{"id":"https://openalex.org/W2130561196","doi":"https://doi.org/10.1109/autoid.2007.380589","title":"Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology","display_name":"Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology","publication_year":2007,"publication_date":"2007-06-01","ids":{"openalex":"https://openalex.org/W2130561196","doi":"https://doi.org/10.1109/autoid.2007.380589","mag":"2130561196"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/autoid.2007.380589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://researchrepository.rmit.edu.au/view/delivery/61RMIT_INST/12248008270001341/13248363970001341","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100364982","display_name":"Yi Wang","orcid":"https://orcid.org/0000-0002-8448-8570"},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yi Wang","raw_affiliation_strings":["R. Melbourne Inst. of Technol., Melbourne"],"affiliations":[{"raw_affiliation_string":"R. Melbourne Inst. of Technol., Melbourne","institution_ids":["https://openalex.org/I106959904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["R. Melbourne Inst. of Technol., Melbourne"],"affiliations":[{"raw_affiliation_string":"R. Melbourne Inst. of Technol., Melbourne","institution_ids":["https://openalex.org/I106959904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091725820","display_name":"Kai Xi","orcid":null},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kai Xi","raw_affiliation_strings":["R. Melbourne Inst. of Technol., Melbourne"],"affiliations":[{"raw_affiliation_string":"R. Melbourne Inst. of Technol., Melbourne","institution_ids":["https://openalex.org/I106959904"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055345322","display_name":"B. V. K. Vijaya Kumar","orcid":"https://orcid.org/0000-0001-7126-6381"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijayakumar Bhagavatula","raw_affiliation_strings":["Carnegie Mellon University, Department of Electrical and Computer Engineering, Pittsburgh, PA 15213, Email: kumar@ece.cmu.edu"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Department of Electrical and Computer Engineering, Pittsburgh, PA 15213, Email: kumar@ece.cmu.edu","institution_ids":["https://openalex.org/I74973139"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.623,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":7,"citation_normalized_percentile":{"value":0.731338,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":81},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"40"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Recognition and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Recognition and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication Methods and Security Measures","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":0.9853,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.58761334},{"id":"https://openalex.org/keywords/image-authentication","display_name":"Image Authentication","score":0.573669},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication","score":0.559907},{"id":"https://openalex.org/keywords/continuous-authentication","display_name":"Continuous Authentication","score":0.529723},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint","score":0.518429},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.517937}],"concepts":[{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.83384943},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7944583},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.7528243},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6888389},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.58761334},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5496272},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.45389295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36682892},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34452334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18691549},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10093787},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08430448}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/autoid.2007.380589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://researchrepository.rmit.edu.au/view/delivery/61RMIT_INST/12248008270001341/13248363970001341","pdf_url":"https://researchrepository.rmit.edu.au/view/delivery/61RMIT_INST/12248008270001341/13248363970001341","source":{"id":"https://openalex.org/S4306402074","display_name":"RMIT Research Repository (RMIT University Library)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82951845","host_organization_name":"RMIT University","host_organization_lineage":["https://openalex.org/I82951845"],"host_organization_lineage_names":["RMIT University"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://researchrepository.rmit.edu.au/view/delivery/61RMIT_INST/12248008270001341/13248363970001341","pdf_url":"https://researchrepository.rmit.edu.au/view/delivery/61RMIT_INST/12248008270001341/13248363970001341","source":{"id":"https://openalex.org/S4306402074","display_name":"RMIT Research Repository (RMIT University Library)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82951845","host_organization_name":"RMIT University","host_organization_lineage":["https://openalex.org/I82951845"],"host_organization_lineage_names":["RMIT University"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.45,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1639795441","https://openalex.org/W2014470493","https://openalex.org/W2056324685","https://openalex.org/W2095773423","https://openalex.org/W2105594236","https://openalex.org/W2149700829","https://openalex.org/W4205265922","https://openalex.org/W626414141"],"related_works":["https://openalex.org/W4362496757","https://openalex.org/W3014822659","https://openalex.org/W2608025327","https://openalex.org/W2566091814","https://openalex.org/W2148654711","https://openalex.org/W2117826006","https://openalex.org/W2114937328","https://openalex.org/W2051501574","https://openalex.org/W2050967184","https://openalex.org/W1621827506"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"correlation-based":[3,45],"fingerprint":[4],"authentication":[5,54],"schemes":[6],"that":[7,51],"can":[8,55],"be":[9,56],"used":[10],"for":[11,34],"mobile":[12,36,75],"devices.":[13],"The":[14,61],"investigated":[15],"algorithms":[16,62],"were":[17],"implemented":[18],"with":[19],"a":[20,42,67,73],"J2ME":[21,68],"environment":[22],"on":[23,48,66],"the":[24,31,35,49,52],"application":[25],"layer.":[26],"In":[27],"order":[28],"to":[29],"reduce":[30],"resources":[32],"demanded":[33],"device":[37],"environment,":[38],"we":[39],"also":[40],"propose":[41],"new":[43],"hierarchical":[44],"scheme":[46],"based":[47],"idea":[50],"overall":[53],"decomposed":[57],"into":[58],"partial":[59],"autocorrelations.":[60],"have":[63],"been":[64],"tested":[65],"CDC":[69],"1.0":[70],"emulator":[71],"of":[72],"smart":[74],"phone.":[76]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2130561196","counts_by_year":[{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-03T15:20:42.075420","created_date":"2016-06-24"}