{"id":"https://openalex.org/W1970317683","doi":"https://doi.org/10.1109/mcg.2002.1016693","title":"Graphics and security: exploring visual biometrics","display_name":"Graphics and security: exploring visual biometrics","publication_year":2002,"publication_date":"2002-07-01","ids":{"openalex":"https://openalex.org/W1970317683","doi":"https://doi.org/10.1109/mcg.2002.1016693","mag":"1970317683"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcg.2002.1016693","pdf_url":null,"source":{"id":"https://openalex.org/S105380075","display_name":"IEEE Computer Graphics and Applications","issn_l":"0272-1716","issn":["0272-1716","1558-1756"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012985444","display_name":"Kirk L. Kroeker","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"K.L. Kroeker","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":["https://openalex.org/A5012985444"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.213,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":16,"citation_normalized_percentile":{"value":0.806196,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"22","issue":"4","first_page":"16","last_page":"21"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.992,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9182,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hand-geometry","display_name":"Hand geometry","score":0.46566343}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8969586},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.78625166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7169502},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71219856},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.54295015},{"id":"https://openalex.org/C146318809","wikidata":"https://www.wikidata.org/wiki/Q3398332","display_name":"Hand geometry","level":3,"score":0.46566343},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33383888}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcg.2002.1016693","pdf_url":null,"source":{"id":"https://openalex.org/S105380075","display_name":"IEEE Computer Graphics and Applications","issn_l":"0272-1716","issn":["0272-1716","1558-1756"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W1759219755","https://openalex.org/W2033419168","https://openalex.org/W2101576074","https://openalex.org/W2102796633","https://openalex.org/W2107384724","https://openalex.org/W2116272578","https://openalex.org/W2117995429","https://openalex.org/W2973818247","https://openalex.org/W4210386237","https://openalex.org/W4210668077","https://openalex.org/W4245134515","https://openalex.org/W4248506240"],"related_works":["https://openalex.org/W4363609778","https://openalex.org/W4233349824","https://openalex.org/W4226022728","https://openalex.org/W4200422973","https://openalex.org/W2400094997","https://openalex.org/W2157001278","https://openalex.org/W2138832667","https://openalex.org/W2029196208","https://openalex.org/W1508148916","https://openalex.org/W1226648629"],"abstract_inverted_index":{"Biometrics":[0,166],"technology":[1],"has":[2],"come":[3],"a":[4,39,91,95],"long":[5],"way":[6],"from":[7],"simpler":[8],"forms":[9,145],"of":[10,41,117,146,155,162,171],"systems":[11,16,149,180,191],"security.":[12],"But":[13,201],"are":[14,181,192],"biometrics-based":[15],"more":[17,27],"secure":[18,185],"or":[19,73,121],"do":[20,104],"they":[21],"simply":[22],"require":[23],"crackers":[24],"to":[25,57,65,76,103,132,204],"become":[26],"proficient":[28],"at":[29],"breaking":[30],"into":[31,90],"systems?":[32],"To":[33],"recognize":[34],"your":[35,42,52,87,99],"fingerprint":[36,43],"requires":[37],"that":[38,50,68,85],"template":[40,80],"actually":[44],"be":[45,205],"present":[46],"in":[47,82,123],"the":[48,78,83,106,115,207],"system":[49,84,92,126],"verifies":[51,86],"access.":[53],"If":[54],"you":[55,72],"want":[56],"pass":[58],"as":[59],"somebody":[60],"else,":[61],"presumably":[62],"you'd":[63,74],"have":[64,67,138],"either":[66],"person's":[69],"finger":[70],"with":[71,98,158],"need":[75],"change":[77],"verifying":[79],"residing":[81],"print.":[88],"Cracking":[89],"and":[93,164,173],"replacing":[94],"legitimate":[96],"print":[97],"own":[100,160],"isn't":[101],"easy":[102],"unless":[105],"system's":[107],"security":[108,142,157],"is":[109,127,198,209],"poor.":[110],"While":[111],"biometric":[112,135,141,148,195],"proponents":[113,136],"stress":[114],"strength":[116],"their":[118],"proprietary":[119],"technologies":[120],"biometrics":[122,202],"general,":[124],"no":[125,183],"ever":[128],"completely":[129],"secure.":[130],"Contrary":[131],"what":[133],"many":[134],"would":[137],"us":[139],"believe-that":[140],"outclasses":[143],"traditional":[144],"security-all":[147],"are,":[150],"after":[151],"all,":[152],"another":[153],"form":[154],"computer":[156],"its":[159],"set":[161],"strengths":[163],"weaknesses.":[165],"effectively":[167],"trade":[168],"some":[169],"amount":[170],"privacy":[172],"cost":[174],"effectiveness":[175],"for":[176],"ultimate":[177],"convenience-and":[178],"these":[179],"certainly":[182],"less":[184],"than":[186],"standard":[187],"password":[188],"systems.":[189],"Password":[190],"cheap.":[193],"Complex":[194],"scanning":[196],"equipment":[197],"usually":[199],"expensive.":[200],"seems":[203],"where":[206],"industry":[208],"headed.":[210]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1970317683","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-14T07:19:39.520922","created_date":"2016-06-24"}