{"id":"https://openalex.org/W3135996681","doi":"https://doi.org/10.1109/bigdata50022.2020.9377901","title":"A Cancelable Multi-Modal Biometric Based Encryption Scheme for Medical Images","display_name":"A Cancelable Multi-Modal Biometric Based Encryption Scheme for Medical Images","publication_year":2020,"publication_date":"2020-12-10","ids":{"openalex":"https://openalex.org/W3135996681","doi":"https://doi.org/10.1109/bigdata50022.2020.9377901","mag":"3135996681"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata50022.2020.9377901","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata50022.2020.9377901","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008977566","display_name":"Alycia N. Carey","orcid":"https://orcid.org/0000-0002-3587-4088"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alycia N. Carey","raw_affiliation_strings":["Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas","institution_ids":["https://openalex.org/I78715868"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021549646","display_name":"Justin Zhan","orcid":"https://orcid.org/0000-0001-8991-5669"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Justin Zhan","raw_affiliation_strings":["Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas","institution_ids":["https://openalex.org/I78715868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008977566"],"corresponding_institution_ids":["https://openalex.org/I78715868"],"apc_list":null,"apc_paid":null,"fwci":0.9092,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.75437788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"3711","last_page":"3720"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8391329050064087},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7491577863693237},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.6415032744407654},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5373104810714722},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5279573202133179},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5248532295227051},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5069558620452881},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4499451220035553},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4322007894515991},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4185091555118561},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.41659823060035706},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4149675965309143}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8391329050064087},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7491577863693237},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.6415032744407654},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5373104810714722},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5279573202133179},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5248532295227051},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5069558620452881},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4499451220035553},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4322007894515991},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4185091555118561},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.41659823060035706},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4149675965309143}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata50022.2020.9377901","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata50022.2020.9377901","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320310553","display_name":"Arkansas Research Alliance","ror":"https://ror.org/03wcw7y06"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1502389339","https://openalex.org/W1562611635","https://openalex.org/W1974821667","https://openalex.org/W1980951182","https://openalex.org/W2014136002","https://openalex.org/W2063355793","https://openalex.org/W2090425678","https://openalex.org/W2100603595","https://openalex.org/W2108048356","https://openalex.org/W2114271155","https://openalex.org/W2117420234","https://openalex.org/W2118282683","https://openalex.org/W2129905915","https://openalex.org/W2133665775","https://openalex.org/W2156422212","https://openalex.org/W2160687222","https://openalex.org/W2165831888","https://openalex.org/W2167141450","https://openalex.org/W2342772375","https://openalex.org/W2461999971","https://openalex.org/W2516575313","https://openalex.org/W2521262137","https://openalex.org/W2529607158","https://openalex.org/W2743436145","https://openalex.org/W2760967785","https://openalex.org/W2783438813","https://openalex.org/W2902696888","https://openalex.org/W2965046605","https://openalex.org/W2969658688","https://openalex.org/W2998145218","https://openalex.org/W4210694990","https://openalex.org/W4300349690","https://openalex.org/W6683436568","https://openalex.org/W6728114805","https://openalex.org/W6744862698"],"related_works":["https://openalex.org/W2387840805","https://openalex.org/W4315815885","https://openalex.org/W2361619969","https://openalex.org/W2545514196","https://openalex.org/W2188276378","https://openalex.org/W4240313302","https://openalex.org/W2396533199","https://openalex.org/W3143289714","https://openalex.org/W2111426419","https://openalex.org/W4243621294"],"abstract_inverted_index":{"In":[0,197],"this":[1,199],"paper,":[2],"a":[3,76,88,115,226],"novel":[4],"multi-modal":[5],"biometric":[6,103,179],"based":[7,17,168],"encryption":[8,30,159,166,192,218,229],"scheme":[9],"for":[10,36],"medical":[11,123,126,165,214,227],"images":[12],"is":[13,16,201,206,223],"proposed.":[14],"It":[15],"upon":[18,162],"the":[19,37,40,50,52,55,61,64,71,91,94,102,122,133,139,148,156,175,178,210,213,217],"ever-secure":[20],"Advanced":[21],"Encryption":[22],"Standard":[23],"Cipher":[24],"Block":[25],"Chaining":[26],"(AES-CBC)":[27],"mode":[28],"of":[29,39,49,59,63,87,93,177,212,225],"and":[31,54,83,193],"Indexing-First":[32],"One":[33],"(IFO)":[34],"hashing":[35],"generation":[38],"secret":[41,77,112],"keys.":[42],"The":[43,97,125],"proposed":[44],"system":[45,119],"utilizes":[46],"two":[47,110,116],"biometrics":[48,65],"user,":[51],"iris":[53],"fingerprint,":[56],"but":[57],"instead":[58],"using":[60],"features":[62],"directly,":[66],"they":[67],"are":[68,106],"hashed":[69],"through":[70],"IFO":[72,98],"process":[73],"to":[74,120,154,186],"create":[75],"key":[78,190],"that":[79,143,204],"can":[80,128],"be":[81,129,152],"revoked":[82],"regenerated":[84],"in":[85,114,136,209],"case":[86],"compromise":[89],"ensuring":[90],"security":[92],"users":[95],"biometrics.":[96],"hashes":[99],"obtained":[100],"from":[101],"feature":[104],"vectors":[105],"then":[107],"used":[108],"as":[109],"different":[111],"keys":[113],"round":[117],"AES-CBC":[118,134],"encrypt":[121],"image.":[124,157],"image":[127,215,228],"decrypted":[130],"by":[131],"performing":[132],"rounds":[135],"reverse":[137],"with":[138,144],"correct":[140,149],"keys,":[141],"meaning":[142,203],"high":[145],"probability,":[146],"only":[147],"user":[150],"will":[151],"able":[153,185],"decrypt":[155],"This":[158],"technique":[160],"improves":[161],"many":[163],"existing":[164],"schemes":[167],"on":[169],"biometrics,":[170],"which":[171,222],"do":[172],"not":[173],"take":[174],"protection":[176],"template":[180],"into":[181],"account.":[182],"We":[183],"were":[184],"perform":[187],"one":[188],"full":[189],"generation,":[191],"decryption":[194,220],"in.027":[195],"seconds.":[196],"addition,":[198],"processes":[200],"lossless,":[202],"there":[205],"no":[207],"change":[208],"pixels":[211],"during":[216],"or":[219],"process,":[221],"necessary":[224],"system.":[230]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
