{"id":"https://openalex.org/W2070601859","doi":"https://doi.org/10.1155/2015/673867","title":"A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication","display_name":"A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2070601859","doi":"https://doi.org/10.1155/2015/673867","mag":"2070601859","pmid":"https://pubmed.ncbi.nlm.nih.gov/25873989","pmcid":"https://www.ncbi.nlm.nih.gov/pmc/articles/4385657"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/673867","pdf_url":"https://downloads.hindawi.com/journals/cmmm/2015/673867.pdf","source":{"id":"https://openalex.org/S36980176","display_name":"Computational and Mathematical Methods in Medicine","issn_l":"1748-670X","issn":["1748-670X","1748-6718"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/cmmm/2015/673867.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101922355","display_name":"Yijun Yang","orcid":"https://orcid.org/0000-0001-7284-5502"},"institutions":[{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijun Yang","raw_affiliation_strings":["ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China."],"affiliations":[{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101778766","display_name":"Jianping Yu","orcid":"https://orcid.org/0000-0002-9896-104X"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping Yu","raw_affiliation_strings":["ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China."],"affiliations":[{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.","institution_ids":["https://openalex.org/I180726961","https://openalex.org/I4210152380"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100364188","display_name":"Peng Zhang","orcid":"https://orcid.org/0000-0002-8671-3292"},"institutions":[{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Zhang","raw_affiliation_strings":["ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China."],"affiliations":[{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101422036","display_name":"Shulan Wang","orcid":"https://orcid.org/0000-0001-6420-4561"},"institutions":[{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shulan Wang","raw_affiliation_strings":["ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China."],"affiliations":[{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"fwci":0.265,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":3,"citation_normalized_percentile":{"value":0.646084,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":79},"biblio":{"volume":"2015","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9883,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/minutiae","display_name":"Minutiae","score":0.8342731}],"concepts":[{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.84969866},{"id":"https://openalex.org/C67174900","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Minutiae","level":4,"score":0.8342731},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.7217928},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71005964},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7018248},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.63199294},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5372389},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5113289},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47113675},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.45488524},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3995144},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39579332},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36606663},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.34119996},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32740027},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32640415},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3208109},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19453186},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[{"descriptor_ui":"D056667","descriptor_name":"Biometric Identification","qualifier_ui":"Q000379","qualifier_name":"methods","is_major_topic":true},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":"","qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003878","descriptor_name":"Dermatoglyphics","qualifier_ui":"","qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D010363","descriptor_name":"Pattern Recognition, Automated","qualifier_ui":"","qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D056667","descriptor_name":"Biometric Identification","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003201","descriptor_name":"Computers","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003625","descriptor_name":"Data Collection","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D005385","descriptor_name":"Fingers","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D017143","descriptor_name":"Fuzzy Logic","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D007091","descriptor_name":"Image Processing, Computer-Assisted","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016011","descriptor_name":"Normal Distribution","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D015203","descriptor_name":"Reproducibility of Results","qualifier_ui":"","qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D012984","descriptor_name":"Software","qualifier_ui":"","qualifier_name":null,"is_major_topic":false}],"locations_count":5,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/673867","pdf_url":"https://downloads.hindawi.com/journals/cmmm/2015/673867.pdf","source":{"id":"https://openalex.org/S36980176","display_name":"Computational and Mathematical Methods in Medicine","issn_l":"1748-670X","issn":["1748-670X","1748-6718"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/291af44d1297423498b90c992252e2e0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://europepmc.org/articles/pmc4385657","pdf_url":"https://europepmc.org/articles/pmc4385657?pdf=render","source":{"id":"https://openalex.org/S4306400806","display_name":"Europe PMC (PubMed Central)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1303153112","host_organization_name":"European Bioinformatics Institute","host_organization_lineage":["https://openalex.org/I1303153112"],"host_organization_lineage_names":["European Bioinformatics Institute"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4385657","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":["National Institutes of Health"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/25873989","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":["National Institutes of Health"],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2015/673867","pdf_url":"https://downloads.hindawi.com/journals/cmmm/2015/673867.pdf","source":{"id":"https://openalex.org/S36980176","display_name":"Computational and Mathematical Methods in Medicine","issn_l":"1748-670X","issn":["1748-670X","1748-6718"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1656731780","https://openalex.org/W1974490599","https://openalex.org/W1979638949","https://openalex.org/W1988374952","https://openalex.org/W2054463743","https://openalex.org/W2106137793","https://openalex.org/W2125587922","https://openalex.org/W2144596760","https://openalex.org/W2151915275","https://openalex.org/W2157186433","https://openalex.org/W2165367855","https://openalex.org/W2371479230","https://openalex.org/W2384892531"],"related_works":["https://openalex.org/W3169072271","https://openalex.org/W3037288134","https://openalex.org/W2566091814","https://openalex.org/W2565799042","https://openalex.org/W2136721862","https://openalex.org/W2126450185","https://openalex.org/W2122988758","https://openalex.org/W2082047178","https://openalex.org/W2020992254","https://openalex.org/W1540357037"],"abstract_inverted_index":{"A":[0],"fingerprint":[1,16,35,60],"encryption":[2],"scheme":[3,88],"based":[4],"on":[5,92],"irreversible":[6,41,99],"function":[7,43,100],"has":[8,89],"been":[9],"designed":[10],"in":[11],"this":[12],"paper.":[13],"Since":[14],"the":[15,20,26,34,45,51,58,70,73,76,80,87],"template":[17],"includes":[18],"almost":[19],"entire":[21],"information":[22],"of":[23,75],"users\u2019":[24],"fingerprints,":[25],"personal":[27],"authentication":[28],"can":[29],"be":[30],"determined":[31],"only":[32],"by":[33],"features.":[36],"This":[37],"paper":[38],"proposes":[39],"an":[40],"transforming":[42],"(using":[44],"improved":[46],"SHA1":[47],"algorithm)":[48],"to":[49,68],"transform":[50],"original":[52],"minutiae":[53,78],"which":[54],"are":[55],"extracted":[56],"from":[57,72],"thinned":[59],"image.":[61],"Then,":[62],"Chinese":[63],"remainder":[64],"theorem":[65],"is":[66],"used":[67],"obtain":[69],"biokey":[71],"integration":[74],"transformed":[77],"and":[79,94],"private":[81],"key.":[82],"The":[83],"result":[84],"shows":[85],"that":[86],"better":[90],"performance":[91],"security":[93],"efficiency":[95],"comparing":[96],"with":[97],"other":[98],"schemes.":[101]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2070601859","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2024-12-07T05:22:38.340688","created_date":"2016-06-24"}