{"id":23068,"date":"2025-04-15T11:22:27","date_gmt":"2025-04-15T09:22:27","guid":{"rendered":"https:\/\/sano.science\/?post_type=research&#038;p=23068"},"modified":"2025-04-15T15:43:35","modified_gmt":"2025-04-15T13:43:35","slug":"cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security","status":"publish","type":"research","link":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/","title":{"rendered":"Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security"},"content":{"rendered":"\n<p class=\" eplus-wrapper\">This publication presents a novel approach aimed at improving biometric protection in Internet of Things (IoT) environments. The method focuses on producing cancelable biometric templates that prioritize both security and privacy. By utilizing Empirical Mode Decomposition (EMD) to break down biometric signals into fundamental components and encoding these using quaternion-based techniques, the system generates templates that cannot be reversed and are exceptionally resistant to spoofing attempts.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<p class=\" eplus-wrapper\">The approach delivers impressive performance, achieving an Area Under the Curve (AUC) of 0.9997 and an Equal Error Rate approaching zero, all while maintaining low computational requirements. This makes the solution especially appropriate for IoT devices where processing capabilities are often limited. The findings highlight the method\u2019s strong potential to tackle key security concerns in biometric applications within IoT networks.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<p class=\" eplus-wrapper\">This research exemplifies Sano\u2019s dedication to developing secure, resource-efficient, and privacy-conscious technologies at the crossroads of biometrics, artificial intelligence, and computational neuroscience.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<p class=\" eplus-wrapper\"><strong>Authors<\/strong>: <a href=\"https:\/\/sano.science\/people\/mahmoud-nasr\/\">Mahmoud Nasr<\/a>,\u00a0Krzysztof Brzostowski,\u00a0 Adam Pi\u00f3rkowski, Fathi E. Abd El-Samie\u00a0<\/p>\n\n\n\n<p class=\" eplus-wrapper\"><strong>DOI:<\/strong>&nbsp;10.1038\/s41598-025-89491-2<\/p>\n\n\n\n<p class=\" eplus-wrapper\"><strong>Keywords<\/strong>: Quaternion Mathematics, ComputationalSecurity, EMD, IoT<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n\t\n    \n        \n\t\t\t<a href=\"https:\/\/www.nature.com\/articles\/s41598-025-89491-2\" target=\"_self\"  class=\"button primary \">\n\n\t\t\t\t<span>\n\t\t\t\t\tREAD HERE\n\t\t\t\t<\/span>\n\n\t\t\t<\/a>\n\n        \n    \n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large eplus-wrapper\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"802\" src=\"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process-1024x802.webp\" alt=\"\" class=\"wp-image-23059\" srcset=\"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process-1024x802.webp 1024w, https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process-300x235.webp 300w, https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process-768x601.webp 768w, https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process-1536x1203.webp 1536w, https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process.webp 1692w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Illustration of the proposed biometric template generation process.<\/figcaption><\/figure>\n\n\n\n<p class=\" eplus-wrapper\">Image Source:&nbsp;<a href=\"https:\/\/www.nature.com\/articles\/s41598-025-89491-2\">www.nature.com\/articles<\/a><\/p>\n\n\n\n<p class=\" eplus-wrapper\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>article in journal: scientific reports \u2013 the publisher Springer Nature, 2025<\/p>\n","protected":false},"featured_media":23059,"template":"","research_type":[8],"research_team":[15],"class_list":["post-23068","research","type-research","status-publish","has-post-thumbnail","hentry","research_type-publications","research_team-computational-neuroscience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security - Centre for Computational Personalized Medicine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security\" \/>\n<meta property=\"og:description\" content=\"article in journal: scientific reports \u2013 the publisher Springer Nature, 2025\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Centre for Computational Personalized Medicine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sano.science\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-15T13:43:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1692\" \/>\n\t<meta property=\"og:image:height\" content=\"1325\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@sanoscience\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sano.science\\\/research\\\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\\\/\",\"url\":\"https:\\\/\\\/sano.science\\\/research\\\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\\\/\",\"name\":\"Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security - Centre for Computational Personalized Medicine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sano.science\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sano.science\\\/research\\\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sano.science\\\/research\\\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sano.science\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/proposed-biometric-template-generation-process.webp\",\"datePublished\":\"2025-04-15T09:22:27+00:00\",\"dateModified\":\"2025-04-15T13:43:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sano.science\\\/research\\\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sano.science\\\/research\\\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sano.science\\\/research\\\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sano.science\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/proposed-biometric-template-generation-process.webp\",\"contentUrl\":\"https:\\\/\\\/sano.science\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/proposed-biometric-template-generation-process.webp\",\"width\":1692,\"height\":1325},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sano.science\\\/research\\\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sano.science\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\",\"item\":\"https:\\\/\\\/sano.science\\\/research\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Publications\",\"item\":\"https:\\\/\\\/sano.science\\\/research-type\\\/publications\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sano.science\\\/#website\",\"url\":\"https:\\\/\\\/sano.science\\\/\",\"name\":\"Centre for Computational Personalized Medicine\",\"description\":\"Sano \u2013 Centre for Computational Medicine\",\"publisher\":{\"@id\":\"https:\\\/\\\/sano.science\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sano.science\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sano.science\\\/#organization\",\"name\":\"Sano \u2013 Centre for Computational Medicine\",\"alternateName\":\"Sano\",\"url\":\"https:\\\/\\\/sano.science\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sano.science\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sano.science\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/logo_sano_podstawowe.png\",\"contentUrl\":\"https:\\\/\\\/sano.science\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/logo_sano_podstawowe.png\",\"width\":700,\"height\":265,\"caption\":\"Sano \u2013 Centre for Computational Medicine\"},\"image\":{\"@id\":\"https:\\\/\\\/sano.science\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/sano.science\\\/\",\"https:\\\/\\\/x.com\\\/sanoscience\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sanoscience\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCDZ_8TcjMWUG2ZcgKKgfpwQ\",\"https:\\\/\\\/bsky.app\\\/profile\\\/sanoscience.bsky.social\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security - Centre for Computational Personalized Medicine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/","og_locale":"en_US","og_type":"article","og_title":"Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security","og_description":"article in journal: scientific reports \u2013 the publisher Springer Nature, 2025","og_url":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/","og_site_name":"Centre for Computational Personalized Medicine","article_publisher":"https:\/\/www.facebook.com\/sano.science\/","article_modified_time":"2025-04-15T13:43:35+00:00","og_image":[{"width":1692,"height":1325,"url":"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@sanoscience","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/","url":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/","name":"Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security - Centre for Computational Personalized Medicine","isPartOf":{"@id":"https:\/\/sano.science\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/#primaryimage"},"image":{"@id":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process.webp","datePublished":"2025-04-15T09:22:27+00:00","dateModified":"2025-04-15T13:43:35+00:00","breadcrumb":{"@id":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/#primaryimage","url":"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process.webp","contentUrl":"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process.webp","width":1692,"height":1325},{"@type":"BreadcrumbList","@id":"https:\/\/sano.science\/research\/cancelable-biometric-authentication-leveraging-empirical-mode-decomposition-and-quaternion-representations-for-iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sano.science\/"},{"@type":"ListItem","position":2,"name":"Research","item":"https:\/\/sano.science\/research\/"},{"@type":"ListItem","position":3,"name":"Publications","item":"https:\/\/sano.science\/research-type\/publications\/"},{"@type":"ListItem","position":4,"name":"Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security"}]},{"@type":"WebSite","@id":"https:\/\/sano.science\/#website","url":"https:\/\/sano.science\/","name":"Centre for Computational Personalized Medicine","description":"Sano \u2013 Centre for Computational Medicine","publisher":{"@id":"https:\/\/sano.science\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sano.science\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sano.science\/#organization","name":"Sano \u2013 Centre for Computational Medicine","alternateName":"Sano","url":"https:\/\/sano.science\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sano.science\/#\/schema\/logo\/image\/","url":"https:\/\/sano.science\/wp-content\/uploads\/2024\/05\/logo_sano_podstawowe.png","contentUrl":"https:\/\/sano.science\/wp-content\/uploads\/2024\/05\/logo_sano_podstawowe.png","width":700,"height":265,"caption":"Sano \u2013 Centre for Computational Medicine"},"image":{"@id":"https:\/\/sano.science\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sano.science\/","https:\/\/x.com\/sanoscience","https:\/\/www.linkedin.com\/company\/sanoscience\/","https:\/\/www.youtube.com\/channel\/UCDZ_8TcjMWUG2ZcgKKgfpwQ","https:\/\/bsky.app\/profile\/sanoscience.bsky.social"]}]}},"acf":[],"gutenberg_blocks":[{"blockName":"custom-styles","attrs":{"styles":""}},{"blockName":"core\/paragraph","attrs":{"epAnimationGeneratedClass":"edplus_anim-u8160B","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<p class=\" eplus-wrapper\">This publication presents a novel approach aimed at improving biometric protection in Internet of Things (IoT) environments. The method focuses on producing cancelable biometric templates that prioritize both security and privacy. By utilizing Empirical Mode Decomposition (EMD) to break down biometric signals into fundamental components and encoding these using quaternion-based techniques, the system generates templates that cannot be reversed and are exceptionally resistant to spoofing attempts.<\/p>\n","innerContent":["\n<p class=\" eplus-wrapper\">This publication presents a novel approach aimed at improving biometric protection in Internet of Things (IoT) environments. The method focuses on producing cancelable biometric templates that prioritize both security and privacy. By utilizing Empirical Mode Decomposition (EMD) to break down biometric signals into fundamental components and encoding these using quaternion-based techniques, the system generates templates that cannot be reversed and are exceptionally resistant to spoofing attempts.<\/p>\n"]},{"blockName":"core\/spacer","attrs":{"height":"20px","epAnimationGeneratedClass":"edplus_anim-LQqDxP","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n","innerContent":["\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n"]},{"blockName":"core\/paragraph","attrs":{"epAnimationGeneratedClass":"edplus_anim-6Ew2yX","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<p class=\" eplus-wrapper\">The approach delivers impressive performance, achieving an Area Under the Curve (AUC) of 0.9997 and an Equal Error Rate approaching zero, all while maintaining low computational requirements. This makes the solution especially appropriate for IoT devices where processing capabilities are often limited. The findings highlight the method\u2019s strong potential to tackle key security concerns in biometric applications within IoT networks.<\/p>\n","innerContent":["\n<p class=\" eplus-wrapper\">The approach delivers impressive performance, achieving an Area Under the Curve (AUC) of 0.9997 and an Equal Error Rate approaching zero, all while maintaining low computational requirements. This makes the solution especially appropriate for IoT devices where processing capabilities are often limited. The findings highlight the method\u2019s strong potential to tackle key security concerns in biometric applications within IoT networks.<\/p>\n"]},{"blockName":"core\/spacer","attrs":{"height":"20px","epAnimationGeneratedClass":"edplus_anim-LQqDxP","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n","innerContent":["\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n"]},{"blockName":"core\/paragraph","attrs":{"epAnimationGeneratedClass":"edplus_anim-PkclPs","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<p class=\" eplus-wrapper\">This research exemplifies Sano\u2019s dedication to developing secure, resource-efficient, and privacy-conscious technologies at the crossroads of biometrics, artificial intelligence, and computational neuroscience.<\/p>\n","innerContent":["\n<p class=\" eplus-wrapper\">This research exemplifies Sano\u2019s dedication to developing secure, resource-efficient, and privacy-conscious technologies at the crossroads of biometrics, artificial intelligence, and computational neuroscience.<\/p>\n"]},{"blockName":"core\/spacer","attrs":{"height":"50px","epAnimationGeneratedClass":"edplus_anim-LQqDxP","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n","innerContent":["\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n"]},{"blockName":"core\/paragraph","attrs":{"epAnimationGeneratedClass":"edplus_anim-13Uwyq","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<p class=\" eplus-wrapper\"><strong>Authors<\/strong>: <a href=\"https:\/\/sano.science\/people\/mahmoud-nasr\/\">Mahmoud Nasr<\/a>,\u00a0Krzysztof Brzostowski,\u00a0 Adam Pi\u00f3rkowski, Fathi E. Abd El-Samie\u00a0<\/p>\n","innerContent":["\n<p class=\" eplus-wrapper\"><strong>Authors<\/strong>: <a href=\"https:\/\/sano.science\/people\/mahmoud-nasr\/\">Mahmoud Nasr<\/a>,\u00a0Krzysztof Brzostowski,\u00a0 Adam Pi\u00f3rkowski, Fathi E. Abd El-Samie\u00a0<\/p>\n"]},{"blockName":"core\/paragraph","attrs":{"epAnimationGeneratedClass":"edplus_anim-13Uwyq","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<p class=\" eplus-wrapper\"><strong>DOI:<\/strong>&nbsp;10.1038\/s41598-025-89491-2<\/p>\n","innerContent":["\n<p class=\" eplus-wrapper\"><strong>DOI:<\/strong>&nbsp;10.1038\/s41598-025-89491-2<\/p>\n"]},{"blockName":"core\/paragraph","attrs":{"epAnimationGeneratedClass":"edplus_anim-ANPqOt","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<p class=\" eplus-wrapper\"><strong>Keywords<\/strong>: Quaternion Mathematics, ComputationalSecurity, EMD, IoT<\/p>\n","innerContent":["\n<p class=\" eplus-wrapper\"><strong>Keywords<\/strong>: Quaternion Mathematics, ComputationalSecurity, EMD, IoT<\/p>\n"]},{"blockName":"core\/spacer","attrs":{"height":"50px","epAnimationGeneratedClass":"edplus_anim-LQqDxP","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n","innerContent":["\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n"]},{"blockName":"acf\/button","attrs":{"title":"READ HERE","button_type":"link","url":"https:\/\/www.nature.com\/articles\/s41598-025-89491-2","button_style":"primary","target":"_self","button_extra_classes":""},"innerBlocks":[],"innerHTML":"","innerContent":[]},{"blockName":"core\/spacer","attrs":{"height":"50px","epAnimationGeneratedClass":"edplus_anim-LQqDxP","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n","innerContent":["\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n"]},{"blockName":"core\/image","attrs":{"id":23059,"sizeSlug":"large","linkDestination":"none","epAnimationGeneratedClass":"edplus_anim-JuTUhV","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<figure class=\"wp-block-image size-large eplus-wrapper\"><img src=\"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process-1024x802.webp\" alt=\"\" class=\"wp-image-23059\"\/><figcaption class=\"wp-element-caption\">Illustration of the proposed biometric template generation process.<\/figcaption><\/figure>\n","innerContent":["\n<figure class=\"wp-block-image size-large eplus-wrapper\"><img src=\"https:\/\/sano.science\/wp-content\/uploads\/2025\/04\/proposed-biometric-template-generation-process-1024x802.webp\" alt=\"\" class=\"wp-image-23059\"\/><figcaption class=\"wp-element-caption\">Illustration of the proposed biometric template generation process.<\/figcaption><\/figure>\n"]},{"blockName":"core\/paragraph","attrs":{"epAnimationGeneratedClass":"edplus_anim-smZpQ7","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<p class=\" eplus-wrapper\">Image Source:&nbsp;<a href=\"https:\/\/www.nature.com\/articles\/s41598-025-89491-2\">www.nature.com\/articles<\/a><\/p>\n","innerContent":["\n<p class=\" eplus-wrapper\">Image Source:&nbsp;<a href=\"https:\/\/www.nature.com\/articles\/s41598-025-89491-2\">www.nature.com\/articles<\/a><\/p>\n"]},{"blockName":"core\/paragraph","attrs":{"epAnimationGeneratedClass":"edplus_anim-YQdL7h","epGeneratedClass":"eplus-wrapper"},"innerBlocks":[],"innerHTML":"\n<p class=\" eplus-wrapper\"><\/p>\n","innerContent":["\n<p class=\" eplus-wrapper\"><\/p>\n"]}],"meta_data":{"is_automatically_other_posts":true,"number_of_posts":"3","is_automatically_check_also_posts":true},"_links":{"self":[{"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/research\/23068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/research"}],"about":[{"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/types\/research"}],"version-history":[{"count":17,"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/research\/23068\/revisions"}],"predecessor-version":[{"id":23095,"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/research\/23068\/revisions\/23095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/media\/23059"}],"wp:attachment":[{"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/media?parent=23068"}],"wp:term":[{"taxonomy":"research_type","embeddable":true,"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/research_type?post=23068"},{"taxonomy":"research_team","embeddable":true,"href":"https:\/\/sano.science\/index.php\/wp-json\/wp\/v2\/research_team?post=23068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}