515a10d51f463785b8a10d5a4e0a44ff01ebf0e94b693
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 01:16:54 EDT 2025
Thu Aug 21 18:07:41 EDT 2025
Fri Jul 11 06:59:41 EDT 2025
Fri Jul 25 20:17:59 EDT 2025
Thu Apr 03 07:04:14 EDT 2025
Tue Jul 01 00:42:01 EDT 2025
Thu Apr 24 23:08:39 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 13
Keywords feature data protection
iris
cancelable
steganography
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c469t-e7a6e7e7c890dc5afd2b515a10d51f463785b8a10d5a4e0a44ff01ebf0e94b693
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0001-7800-2215
0000-0002-4760-3533
0000-0002-2307-9562
OpenAccessLink http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s19132985
PMID 31284592
PQID 2301761556
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_89e6b06362ba430587d7012888f45ff9
pubmedcentral_primary_oai_pubmedcentral_nih_gov_6651016
proquest_miscellaneous_2254507318
proquest_journals_2301761556
pubmed_primary_31284592
crossref_citationtrail_10_3390_s19132985
crossref_primary_10_3390_s19132985
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20190706
PublicationDateYYYYMMDD 2019-07-06
PublicationDate_xml – month: 7
  year: 2019
  text: 20190706
  day: 6
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2019
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Dumitrescu (ref_37) 2003; 51
Yang (ref_15) 2014; 9
ref_14
ref_12
ref_11
Yang (ref_45) 2018; 5
ref_10
Yang (ref_40) 2015; 51
Yang (ref_33) 2018; 78
Ratha (ref_18) 2001; 40
Yang (ref_46) 2018; 2018
Yang (ref_16) 2014; 47
Ratha (ref_19) 2007; 29
ref_25
ref_24
ref_23
ref_22
Wang (ref_34) 2017; 61
ref_21
ref_20
Lai (ref_4) 2017; 64
Zhao (ref_50) 2018; 2018
ref_29
ref_27
Ashton (ref_1) 2009; 22
ref_26
Radman (ref_51) 2013; 7
ref_36
ref_35
ref_32
Ma (ref_31) 2004; 13
Johnson (ref_30) 1998; 31
ref_39
ref_38
Daugman (ref_48) 2016; 5
Wang (ref_17) 2017; 66
Li (ref_28) 2014; 26
Dhillon (ref_13) 2017; 34
ref_47
ref_44
ref_43
ref_42
ref_41
ref_3
ref_2
ref_49
ref_9
ref_8
ref_5
ref_7
ref_6
References_xml – volume: 66
  start-page: 295
  year: 2017
  ident: ref_17
  article-title: Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2017.01.019
– ident: ref_5
– ident: ref_32
– ident: ref_26
  doi: 10.1109/ICB.2013.6612976
– volume: 2018
  start-page: 4519548
  year: 2018
  ident: ref_50
  article-title: Iris Template Protection Based on Local Ranking
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2018/4519548
– ident: ref_39
– ident: ref_14
  doi: 10.1016/j.ins.2019.01.073
– ident: ref_42
– volume: 9
  start-page: 1179
  year: 2014
  ident: ref_15
  article-title: A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection Using Topology Code for Local Registration and Security Enhancement
  publication-title: IEEE Trans. Inf. Forensics Sec.
  doi: 10.1109/TIFS.2014.2328095
– ident: ref_35
– volume: 51
  start-page: 234
  year: 2015
  ident: ref_40
  article-title: Mutual dependency of features in multimodal biometric systems
  publication-title: Electron. Lett.
  doi: 10.1049/el.2014.4182
– ident: ref_49
  doi: 10.1109/ICPR.2010.222
– ident: ref_7
  doi: 10.3390/s18092782
– ident: ref_41
  doi: 10.1007/s11227-018-2266-0
– volume: 47
  start-page: 1309
  year: 2014
  ident: ref_16
  article-title: An Alignment-free Fingerprint Bio-cryptosystem based on Modified Voronoi Neighbor Structures
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2013.10.001
– volume: 64
  start-page: 105
  year: 2017
  ident: ref_4
  article-title: Cancellable iris template generation based on Indexing-First-One hashing
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2016.10.035
– ident: ref_25
  doi: 10.1109/ICB.2013.6612960
– ident: ref_10
  doi: 10.1145/2968456.2973748
– ident: ref_21
  doi: 10.1007/978-3-642-04474-8_11
– volume: 7
  start-page: 42
  year: 2013
  ident: ref_51
  article-title: Fast and reliable iris segmentation algorithm
  publication-title: IET Image Process.
  doi: 10.1049/iet-ipr.2012.0452
– ident: ref_38
– volume: 51
  start-page: 1995
  year: 2003
  ident: ref_37
  article-title: Detection of LSB steganography via sample pair analysis
  publication-title: IEEE Trans. Signal Process.
  doi: 10.1109/TSP.2003.812753
– ident: ref_20
– volume: 13
  start-page: 739
  year: 2004
  ident: ref_31
  article-title: Efficient iris recognition by characterizing key local variations
  publication-title: IEEE Trans. Image Process.
  doi: 10.1109/TIP.2004.827237
– ident: ref_27
  doi: 10.1109/ISCSCT.2008.226
– ident: ref_8
  doi: 10.3390/s18082429
– ident: ref_3
– volume: 22
  start-page: 97
  year: 2009
  ident: ref_1
  article-title: That ‘internet of things’ thing
  publication-title: RFID J.
– ident: ref_47
– ident: ref_11
– volume: 29
  start-page: 561
  year: 2007
  ident: ref_19
  article-title: Generating cancelable fingerprint templates
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
  doi: 10.1109/TPAMI.2007.1004
– volume: 78
  start-page: 242
  year: 2018
  ident: ref_33
  article-title: A Fingerprint and Finger-vein Based Cancelable Multi-biometric System
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2018.01.026
– volume: 34
  start-page: 255
  year: 2017
  ident: ref_13
  article-title: A lightweight biometrics based remote user authentication scheme for IoT services
  publication-title: J. Inf. Secur. Appl.
– ident: ref_24
  doi: 10.1109/ICIP.2011.6116352
– volume: 40
  start-page: 614
  year: 2001
  ident: ref_18
  article-title: Enhancing security and privacy in biometrics-based authentication systems
  publication-title: IBM Syst. J.
  doi: 10.1147/sj.403.0614
– volume: 5
  start-page: 65
  year: 2016
  ident: ref_48
  article-title: Searching for doppelgängers: Assessing the universality of the IrisCode impostors distribution
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2015.0071
– ident: ref_22
  doi: 10.1109/CVPR.2009.5206646
– ident: ref_44
– ident: ref_6
  doi: 10.3390/s19051141
– volume: 2018
  start-page: 7107295
  year: 2018
  ident: ref_46
  article-title: Biometrics based Privacy-Preserving Authentication and Mobile Template Protection
  publication-title: Wirel. Commun. Mob. Comput.
  doi: 10.1155/2018/7107295
– volume: 5
  start-page: 37
  year: 2018
  ident: ref_45
  article-title: Impact of feature proportion on matching performance of multi-biometric systems
  publication-title: ICT Express
  doi: 10.1016/j.icte.2018.03.001
– volume: 26
  start-page: 1593
  year: 2014
  ident: ref_28
  article-title: Attacks via record multiplicity on cancelable biometrics templates
  publication-title: Concurr. Comput. Pract. Exp.
  doi: 10.1002/cpe.3042
– ident: ref_23
  doi: 10.1109/ICASSP.2010.5495383
– ident: ref_29
– ident: ref_2
– volume: 31
  start-page: 26
  year: 1998
  ident: ref_30
  article-title: Exploring steganography: Seeing the unseen
  publication-title: Computer
  doi: 10.1109/MC.1998.4655281
– ident: ref_12
– volume: 61
  start-page: 447
  year: 2017
  ident: ref_34
  article-title: A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2016.08.017
– ident: ref_9
  doi: 10.1109/CloudNet.2015.7335286
– ident: ref_43
– ident: ref_36
  doi: 10.1109/DCC.2009.86
SSID ssj0023338
Score 2.3879094
Snippet Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks....
SourceID doaj
pubmedcentral
proquest
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 2985
SubjectTerms Architectural engineering
Biometric identification
Biometrics
cancelable
Data compression
Electrocardiography
feature data protection
International conferences
Internet of Things
iris
Researchers
Spread spectrum
steganography
Trust
Wireless networks
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB5VnNoDKi2PwBa5iAOXaPNw_DgCAqFK7aWstLdgxzZUQlnEZv8_M3E22q2Qeukxtg_OzHhmPj--ATi3Fn1e7mRqFcJV7hqX2pDZFKOJ59KWeWHpvfPPX-Juxn_Mq_lGqS-6ExbpgaPgpkp7YTGOisIaoqdS0klyqkoFXoXQP93DmLcGUwPUKhF5RR6hEkH9dImopCw0FUzeiD49Sf97meXfFyQ3Is7tZ9gdUkV2Gae4Bx98-wU-bRAIfoWHS3ZNanumB1CMqsWnzLSO_e78o2kHNur0CiOVYzM0NkY7YnQ_KG7UschXzjBxZdjO4vag79gisFjQcx9mtzf313fpUDMhbRDodqmXRnjpZaN05prKBFdYTFlMnrkqD1yUUlVW9Z-G-8xwHkKWe9SP19wKXR7ATrto_REwm8uA-Umljea88ULxJte2cM4VdNYWErhYy7JuBkJxqmvxXCOwILHXo9gTOBuHvkQWjfcGXZFCxgFEfN03oDnUgznU_zKHBCZrddbDalzWCLNySQewIoHvYzeuIzocMa1frHAMImXMjdHFJXAYtT_OpKQgXukiAbllF1tT3e5p_zz1XN1CkNMTx__j307gI6Zrur8sLCaw072u_DdMiTp72lv_G9vmCT8
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwEB5BucABlWfTFmQQBy5W83D8OFVtxVIhwQVW6i3YsV2QqqTtpv-fmcQbdlHFMc4cLI898814_A3AB-fQ5hVecacxXBW-9dzF3HH0JkEoVxWlo_fOX7_J86X4clFfpITbKpVVrm3iaKh931KO_AihcqHoEk0eX99w6hpFt6uphcZDeFSgp6GSLr34PAdcFcZfE5tQhaH90Qpjk6o01DZ5wweNVP334ct_yyQ3_M5iF54mwMhOJg0_gwehew5PNmgEX8DPE3ZGyruiZ1CMesZzZjvPvg_h0naJk5qfor_ybIlbjlFejKqEpnQdm1jLGcJXhuNsShKGgfWRTW09X8Jy8enH2TlPnRN4i-HuwIOyMqigWm1y39Y2-tIhcLFF7usiClkpXTs9floRcitEjHkRUEvBCCdN9Qp2ur4Le8BcoSKilNpYI0QbpBZtYVzpvS_pxi1m8HG9lk2baMWpu8VVg-EFLXszL3sG72fR64lL4z6hU1LILED01-NAf3vZpNPUaBOkQ3AlS2eJs0wrr8jTah1FHaPJ4HCtziadyVXzdwdl8G7-jaeJrkhsF_o7lMF4GREyGroMXk_an2dSkSuvTZmB2toXW1Pd_tP9_jUydktJpk_u_39aB_AY4ZgZi4HlIewMt3fhDUKewb0d9_UfhakB8Q
  priority: 102
  providerName: ProQuest
Title A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things
URI https://www.ncbi.nlm.nih.gov/pubmed/31284592
https://www.proquest.com/docview/2301761556
https://www.proquest.com/docview/2254507318
https://pubmed.ncbi.nlm.nih.gov/PMC6651016
https://doaj.org/article/89e6b06362ba430587d7012888f45ff9
Volume 19
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB71cYFDxZtAWRnEgUsgD8ePA0LdqkuF1AoBK-0t2LFdKq2ysE0l-PfMJNmoqfbQS6TYjmJ5bM_3-fENwFtrcc5LnYytQrrKXeViGxIbozfxXNo8zSzddz47F6dz_mVRLHZgE2Ozb8CrrdSO4knN18v3f__8-4QD_iMxTqTsH66Qc-SZVsUu7KNDkhTI4IwPmwlZnrcBrelOV4z-MOkEhsafjtxSq96_DXLePjl5wxXNHsBBjyHZUWf0h7Dj60dw_4ay4GP4ecSOyZ5LuhnFKIx8zEzt2PfGX5i6l6mOp-jCHJtjL2S0VEYHh7oVPNYJmTNEtAzTWbdu6Bu2CqyL9PkE5rOTH8encR9MIa6QATexl0Z46WWldOKqwgSXWcQyJk1ckQYucqkKq9pXw31iOA8hST0azmtuhc6fwl69qv1zYDaVAYFLoY3mvPJC8SrVNnPOZbQJFyJ4t2nLsuqVxingxbJExkHNXg7NHsGboejvTl5jW6EpGWQoQIrYbcJqfVH2A6xU2guLeEtk1pCMmZJOkvNVKvAiBB3B4cac5aaXlci_Ukk7syKC10M2DjDaNTG1X11jGaTQCJpx7ovgWWf9oSY5efdCZxHIUb8YVXWcU1_-akW8haDZULy4w39fwj2Eabo9JCwOYa9ZX_tXCIUaO4FduZD4VLPPE9ifnpx__TZplxUm7RD4D21hC6U
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB5V5QAcEK9CoIBBIPUSNQ_Hjg8ItYXtlj4udKXeUju2C1KVlG4qxJ_iNzKTF7uo6q3H2D444_HMNx77G4D3xqDNi60MTY7hKrelDY2PTIjexHFp0jgx9N758EhMZ_zrSXayAn-GtzB0rXKwia2htnVJZ-SbCJVjSUk08eniZ0hVoyi7OpTQ6NRi3_3-hSHb_OPeZ1zfD0ky-XK8Mw37qgJhiaFgEzqphZNOlrmKbJlpbxODTl3Hkc1iz0Uq88zk7afmLtKcex_FDv_AKW4EkS-hyb_DU_Tk9DJ9sjsGeCnGex17EXZGm3OMhdJEUZnmBZ_Xlga4Ds_-fy1zwc9NHsKDHqCyrU6jHsGKqx7D_QXawidwusV2SFnO6dkVoxr1IdOVZd8ad6arngM73Eb_aNkMVZzRORzdSuqOB1nHks4QLjNsZ92hpGtY7VlXRvQpzG5FpmuwWtWVew7MxNIjKsqUVpyXTuS8jJVJrLUJZfh8ABuDLIuypzGnahrnBYYzJPZiFHsA78ahFx13x3WDtmlBxgFEt9021JdnRb97i1w5YRDMicRo4kjLpZXk2fPc88x7FcD6sJxFbwPmxT-NDeDt2I27l1IyunL1FY7B-BwRORrWAJ51qz_OJCXokKkkALmkF0tTXe6pfnxvGcKFIFMrXtw8rTdwd3p8eFAc7B3tv4R7CAVVexFZrMNqc3nlXiHcaszrVscZnN72pvoLICM_uw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB1VWwnBAfFNoIBBIHGJNh-OHR8Q6rZdtRRWFbBSb6kd2wWpSko3FeKv8euYSbJhF1Xcekzig2OPZ96zx28AXhuDPi-2MjQ50lVuSxsaH5kQo4nj0qRxYui-86eZ2J_zD8fZ8Qb8Xt6FobTKpU9sHbWtS9ojHyNUjiUdoomx79Mijnan789_hFRBik5al-U0OhM5dL9-In1bvDvYxbl-kyTTva87-2FfYSAskRY2oZNaOOlkmavIlpn2NjEY4HUc2Sz2XKQyz0zePmruIs2591Hs8G-c4kaQEBO6_01JrGgEm5O92dHnge6lyP46LaM0VdF4gcwoTRQVbV6JgG2hgKvQ7b9JmitRb3oHbvdwlW139nUXNlx1D26tiBjeh5NttkOmc0aXsBhVrA-Zriz70rhTXfWK2OEEo6VlczR4RrtylKPUbRayTjOdIXhm-J51W5SuYbVnXVHRBzC_llF9CKOqrtxjYCaWHjFSprTivHQi52WsTGKtTei8zwfwdjmWRdmLmlNtjbMCyQ0NezEMewCvhqbnnZLHVY0mNCFDAxLfbl_UF6dFv5aLXDlhENqJxGhSTMullRTn89zzzHsVwNZyOoveIyyKv_YbwMvhM65lOqDRlasvsQ2ydcTn6GYDeNTN_tCTlIBEppIA5JpdrHV1_Uv1_VurFy4EOV7x5P_degE3cEEVHw9mh0_hJuJC1WYliy0YNReX7hlir8Y8742cwcl1r6s_JLJFTQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Cancelable+Iris-+and+Steganography-Based+User+Authentication+System+for+the+Internet+of+Things&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Yang%2C+Wencheng&rft.au=Wang%2C+Song&rft.au=Hu%2C+Jiankun&rft.au=Ibrahim%2C+Ahmed&rft.date=2019-07-06&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=19&rft.issue=13&rft_id=info:doi/10.3390%2Fs19132985&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon