{"id":"https://openalex.org/W1575699352","doi":"https://doi.org/10.1007/11760191_32","title":"Enhancing the Transmission Security of Content-Based Hidden Biometric Data","display_name":"Enhancing the Transmission Security of Content-Based Hidden Biometric Data","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W1575699352","doi":"https://doi.org/10.1007/11760191_32","mag":"1575699352"},"language":"en","primary_location":{"id":"doi:10.1007/11760191_32","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11760191_32","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["Research Group for Biometrics and Security, Sichuan Province Key Laboratory of Signal and Information Processing, Southwest Jiaotong University, Chengdu, P.R. China","Research Group for Biometrics and Security, Sichuan Province Key Laboratory of Signal and Information Processing, Southwest Jiaotong University, Chengdu, Sichuan, P.R. China#TAB#"],"affiliations":[{"raw_affiliation_string":"Research Group for Biometrics and Security, Sichuan Province Key Laboratory of Signal and Information Processing, Southwest Jiaotong University, Chengdu, P.R. China","institution_ids":["https://openalex.org/I4800084"]},{"raw_affiliation_string":"Research Group for Biometrics and Security, Sichuan Province Key Laboratory of Signal and Information Processing, Southwest Jiaotong University, Chengdu, Sichuan, P.R. China#TAB#","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021226284","display_name":"Jiashu Zhang","orcid":"https://orcid.org/0000-0003-2086-0991"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiashu Zhang","raw_affiliation_strings":["Research Group for Biometrics and Security, Sichuan Province Key Laboratory of Signal and Information Processing, Southwest Jiaotong University, Chengdu, P.R. China","Research Group for Biometrics and Security, Sichuan Province Key Laboratory of Signal and Information Processing, Southwest Jiaotong University, Chengdu, Sichuan, P.R. China#TAB#"],"affiliations":[{"raw_affiliation_string":"Research Group for Biometrics and Security, Sichuan Province Key Laboratory of Signal and Information Processing, Southwest Jiaotong University, Chengdu, P.R. China","institution_ids":["https://openalex.org/I4800084"]},{"raw_affiliation_string":"Research Group for Biometrics and Security, Sichuan Province Key Laboratory of Signal and Information Processing, Southwest Jiaotong University, Chengdu, Sichuan, P.R. China#TAB#","institution_ids":["https://openalex.org/I4800084"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072011650"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3984,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57573964,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"214","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7344071865081787},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7120521068572998},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6546437740325928},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5539775490760803},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5389111638069153},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5159805417060852},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5092991590499878},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4381794035434723},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4163011312484741},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3474990725517273},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3214907944202423},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2564064562320709},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16775864362716675},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10441538691520691}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7344071865081787},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7120521068572998},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6546437740325928},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5539775490760803},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5389111638069153},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5159805417060852},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5092991590499878},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4381794035434723},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4163011312484741},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3474990725517273},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3214907944202423},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2564064562320709},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16775864362716675},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10441538691520691},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/11760191_32","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11760191_32","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W61436802","https://openalex.org/W182641306","https://openalex.org/W195461486","https://openalex.org/W1589126615","https://openalex.org/W1846262782","https://openalex.org/W2001954559","https://openalex.org/W2005978338","https://openalex.org/W2013135283","https://openalex.org/W2019369306","https://openalex.org/W2022960273","https://openalex.org/W2047172112","https://openalex.org/W2057853461","https://openalex.org/W2061805355","https://openalex.org/W2083122891","https://openalex.org/W2092882019","https://openalex.org/W2094214226","https://openalex.org/W2102796633","https://openalex.org/W2107772619","https://openalex.org/W2121431807","https://openalex.org/W2143366165","https://openalex.org/W2161285277","https://openalex.org/W2417286712","https://openalex.org/W2478032277","https://openalex.org/W2480075336","https://openalex.org/W2504782928","https://openalex.org/W2611745365","https://openalex.org/W2999811158","https://openalex.org/W3128611524"],"related_works":["https://openalex.org/W2107199751","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W4243812570","https://openalex.org/W2493929861","https://openalex.org/W2787252914","https://openalex.org/W3178466341","https://openalex.org/W2915026029"],"abstract_inverted_index":null,"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
