{"id":"https://openalex.org/W2145508232","doi":"https://doi.org/10.1109/glocom.2009.5425487","title":"Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security","display_name":"Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2145508232","doi":"https://doi.org/10.1109/glocom.2009.5425487","mag":"2145508232"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2009.5425487","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2009.5425487","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062702834","display_name":"Jinyang Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinyang Shi","raw_affiliation_strings":["Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory of Information Science & Technology, Tsinghua University, Beijing, China","Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory of Information Science & Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, P. R. China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101720092","display_name":"Kwok\u2010Yan Lam","orcid":"https://orcid.org/0000-0001-7479-7970"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kwok-yan Lam","raw_affiliation_strings":["Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory of Information Science & Technology, Tsinghua University, Beijing, China","Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory of Information Science & Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, P. R. China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100846520","display_name":"Ming Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Gu","raw_affiliation_strings":["Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory of Information Science & Technology, Tsinghua University, Beijing, China","Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory of Information Science & Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, P. R. China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101763885","display_name":"Husheng Li","orcid":"https://orcid.org/0000-0001-8113-6062"},"institutions":[{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Husheng Li","raw_affiliation_strings":["Department of EECS, University of Tennessee, Knoxville, TN, USA","Department of EECS, The University of Tennessee, Knoxville, TN#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of EECS, University of Tennessee, Knoxville, TN, USA","institution_ids":["https://openalex.org/I75027704"]},{"raw_affiliation_string":"Department of EECS, The University of Tennessee, Knoxville, TN#TAB#","institution_ids":["https://openalex.org/I75027704"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062702834"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.3571,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6035809,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6819","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7454769015312195},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7401169538497925},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6013756990432739},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5866585969924927},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5347344875335693},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4691903591156006},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4411817789077759},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.44007256627082825},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4238455295562744},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3485340476036072},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.258289635181427},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22887003421783447},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15273693203926086}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7454769015312195},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7401169538497925},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6013756990432739},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5866585969924927},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5347344875335693},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4691903591156006},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4411817789077759},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.44007256627082825},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4238455295562744},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3485340476036072},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.258289635181427},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22887003421783447},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15273693203926086},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/glocom.2009.5425487","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2009.5425487","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.187.4474","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.4474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ece.utk.edu/%7Ehusheng/index_files/globecom_Tsinghua.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W50843307","https://openalex.org/W210666191","https://openalex.org/W383543526","https://openalex.org/W1547249794","https://openalex.org/W1605874791","https://openalex.org/W1981487090","https://openalex.org/W2063355793","https://openalex.org/W2106137793","https://openalex.org/W2108610665","https://openalex.org/W2117141284","https://openalex.org/W2118498934","https://openalex.org/W2125672670","https://openalex.org/W2138474025","https://openalex.org/W2141420453","https://openalex.org/W2375155864","https://openalex.org/W4255109769","https://openalex.org/W4285719527","https://openalex.org/W6602048807","https://openalex.org/W6629700272","https://openalex.org/W6645614418"],"related_works":["https://openalex.org/W3034924094","https://openalex.org/W3094954546","https://openalex.org/W1488708774","https://openalex.org/W1982811510","https://openalex.org/W4391100477","https://openalex.org/W2402189625","https://openalex.org/W4200422973","https://openalex.org/W4233349824","https://openalex.org/W2103519941","https://openalex.org/W4398163911"],"abstract_inverted_index":{"The":[0,62],"emerging":[1],"biometric":[2,59,71],"cryptography":[3],"has":[4],"gained":[5],"significant":[6],"interests":[7],"for":[8,22,58,101,157,190],"key":[9],"management":[10],"and":[11,140,162,183],"privacy":[12],"protection,":[13],"but":[14],"the":[15,36,69,106,116,150,158,170],"previously":[16],"proposed":[17,57,63,171],"schemes":[18,172],"using":[19,136,143],"set":[20,60,72,137,144],"metrics":[21],"fingerprints":[23],"may":[24],"either":[25],"be":[26],"too":[27],"weak":[28],"to":[29,67,80],"offer":[30],"enough":[31,154],"security":[32,160,192],"or":[33],"suffer":[34],"from":[35],"performance":[37,178],"limitations.":[38],"In":[39,93],"this":[40,94],"paper,":[41],"a":[42,74],"new":[43,117,151],"fuzzy":[44],"cryptographic":[45],"technique":[46,64],"without":[47],"use":[48],"of":[49,91],"chaff":[50],"data,":[51],"Randomized":[52],"Dissolvent":[53],"Template":[54],"(RDT),":[55],"is":[56,65,99,123],"modalities.":[61],"designed":[66],"dissolve":[68],"enrolled":[70],"into":[73],"random":[75,119],"secret":[76],"resource,":[77],"so":[78,121],"as":[79],"construct":[81],"robust":[82],"secured":[83,111],"templates":[84,112],"by":[85,110],"exploiting":[86],"at":[87],"least":[88],"two":[89,128],"resources":[90],"randomness.":[92],"way,":[95],"when":[96],"one":[97],"fingerprint":[98,166],"used":[100],"multiple":[102],"applications,":[103],"each":[104],"time":[105],"additional":[107],"information":[108],"leakage":[109],"will":[113],"not":[114],"exceed":[115],"introduced":[118],"information,":[120],"RDT":[122],"reusable.":[124],"We":[125],"thus":[126,186],"provide":[127],"novel":[129],"RDT-based":[130],"constructions":[131,152],"in":[132],"practice:":[133],"Fuzzy":[134,141,181,184],"Reconciler":[135],"difference":[138],"threshold":[139],"Dissolver":[142],"intersection":[145],"threshold.":[146],"Security":[147],"analysis":[148],"proves":[149],"have":[153],"computational":[155],"complexity":[156],"required":[159],"properties,":[161],"implementations":[163],"on":[164],"FVC2002DB":[165],"database":[167],"show":[168],"that":[169],"can":[173],"bring":[174],"about":[175],"better":[176],"accuracy":[177],"over":[179],"current":[180],"Vault":[182],"Extractor,":[185],"are":[187],"more":[188],"promising":[189],"biometric-based":[191],"applications.":[193]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
