{"id":"https://openalex.org/W4407638377","doi":"https://doi.org/10.1109/acit62805.2024.10877179","title":"Fingerprint Authentication Method using Two Steps Verification Algorithm","display_name":"Fingerprint Authentication Method using Two Steps Verification Algorithm","publication_year":2024,"publication_date":"2024-12-10","ids":{"openalex":"https://openalex.org/W4407638377","doi":"https://doi.org/10.1109/acit62805.2024.10877179"},"language":"en","primary_location":{"id":"doi:10.1109/acit62805.2024.10877179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10877179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://researchonline.gcu.ac.uk/en/publications/1c6af4b7-03b1-4e56-8203-8d83af20bd71","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024531998","display_name":"Ramy M. Bahy","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100308","display_name":"Military Technical College","ror":"https://ror.org/01337pb37","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210100308"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Ramy M. Bahy","raw_affiliation_strings":["Technical Research Center,Cairo,Egypt"],"affiliations":[{"raw_affiliation_string":"Technical Research Center,Cairo,Egypt","institution_ids":["https://openalex.org/I4210100308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016560751","display_name":"Jafar Ababneh","orcid":"https://orcid.org/0000-0003-0191-2688"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Jafar Ababneh","raw_affiliation_strings":["Zarqa University,Faculty of Information Technology,Cyber Security Department,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Faculty of Information Technology,Cyber Security Department,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049069083","display_name":"Hani Attar","orcid":"https://orcid.org/0000-0001-8028-7918"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Hani Attar","raw_affiliation_strings":["Zarqa University,Faculty of Engineering,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Faculty of Engineering,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057732041","display_name":"Mohammad Alhihi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammad Al-Hihi","raw_affiliation_strings":["Independent Research,Erlangen,Germany"],"affiliations":[{"raw_affiliation_string":"Independent Research,Erlangen,Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109947993","display_name":"Mohamed Hafez","orcid":null},"institutions":[{"id":"https://openalex.org/I12649496","display_name":"INTI International University","ror":"https://ror.org/03fj82m46","country_code":"MY","type":"education","lineage":["https://openalex.org/I12649496"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohamed Hafez","raw_affiliation_strings":["INTI-IU-University,Faculty of Engineering FEQS,Nilai,Malaysia"],"affiliations":[{"raw_affiliation_string":"INTI-IU-University,Faculty of Engineering FEQS,Nilai,Malaysia","institution_ids":["https://openalex.org/I12649496"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044479333","display_name":"Ahmed Solyman","orcid":"https://orcid.org/0000-0003-2842-3104"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ahmed Solyman","raw_affiliation_strings":["Glasgow Caledonian University,School of Computing, Engineering and Built Environment,Glasgow,UK"],"affiliations":[{"raw_affiliation_string":"Glasgow Caledonian University,School of Computing, Engineering and Built Environment,Glasgow,UK","institution_ids":["https://openalex.org/I195939026"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5024531998"],"corresponding_institution_ids":["https://openalex.org/I4210100308"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31352393,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9441999793052673,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9441999793052673,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7369084358215332},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6613551378250122},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.6020165681838989},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5988397002220154},{"id":"https://openalex.org/keywords/fingerprint-verification-competition","display_name":"Fingerprint Verification Competition","score":0.4490283131599426},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39904481172561646},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2999027371406555},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19707781076431274}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7369084358215332},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6613551378250122},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.6020165681838989},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5988397002220154},{"id":"https://openalex.org/C164995936","wikidata":"https://www.wikidata.org/wiki/Q5450283","display_name":"Fingerprint Verification Competition","level":4,"score":0.4490283131599426},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39904481172561646},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2999027371406555},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19707781076431274}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/acit62805.2024.10877179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10877179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:researchonline.gcu.ac.uk:openaire/1c6af4b7-03b1-4e56-8203-8d83af20bd71","is_oa":true,"landing_page_url":"https://researchonline.gcu.ac.uk/en/publications/1c6af4b7-03b1-4e56-8203-8d83af20bd71","pdf_url":null,"source":{"id":"https://openalex.org/S4306402566","display_name":"ResearchOnline (Glasgow Caledonian University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I195939026","host_organization_name":"Glasgow Caledonian University","host_organization_lineage":["https://openalex.org/I195939026"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Bahy, R M, Ababneh, J, Attar, H, Al-Hihi, M, Hafez, M & Solyman, A 2025, Fingerprint authentication method using two steps verification algorithm. in 2024 25th International Arab Conference on Information Technology (ACIT). International Arab Conference on Information Technology, Institute of Electrical and Electronics Engineers Inc., 25th International Arab Conference on Information Technology, Zarqa, Jordan, 10/12/24. https://doi.org/10.1109/ACIT62805.2024.10877179","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:researchonline.gcu.ac.uk:openaire/1c6af4b7-03b1-4e56-8203-8d83af20bd71","is_oa":true,"landing_page_url":"https://researchonline.gcu.ac.uk/en/publications/1c6af4b7-03b1-4e56-8203-8d83af20bd71","pdf_url":null,"source":{"id":"https://openalex.org/S4306402566","display_name":"ResearchOnline (Glasgow Caledonian University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I195939026","host_organization_name":"Glasgow Caledonian University","host_organization_lineage":["https://openalex.org/I195939026"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Bahy, R M, Ababneh, J, Attar, H, Al-Hihi, M, Hafez, M & Solyman, A 2025, Fingerprint authentication method using two steps verification algorithm. in 2024 25th International Arab Conference on Information Technology (ACIT). International Arab Conference on Information Technology, Institute of Electrical and Electronics Engineers Inc., 25th International Arab Conference on Information Technology, Zarqa, Jordan, 10/12/24. https://doi.org/10.1109/ACIT62805.2024.10877179","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W67327272","https://openalex.org/W1551947943","https://openalex.org/W2011948930","https://openalex.org/W2020684502","https://openalex.org/W2085507112","https://openalex.org/W2109131581","https://openalex.org/W2112770353","https://openalex.org/W2125732160","https://openalex.org/W2131247939","https://openalex.org/W2470447572","https://openalex.org/W2614307936","https://openalex.org/W2810142915","https://openalex.org/W2899210976","https://openalex.org/W3017083006","https://openalex.org/W3039860277","https://openalex.org/W3119758344","https://openalex.org/W4224039994","https://openalex.org/W4313586246","https://openalex.org/W4323019813","https://openalex.org/W4383890556"],"related_works":["https://openalex.org/W2124627279","https://openalex.org/W2146126086","https://openalex.org/W2399348932","https://openalex.org/W2187019478","https://openalex.org/W2051294001","https://openalex.org/W2588889495","https://openalex.org/W1502375461","https://openalex.org/W2136721862","https://openalex.org/W1988583494","https://openalex.org/W2292987876"],"abstract_inverted_index":{"This":[0,57],"paper":[1],"presents":[2],"a":[3,10,84,93],"new":[4],"Fingerprint":[5],"Authentication":[6],"method":[7,117],"based":[8],"on":[9,19],"steps":[11],"verification":[12,16,78],"algorithm.":[13],"The":[14,76],"first":[15],"step":[17,58,79],"depends":[18],"feature":[20],"extraction":[21],"of":[22,53,87],"contours,":[23],"edges,":[24],"and":[25,33,44,61,68,101,121],"lines":[26,45],"in":[27,73,106],"both":[28],"the":[29,34,41,48,54,64,97,113],"source":[30,65,98],"fingerprint":[31,66,99,115],"image":[32,67,72,100,105],"stored":[35],"database":[36,74,107],"images,":[37],"followed":[38],"by":[39,46],"matching":[40],"same":[42],"edges":[43],"measuring":[47],"Euclidean":[49],"distance":[50],"between":[51,63,96],"pixels":[52],"matched":[55,70,104],"lines.":[56],"indicates":[59],"realization":[60],"recognition":[62,88,123],"its":[69,102],"corresponding":[71],"images.":[75],"second":[77],"is":[80],"performed":[81],"to":[82],"give":[83],"final":[85],"decision":[86],"using":[89],"mutual":[90],"information":[91],"as":[92],"similarity":[94],"measure":[95],"initially":[103],"images.The":[108],"experimental":[109],"results":[110],"proved":[111],"that":[112],"proposed":[114],"authentication":[116],"gives":[118],"an":[119],"accurate":[120],"high":[122],"rate.":[124]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
