{"id":"https://openalex.org/W4391266962","doi":"https://doi.org/10.1109/ic3i59117.2023.10397788","title":"Biometric Fingerprint Identification for Bank Locker Security System","display_name":"Biometric Fingerprint Identification for Bank Locker Security System","publication_year":2023,"publication_date":"2023-09-14","ids":{"openalex":"https://openalex.org/W4391266962","doi":"https://doi.org/10.1109/ic3i59117.2023.10397788"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i59117.2023.10397788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i59117.2023.10397788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062268714","display_name":"Vishal Goyal","orcid":"https://orcid.org/0000-0001-7560-0607"},"institutions":[{"id":"https://openalex.org/I82571370","display_name":"GLA University","ror":"https://ror.org/05fnxgv12","country_code":"IN","type":"education","lineage":["https://openalex.org/I82571370"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vishal Goyal","raw_affiliation_strings":["GLA University,Electronics &#x0026; Communication Engineering,Mathura,India"],"affiliations":[{"raw_affiliation_string":"GLA University,Electronics &#x0026; Communication Engineering,Mathura,India","institution_ids":["https://openalex.org/I82571370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024855127","display_name":"Hemant Singh Pokhariya","orcid":"https://orcid.org/0000-0003-1356-7682"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hemant Singh Pokhariya","raw_affiliation_strings":["Graphic Era University,Department of Computer Science &#x0026; Engineering,Dehradun,India"],"affiliations":[{"raw_affiliation_string":"Graphic Era University,Department of Computer Science &#x0026; Engineering,Dehradun,India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068017798","display_name":"Shubhi Gupta","orcid":"https://orcid.org/0000-0002-3618-3457"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]},{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE","IN"],"is_corresponding":false,"raw_author_name":"Shubhi Gupta","raw_affiliation_strings":["Amity University,Department of Computer Sciences,Greater Noida,Uttar Pradesh,India","Department of Computer Sciences, Amity University, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Amity University,Department of Computer Sciences,Greater Noida,Uttar Pradesh,India","institution_ids":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]},{"raw_affiliation_string":"Department of Computer Sciences, Amity University, Greater Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111848906","display_name":"N Shalini","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"N Shalini","raw_affiliation_strings":["Institute of Aeronautical Engineering,Dept of Computer Sc. &#x0026; Engg.,Hyderabad,India"],"affiliations":[{"raw_affiliation_string":"Institute of Aeronautical Engineering,Dept of Computer Sc. &#x0026; Engg.,Hyderabad,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083370047","display_name":"Ajay Rana","orcid":"https://orcid.org/0000-0002-1681-3132"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ajay Rana","raw_affiliation_strings":["Amity University,Greater Noida,Uttar Pradesh,India","Amity University, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Amity University,Greater Noida,Uttar Pradesh,India","institution_ids":["https://openalex.org/I191972202"]},{"raw_affiliation_string":"Amity University, Greater Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054079545","display_name":"Rajeev Ranjan","orcid":"https://orcid.org/0000-0002-0048-2885"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajeev Ranjan","raw_affiliation_strings":["Lloyd Institute of Management and Technology,Greater Noida","Lloyd Institute of Management and Technology, Greater Noida"],"affiliations":[{"raw_affiliation_string":"Lloyd Institute of Management and Technology,Greater Noida","institution_ids":[]},{"raw_affiliation_string":"Lloyd Institute of Management and Technology, Greater Noida","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5062268714"],"corresponding_institution_ids":["https://openalex.org/I82571370"],"apc_list":null,"apc_paid":null,"fwci":4.5889,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.95336137,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2638","last_page":"2641"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14174","display_name":"Artificial Intelligence and Decision Support Systems","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14174","display_name":"Artificial Intelligence and Decision Support Systems","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14319","display_name":"Currency Recognition and Detection","score":0.9144999980926514,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.82199627161026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7656905651092529},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6098611354827881},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.4447593092918396},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.426181435585022},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4250754117965698},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4174674451351166},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4128657877445221},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3738856613636017},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34301456809043884},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.330536425113678},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10689252614974976}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.82199627161026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7656905651092529},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6098611354827881},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.4447593092918396},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.426181435585022},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4250754117965698},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4174674451351166},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4128657877445221},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3738856613636017},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34301456809043884},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.330536425113678},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10689252614974976},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i59117.2023.10397788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i59117.2023.10397788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2188414992","https://openalex.org/W2495012962","https://openalex.org/W2534525726","https://openalex.org/W2901028727","https://openalex.org/W2971580705","https://openalex.org/W3018263262","https://openalex.org/W3190963934","https://openalex.org/W3194751858","https://openalex.org/W3194944755","https://openalex.org/W3199800772","https://openalex.org/W4220676958","https://openalex.org/W4281666918","https://openalex.org/W4313367715","https://openalex.org/W4320736940","https://openalex.org/W4383066300","https://openalex.org/W6687162879","https://openalex.org/W6800355502","https://openalex.org/W7065902952"],"related_works":["https://openalex.org/W2953227786","https://openalex.org/W2092708554","https://openalex.org/W2065250680","https://openalex.org/W3044656951","https://openalex.org/W2345270111","https://openalex.org/W2349271268","https://openalex.org/W2336014427","https://openalex.org/W139145738","https://openalex.org/W2592164127","https://openalex.org/W2495229164"],"abstract_inverted_index":{"The":[0,32,55,73,90,107,125,153,198],"implementation":[1],"of":[2,35,52,87,92,115,122,143,229],"the":[3,53,58,70,81,88,95,102,113,119,123,135,140,144,157,202,209,217,230],"security":[4,23,36,59,82,105,148,186,226],"system":[5,24,37,83,97,146,204,218],"for":[6,25,28,57,80,147,166,176],"all":[7,29],"devices":[8,60,231],"is":[9,38,61,77,98,110],"through":[10,118,139,194,208,238],"passive":[11],"communication":[12,93],"technology.":[13],"People":[14,181],"from":[15],"different":[16,19],"origins":[17],"and":[18,49,69,84,94,150,164,169,179,185,227,236],"regions":[20,27],"need":[21],"a":[22,162],"their":[26,30,174,195],"platforms.":[31],"convincing":[33],"type":[34],"that":[39,43],"it":[40,44,213],"makes":[41],"sure":[42],"works":[45],"under":[46,66,130],"proper":[47,67],"guidance":[48],"natural":[50],"care":[51,178,184],"system.":[54,89,211],"leverage":[56],"to":[62,201,219,224],"make":[63],"them":[64],"work":[65,220],"conditions":[68],"defined":[71],"process.":[72],"One-time":[74],"password-based":[75,104],"technology":[76],"also":[78],"used":[79],"other":[85,151],"surveillance":[86,96,109,121,131],"process":[91,114],"wholly":[99],"monitored":[100],"by":[101,112],"one-time":[103,191],"theme.":[106],"major":[108],"done":[111],"superior":[116],"convenience":[117],"successive":[120],"devices.":[124],"metropolitan":[126],"areas":[127],"which":[128,232],"are":[129],"will":[132,159,187,205,214],"be":[133,160,188,206],"having":[134],"same":[136],"banking":[137],"systems":[138],"adhesive":[141],"nature":[142],"locking":[145,203],"purposes":[149],"amenities.":[152],"user":[154],"who":[155],"accesses":[156],"locker":[158],"given":[161],"username":[163],"password":[165,192],"his":[167],"access":[168,193],"then":[170],"they":[171],"have":[172],"imprinted":[173],"fingerprint":[175],"extra":[177,183],"security.":[180],"with":[182,190],"endowed":[189,235],"registered":[196],"mobile.":[197],"mechanized":[199],"introduction":[200],"enhanced":[207],"proposed":[210],"Thus":[212],"help":[215],"making":[216],"on":[221],"its":[222],"way":[223],"maintain":[225],"safety":[228],"has":[233],"been":[234],"developed":[237],"it.":[239]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
