{"id":"https://openalex.org/W2546952536","doi":"https://doi.org/10.1109/icacci.2016.7732344","title":"Physical access control based on biometrics and GSM","display_name":"Physical access control based on biometrics and GSM","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2546952536","doi":"https://doi.org/10.1109/icacci.2016.7732344","mag":"2546952536"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2016.7732344","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2016.7732344","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002489949","display_name":"Diptadeep Addy","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Diptadeep Addy","raw_affiliation_strings":["Department of ECE, St. Thomas' College of Engineering & Technology, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of ECE, St. Thomas' College of Engineering & Technology, Kolkata, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025379207","display_name":"Poulami Bala","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Poulami Bala","raw_affiliation_strings":["Department of ECE, St. Thomas' College of Engineering & Technology, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of ECE, St. Thomas' College of Engineering & Technology, Kolkata, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002489949"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7565,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.72686674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"1995","last_page":"2001"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.748313844203949},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7149750590324402},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.612918496131897},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6025010943412781},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.573593258857727},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5558826327323914},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5010266304016113},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48036059737205505},{"id":"https://openalex.org/keywords/gsm","display_name":"GSM","score":0.4624808728694916},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.4349682033061981},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.4307175874710083},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1567665934562683},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14683985710144043},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.09674042463302612}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.748313844203949},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7149750590324402},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.612918496131897},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6025010943412781},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.573593258857727},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5558826327323914},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5010266304016113},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48036059737205505},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.4624808728694916},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4349682033061981},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.4307175874710083},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1567665934562683},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14683985710144043},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.09674042463302612}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2016.7732344","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2016.7732344","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.75}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2098693229","https://openalex.org/W2168835473","https://openalex.org/W2183507986","https://openalex.org/W2187252171","https://openalex.org/W2188902362","https://openalex.org/W4285719527","https://openalex.org/W6685880319","https://openalex.org/W6686546876","https://openalex.org/W6687285761"],"related_works":["https://openalex.org/W3014822659","https://openalex.org/W2117826006","https://openalex.org/W1621827506","https://openalex.org/W4362496757","https://openalex.org/W2051501574","https://openalex.org/W2124627279","https://openalex.org/W2050967184","https://openalex.org/W2566091814","https://openalex.org/W2114937328","https://openalex.org/W2148654711"],"abstract_inverted_index":{"In":[0],"this":[1],"current":[2],"age":[3],"of":[4,17,53,119,159,167,193],"21st":[5],"century":[6],"security":[7,118,150],"and":[8,36,48,55,65,79,93,107,117,145,164,190,208,223],"privacy":[9,35],"has":[10,155],"become":[11,73],"a":[12,31,147],"major":[13],"challenge":[14],"to":[15,83,123,136,205,218,227],"all":[16,100],"us.":[18],"Whether":[19],"it":[20,214],"is":[21,63,196],"in":[22,76,90],"the":[23,69,91,102,120,160,194],"private":[24,43],"sector":[25],"or":[26],"government":[27],"agencies,":[28],"there":[29],"remains":[30],"constant":[32],"threat":[33],"on":[34,178],"security.":[37,168],"Bank":[38],"accounts":[39],"are":[40,58,97,110,113,134,172,203],"being":[41,45],"hacked,":[42],"information":[44,212,222],"stolen":[46,226],"now":[47],"then,":[49],"lump":[50],"sum":[51],"amounts":[52],"money":[54],"valuable":[56],"documents":[57,109],"changing":[59,64],"hands":[60],"overnight.":[61],"Technology":[62],"evolving":[66],"constantly":[67],"over":[68],"years.":[70],"Hackers":[71],"have":[72,80,128],"more":[74],"ruthless":[75],"their":[77,85],"methods":[78],"been":[81],"successful":[82],"make":[84],"entries":[86],"into":[87],"any":[88,220],"system":[89],"world":[92],"steal":[94],"things.":[95],"There":[96],"many":[98],"vaults":[99],"across":[101],"country":[103],"where":[104,132],"important":[105,114],"valuables":[106],"secret":[108],"kept,":[111],"which":[112,181],"for":[115,174,198],"safety":[116],"nation.":[121],"So":[122],"answer":[124],"these":[125],"concerns":[126],"we":[127,133],"proposed":[129],"an":[130],"idea":[131],"going":[135],"integrate":[137],"some":[138],"biometric":[139,152],"features":[140],"along":[141],"with":[142],"GSM":[143],"communication":[144],"build":[146],"multi":[148],"layered":[149],"system-4-layer":[151],"system.":[153],"Biometrics":[154],"emerged":[156],"as":[157],"one":[158],"most":[161],"convenient,":[162],"accurate,":[163],"cost-effective":[165],"forms":[166],"Since":[169],"Biometric":[170,201],"techniques":[171,195],"automated":[173],"personal":[175,211,221],"recognition":[176],"based":[177],"physical":[179],"attributes":[180],"include":[182],"face,":[183],"fingerprint,":[184],"hand":[185],"geometry,":[186],"handwriting,":[187],"iris,":[188],"retina,":[189],"voice.":[191],"Each":[192],"customized":[197],"specific":[199],"applications.":[200],"data":[202],"considered":[204],"be":[206,216,225],"different":[207],"distinct":[209],"from":[210],"because":[213],"cannot":[215,224],"reverse-engineered":[217],"recreate":[219],"attempt":[228],"theft.":[229]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
