{"id":"https://openalex.org/W2417800757","doi":"https://doi.org/10.1109/dictap.2016.7544006","title":"SUIS: An online graphical Signature-Based User Identification System","display_name":"SUIS: An online graphical Signature-Based User Identification System","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2417800757","doi":"https://doi.org/10.1109/dictap.2016.7544006","mag":"2417800757"},"language":"en","primary_location":{"id":"doi:10.1109/dictap.2016.7544006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dictap.2016.7544006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068304082","display_name":"Shahid Alam","orcid":"https://orcid.org/0000-0002-4080-8042"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Shahid Alam","raw_affiliation_strings":["Department of Computer Science and Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5068304082"],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":null,"apc_paid":null,"fwci":0.6635,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.78200845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"7","issue":null,"first_page":"85","last_page":"89"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9704999923706055,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7764155864715576},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5939294695854187},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5776484608650208},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.5544084906578064},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.5520926117897034},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5382065773010254},{"id":"https://openalex.org/keywords/graphical-user-interface","display_name":"Graphical user interface","score":0.5197610259056091},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.44034868478775024},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.41718870401382446},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3434399962425232},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3397698700428009},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23561644554138184},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2083325982093811},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16254523396492004}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7764155864715576},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5939294695854187},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5776484608650208},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.5544084906578064},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.5520926117897034},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5382065773010254},{"id":"https://openalex.org/C37789001","wikidata":"https://www.wikidata.org/wiki/Q782543","display_name":"Graphical user interface","level":2,"score":0.5197610259056091},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.44034868478775024},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.41718870401382446},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3434399962425232},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3397698700428009},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23561644554138184},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2083325982093811},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16254523396492004},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dictap.2016.7544006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dictap.2016.7544006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W32836389","https://openalex.org/W1485033854","https://openalex.org/W2012187692","https://openalex.org/W2030112111","https://openalex.org/W2074551623","https://openalex.org/W2082198354","https://openalex.org/W2112767991","https://openalex.org/W2115218409","https://openalex.org/W2122044789","https://openalex.org/W2123144012","https://openalex.org/W2126453598","https://openalex.org/W2139342405","https://openalex.org/W2140129380","https://openalex.org/W2159335031","https://openalex.org/W2161032904","https://openalex.org/W4244109911","https://openalex.org/W6601360848","https://openalex.org/W6683498256"],"related_works":["https://openalex.org/W2982321410","https://openalex.org/W2392004567","https://openalex.org/W143386018","https://openalex.org/W2940029036","https://openalex.org/W4388292429","https://openalex.org/W2146270836","https://openalex.org/W2187233292","https://openalex.org/W3197290876","https://openalex.org/W2104321465","https://openalex.org/W4250384982"],"abstract_inverted_index":{"Humans":[0],"possess":[1],"a":[2,75,78,91,104,126,143,217,253,265,268],"large":[3,269],"amount":[4],"of,":[5],"and":[6,32,36,69,77,114,128,172,194,231,240,261],"almost":[7],"limitless,":[8],"visual":[9],"memory,":[10],"that":[11,108,134,173],"assists":[12],"them":[13],"to":[14,34,55,83,111,158,215,223,234,242,258,273],"remember":[15],"pictures":[16],"far":[17],"better":[18],"than":[19,48,85],"words.":[20],"This":[21,88],"phenomenon":[22],"has":[23,157],"recently":[24],"motivated":[25],"the":[26,59,64,116,149,154,160,165,170,174,185,191,196,199,203,206,229,236,275],"computer":[27],"security":[28],"researchers'":[29],"in":[30,142,148,256],"academia":[31],"industry":[33],"design":[35],"develop":[37],"graphical":[38,79,93],"user":[39,119],"identification":[40],"systems":[41,133],"(GUISs).":[42],"Cognometric":[43],"GUISs":[44,62],"are":[45,251],"more":[46,53],"memorable":[47],"drawmetric":[49,70,129],"GUISs,":[50],"but":[51,220],"takes":[52],"time":[54],"authenticate.":[56],"None":[57],"of":[58,66,169,187,198,205,228,271,277],"previously":[60],"proposed":[61],"combines":[63],"advantages":[65],"both":[67,125],"cognometric":[68,127],"systems.":[71,248],"A":[72],"signature":[73,80,117,152,155,166],"personify":[74],"person":[76],"is":[81,101,109,122,176],"easier":[82],"recall":[84],"other":[86,132],"drawings.":[87],"paper":[89],"proposes":[90],"new":[92],"Signature-based":[94],"User":[95],"Identification":[96],"System":[97],"named":[98],"SUIS.":[99,278],"It":[100],"based":[102,178],"on":[103,179],"2D":[105,136],"grid":[106,144,162,188,200],"technology,":[107],"used":[110,233,244],"draw,":[112],"digitize":[113],"store":[115],"for":[118,151,245],"identification.":[120],"SUIS":[121,260],"categorized":[123],"as":[124,145,164],"system.":[130],"Unlike":[131],"use":[135],"grid:":[137],"We":[138],"take":[139],"one":[140,146],"cell":[141,201],"pixel":[147],"drawing;":[150],"matching,":[153],"drawn":[156],"follow":[159],"same":[161],"cells":[163,189],"stored,":[167],"independent":[168],"sequence;":[171],"system":[175],"not":[177],"any":[180],"machine":[181],"learning":[182],"model.":[183],"Increasing":[184],"number":[186,270],"increases":[190,202],"password":[192,218],"space,":[193],"decreasing":[195],"size":[197],"precision":[204],"signature.":[207,237],"These":[208],"characteristics":[209],"makes":[210],"SUIS:":[211],"(1)":[212],"Rigorous":[213],"enough":[214,222],"be":[216,224,243],"system,":[219],"easy":[221],"usable.":[225],"(2)":[226],"Independent":[227],"language":[230],"device":[232],"draw":[235],"(3)":[238],"Efficient":[239],"practical":[241],"online":[246],"authentication":[247],"Currently":[249],"we":[250],"developing":[252],"prototype":[254],"tool":[255],"Java":[257],"implement":[259],"will":[262],"carry":[263],"out":[264],"study":[266],"with":[267],"participants":[272],"evaluate":[274],"validity":[276]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
