{"id":"https://openalex.org/W2906375201","doi":"https://doi.org/10.1109/ccst.2018.8585636","title":"About the Abuse Options of the Dynamic Biometric Signature","display_name":"About the Abuse Options of the Dynamic Biometric Signature","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2906375201","doi":"https://doi.org/10.1109/ccst.2018.8585636","mag":"2906375201"},"language":"en","primary_location":{"id":"doi:10.1109/ccst.2018.8585636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccst.2018.8585636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Carnahan Conference on Security Technology (ICCST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028830406","display_name":"Vladimir Smeikal","orcid":null},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Vladimir Smeikal","raw_affiliation_strings":["Department of Informatics, University of Technology, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Technology, Brno, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021286283","display_name":"Jind\u0159ich Kodl","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jindrich Kodl","raw_affiliation_strings":["Authorized expert of cryptology and information systems security, Prague, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Authorized expert of cryptology and information systems security, Prague, Czech Republic","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044143260","display_name":"Frantisek Hortai","orcid":null},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Frantisek Hortai","raw_affiliation_strings":["Department of Informatics, University of Technology, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Technology, Brno, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030138501","display_name":"Petr Tesar","orcid":null},"institutions":[{"id":"https://openalex.org/I105410415","display_name":"University of Finance and Administration","ror":"https://ror.org/020ydms54","country_code":"CZ","type":"education","lineage":["https://openalex.org/I105410415"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Petr Tesar","raw_affiliation_strings":["Department of Informatics and Mathematics, University of Finance and Administration, Prague, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Department of Informatics and Mathematics, University of Finance and Administration, Prague, Czech Republic","institution_ids":["https://openalex.org/I105410415"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5028830406"],"corresponding_institution_ids":["https://openalex.org/I60587646"],"apc_list":null,"apc_paid":null,"fwci":0.1045,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.47927092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.8252788782119751},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6329324841499329},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6248599290847778},{"id":"https://openalex.org/keywords/conformity","display_name":"Conformity","score":0.5674153566360474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5282900333404541},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.412384569644928},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3803003430366516},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20272064208984375},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.19081899523735046},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.10489550232887268}],"concepts":[{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.8252788782119751},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6329324841499329},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6248599290847778},{"id":"https://openalex.org/C142172996","wikidata":"https://www.wikidata.org/wiki/Q221284","display_name":"Conformity","level":2,"score":0.5674153566360474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5282900333404541},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.412384569644928},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3803003430366516},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20272064208984375},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.19081899523735046},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.10489550232887268},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccst.2018.8585636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccst.2018.8585636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Carnahan Conference on Security Technology (ICCST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1978913478","https://openalex.org/W1980926065","https://openalex.org/W2042237405","https://openalex.org/W2042405942","https://openalex.org/W2232969753","https://openalex.org/W2284009754","https://openalex.org/W2314622687","https://openalex.org/W2432517183","https://openalex.org/W2577360219","https://openalex.org/W2771296003","https://openalex.org/W2801332878","https://openalex.org/W6732525301"],"related_works":["https://openalex.org/W2011517474","https://openalex.org/W3093361777","https://openalex.org/W2375986109","https://openalex.org/W4312551713","https://openalex.org/W2050458297","https://openalex.org/W4386545958","https://openalex.org/W2061182527","https://openalex.org/W4252128182","https://openalex.org/W2361343466","https://openalex.org/W2103765984"],"abstract_inverted_index":{"The":[0,60,134],"paper":[1],"examines":[2],"the":[3,24,52,56,67,73,80,93,96,99,122,130,138,143,153,194,206,209,220,229,239,243],"possibilities":[4],"of":[5,23,72,76,82,85,95,140,156,158,208,222,231,238,242],"exploiting":[6],"a":[7,18,69,86,110,236],"dynamic":[8,78,207],"biometric":[9],"signature":[10,25,74,124,210],"(hereinafter":[11],"referred":[12],"to":[13,38,54,105,108,125,129,152,173,183,188,204],"as":[14,119,127,132],"\u201cDBS\u201d)":[15],"by":[16,162,175],"forging":[17,219],"DBS":[19,169,221],"when":[20],"having":[21,184],"knowledge":[22],"dynamic.":[26],"An":[27],"experiment":[28,68],"was":[29,103,145,149,166,213],"carried":[30],"out":[31],"on":[32,48,228],"test":[33],"subjects":[34,61],"who":[35],"are":[36],"assumed":[37],"have":[39],"adequate":[40],"expertise":[41],"and":[42,45,51,75,148,233],"mental":[43],"qualifications":[44],"signing":[46],"skills":[47],"scanning":[49],"devices":[50],"motivation":[53],"achieve":[55],"best":[57],"possible":[58,203],"result.":[59],"had":[62],"at":[63],"their":[64],"disposal":[65],"throughout":[66],"static":[70],"display":[71,84],"its":[77],"in":[79,197,199,218],"form":[81],"repeated":[83],"progressively-created":[87],"signature.":[88,100],"Moreover,":[89],"each":[90],"subject":[91,102],"knew":[92],"name":[94],"person":[97,177,224],"providing":[98],"Each":[101],"able":[104],"repeat":[106],"attempts":[107,232],"provide":[109],"forgery":[111,174],"with":[112],"no":[113],"time":[114,118],"limit":[115],"until":[116],"such":[117],"he/she":[120],"considered":[121],"forged":[123],"be":[126,196],"similar":[128],"original":[131],"possible.":[133],"results":[135],"showed":[136],"that":[137,168,193,216],"level":[139],"success":[141,217],"among":[142],"forgers":[144],"very":[146],"low":[147],"reduced":[150],"according":[151],"required":[154],"degree":[155],"conformity":[157],"signatures":[159],"for":[160],"acceptance":[161],"audit":[163],"software.":[164],"It":[165,212],"shown":[167,215],"is":[170,202,234],"highly":[171],"resistant":[172],"another":[176,223],"under":[178],"standard":[179],"conditions.":[180],"In":[181],"addition":[182],"an":[185],"undoubted":[186],"ability":[187],"forge,":[189],"this":[190],"also":[191,214],"requires":[192],"conditions":[195],"place":[198],"which":[200],"it":[201],"analyse":[205],"provided.":[211],"does":[225],"not":[226],"depend":[227],"number":[230],"rather":[235],"matter":[237],"individual":[240],"abilities":[241],"forgers.":[244]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
