{"id":"https://openalex.org/W2546003804","doi":"https://doi.org/10.1109/acpr.2011.6166527","title":"Probability of a unique crypto key generation based on finger's different images with two scanners","display_name":"Probability of a unique crypto key generation based on finger's different images with two scanners","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W2546003804","doi":"https://doi.org/10.1109/acpr.2011.6166527","mag":"2546003804"},"language":"en","primary_location":{"id":"doi:10.1109/acpr.2011.6166527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acpr.2011.6166527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The First Asian Conference on Pattern Recognition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101502733","display_name":"Guoqiang Ma","orcid":"https://orcid.org/0000-0002-6714-2105"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guoqiang Ma","raw_affiliation_strings":["School of Computer, Wuhan University of China, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Wuhan University of China, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102888944","display_name":"Juan Liu","orcid":"https://orcid.org/0000-0003-3538-0931"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juan Liu","raw_affiliation_strings":["School of Computer, Wuhan University of China, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Wuhan University of China, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010881036","display_name":"Bin Ni","orcid":"https://orcid.org/0000-0002-1684-6372"},"institutions":[{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bin Ni","raw_affiliation_strings":["Department of Computer Science and Engineering, University of South Carolina, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of South Carolina, USA","institution_ids":["https://openalex.org/I155781252"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101502733"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.34885887,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"72","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9660000205039978,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9635999798774719,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7498403787612915},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7248430252075195},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7020820379257202},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.680259108543396},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.6757532954216003},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6634449362754822},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6454617381095886},{"id":"https://openalex.org/keywords/scanner","display_name":"Scanner","score":0.6396496295928955},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6156034469604492},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.441699355840683},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.4109342694282532},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3560516834259033},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.31306833028793335},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13121473789215088}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7498403787612915},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7248430252075195},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7020820379257202},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.680259108543396},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.6757532954216003},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6634449362754822},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6454617381095886},{"id":"https://openalex.org/C2779751349","wikidata":"https://www.wikidata.org/wiki/Q1474480","display_name":"Scanner","level":2,"score":0.6396496295928955},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6156034469604492},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.441699355840683},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.4109342694282532},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3560516834259033},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.31306833028793335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13121473789215088},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acpr.2011.6166527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acpr.2011.6166527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The First Asian Conference on Pattern Recognition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1540122282","https://openalex.org/W1546438435","https://openalex.org/W1639795441","https://openalex.org/W1851882747","https://openalex.org/W1996051060","https://openalex.org/W2007527634","https://openalex.org/W2015010245","https://openalex.org/W2017439879","https://openalex.org/W2033223053","https://openalex.org/W2063355793","https://openalex.org/W2096521846","https://openalex.org/W2106137793","https://openalex.org/W2119334679","https://openalex.org/W2127098089","https://openalex.org/W2131183039","https://openalex.org/W2141237901","https://openalex.org/W2148142548","https://openalex.org/W2156309524","https://openalex.org/W2157298821","https://openalex.org/W2162178585","https://openalex.org/W2162720573","https://openalex.org/W2165831888","https://openalex.org/W2500986216","https://openalex.org/W3160027900","https://openalex.org/W6632228553","https://openalex.org/W6639151589","https://openalex.org/W6674194619","https://openalex.org/W6677610113"],"related_works":["https://openalex.org/W3014822659","https://openalex.org/W4362496757","https://openalex.org/W2566091814","https://openalex.org/W4389371618","https://openalex.org/W2051501574","https://openalex.org/W2117826006","https://openalex.org/W2114937328","https://openalex.org/W2148654711","https://openalex.org/W2608025327","https://openalex.org/W1621827506"],"abstract_inverted_index":{"In":[0,46],"practical":[1],"cases,":[2],"one":[3,72,117],"finger":[4,118],"is":[5,26,101],"always":[6],"scanned":[7,123],"with":[8,124],"different":[9,12,16,98,113,125],"scanners":[10],"at":[11],"time,":[13],"which":[14,39],"generates":[15],"fingerprint":[17,36,54,73,114],"images.":[18],"The":[19,77],"key":[20,33,67,91,107,143],"issue":[21],"of":[22,116,131,138],"the":[23,49,53,58,94,129,136],"fingerprint-based":[24,59],"cryptosystem":[25],"how":[27],"to":[28,44,102],"realize":[29],"a":[30,35,65,88,104],"unique":[31,105],"crypto":[32,66,90,106],"from":[34,42,97],"feature":[37],"data":[38],"may":[40],"differ":[41],"scanner":[43],"scanner.":[45],"this":[47],"paper,":[48],"main":[50],"difference":[51],"between":[52],"key-generation":[55],"cryptosystems":[56],"and":[57,64,142],"recognition":[60],"system":[61],"was":[62,75],"studied":[63],"generation":[68,144],"scheme":[69],"based":[70,111],"on":[71,112],"image":[74,139],"proposed.":[76],"experimental":[78],"results":[79],"showed":[80],"that":[81],"about":[82],"forty":[83],"percent":[84],"fingers":[85],"can":[86],"generate":[87],"same":[89],"even":[92,119],"if":[93],"images":[95,115,121],"are":[96],"scanners.":[99,126],"That":[100],"say,":[103],"could":[108],"be":[109,135],"generated":[110],"these":[120],"were":[122],"This":[127],"means":[128],"efforts":[130],"future":[132],"work":[133],"should":[134],"technology":[137],"quality":[140],"checking":[141],"scheme.":[145]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
