{"id":"https://openalex.org/W1996935887","doi":"https://doi.org/10.1117/12.501151","title":"Extracting forensic evidence from biometric devices","display_name":"Extracting forensic evidence from biometric devices","publication_year":2003,"publication_date":"2003-08-11","ids":{"openalex":"https://openalex.org/W1996935887","doi":"https://doi.org/10.1117/12.501151","mag":"1996935887"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.501151","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045459089","display_name":"Zeno Geradts","orcid":"https://orcid.org/0000-0001-5912-5295"},"institutions":[{"id":"https://openalex.org/I158244335","display_name":"Netherlands Forensic Institute","ror":"https://ror.org/04s2z4291","country_code":"NL","type":"facility","lineage":["https://openalex.org/I158244335"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Zeno J. Geradts","raw_affiliation_strings":[" Netherlands Forensic Institute, Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":" Netherlands Forensic Institute, Netherlands#TAB#","institution_ids":["https://openalex.org/I158244335"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047695648","display_name":"Arnout Ruifrok","orcid":null},"institutions":[{"id":"https://openalex.org/I158244335","display_name":"Netherlands Forensic Institute","ror":"https://ror.org/04s2z4291","country_code":"NL","type":"facility","lineage":["https://openalex.org/I158244335"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Arnout C. Ruifrok","raw_affiliation_strings":[" Netherlands Forensic Institute, Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":" Netherlands Forensic Institute, Netherlands#TAB#","institution_ids":["https://openalex.org/I158244335"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.859948,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":72,"max":74},"biblio":{"volume":"5108","issue":null,"first_page":"181","last_page":"181"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9902,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9902,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9737,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9615,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.5783019}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8681222},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71434206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.68256795},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6185048},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5783019},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.52338207},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5033147},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49544346},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.43429166},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.42833078},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42526114},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25867423},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.21152464},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.501151","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4308654646","https://openalex.org/W4233844014","https://openalex.org/W4200422973","https://openalex.org/W3193477356","https://openalex.org/W3104966193","https://openalex.org/W2157236846","https://openalex.org/W2123843216","https://openalex.org/W1979148467","https://openalex.org/W143386018","https://openalex.org/W1004582678"],"abstract_inverted_index":{"Over":[0],"the":[1,31,61,80,83,110,138,143,148,152],"past":[2],"few":[3],"years,":[4],"both":[5],"large":[6],"multinationals":[7],"and":[8,25,55,82,96],"governments":[9],"have":[10,29,90],"begun":[11],"to":[12,14,47,91,115],"contribute":[13],"even":[15],"larger":[16],"projects":[17],"on":[18],"biometric":[19,136,149],"devices.":[20],"Terrorist":[21],"attacks":[22],"in":[23,26,53,57,64,127],"America":[24],"other":[27],"countries":[28],"highlighted":[30],"need":[32],"for":[33,37,44,51,69],"better":[34],"identification":[35],"systems":[36,43,66,123,150],"people":[38,89],"as":[39,41,88],"well":[40],"improved":[42],"controlling":[45],"access":[46,156],"buildings.":[48],"Another":[49],"reason":[50],"investment":[52],"Research":[54],"Development":[56],"Biometric":[58],"Devices,":[59],"is":[60,85,107,113,122],"massive":[62],"growth":[63],"internet-based":[65],"--":[67],"whether":[68],"e-commerce,":[70],"e-government":[71],"or":[72,151],"internal":[73],"processes":[74],"within":[75],"organizations.":[76],"The":[77],"interface":[78],"between":[79],"system":[81],"user":[84],"routinely":[86],"abused,":[87],"remember":[92],"many":[93],"complex":[94],"passwords":[95],"handle":[97],"tokens":[98],"of":[99,109,120,145,154],"various":[100],"types.":[101],"In":[102,132],"this":[103],"paper":[104],"an":[105,118],"overview":[106],"given":[108],"information":[111],"that":[112],"important":[114],"know":[116],"before":[117,157],"examination":[119],"such":[121],"can":[124],"be":[125],"done":[126],"a":[128],"forensic":[129,133,139],"proper":[130],"way.":[131],"evidence":[134],"with":[135,147],"devices":[137],"examiner":[140],"should":[141],"consider":[142],"possibilities":[144,153],"tampering":[146],"unauthorized":[155],"drawing":[158],"conclusions.":[159]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1996935887","counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-01-19T21:00:27.931835","created_date":"2016-06-24"}