{"id":"https://openalex.org/W2212893750","doi":"https://doi.org/10.1109/iceee.2015.7357994","title":"Embedded biometric cryptosystem based on finger vein patterns","display_name":"Embedded biometric cryptosystem based on finger vein patterns","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2212893750","doi":"https://doi.org/10.1109/iceee.2015.7357994","mag":"2212893750"},"language":"en","primary_location":{"id":"doi:10.1109/iceee.2015.7357994","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceee.2015.7357994","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014940804","display_name":"J. Chavez-Galaviz","orcid":null},"institutions":[{"id":"https://openalex.org/I98461037","display_name":"Tecnol\u00f3gico de Monterrey","ror":"https://ror.org/03ayjn504","country_code":"MX","type":"education","lineage":["https://openalex.org/I98461037"]}],"countries":["MX"],"is_corresponding":true,"raw_author_name":"J. Chavez-Galaviz","raw_affiliation_strings":["Tecnologico de Monterrey Campus Guadalajara, Jalisco Mexico"],"affiliations":[{"raw_affiliation_string":"Tecnologico de Monterrey Campus Guadalajara, Jalisco Mexico","institution_ids":["https://openalex.org/I98461037"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049647702","display_name":"J. Ruiz-Rojas","orcid":null},"institutions":[{"id":"https://openalex.org/I98461037","display_name":"Tecnol\u00f3gico de Monterrey","ror":"https://ror.org/03ayjn504","country_code":"MX","type":"education","lineage":["https://openalex.org/I98461037"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"J. Ruiz-Rojas","raw_affiliation_strings":["Tecnologico de Monterrey Campus Guadalajara, Jalisco Mexico"],"affiliations":[{"raw_affiliation_string":"Tecnologico de Monterrey Campus Guadalajara, Jalisco Mexico","institution_ids":["https://openalex.org/I98461037"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100668758","display_name":"Alejandro Garc\u00eda","orcid":"https://orcid.org/0000-0002-7250-4641"},"institutions":[{"id":"https://openalex.org/I98461037","display_name":"Tecnol\u00f3gico de Monterrey","ror":"https://ror.org/03ayjn504","country_code":"MX","type":"education","lineage":["https://openalex.org/I98461037"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"A. Garcia-Gonzalez","raw_affiliation_strings":["Tecnologico de Monterrey Campus Guadalajara, Jalisco Mexico"],"affiliations":[{"raw_affiliation_string":"Tecnologico de Monterrey Campus Guadalajara, Jalisco Mexico","institution_ids":["https://openalex.org/I98461037"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049097982","display_name":"RQ. Fuentes-Aguilar","orcid":null},"institutions":[{"id":"https://openalex.org/I98461037","display_name":"Tecnol\u00f3gico de Monterrey","ror":"https://ror.org/03ayjn504","country_code":"MX","type":"education","lineage":["https://openalex.org/I98461037"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"RQ. Fuentes-Aguilar","raw_affiliation_strings":["Tecnologico de Monterrey Campus Guadalajara, Jalisco Mexico"],"affiliations":[{"raw_affiliation_string":"Tecnologico de Monterrey Campus Guadalajara, Jalisco Mexico","institution_ids":["https://openalex.org/I98461037"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014940804"],"corresponding_institution_ids":["https://openalex.org/I98461037"],"apc_list":null,"apc_paid":null,"fwci":0.8616,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.74900886,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"11","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9498999714851379,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8008710145950317},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7451531887054443},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6739991307258606},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5442999601364136},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.531758189201355},{"id":"https://openalex.org/keywords/software-portability","display_name":"Software portability","score":0.49560773372650146},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.444698303937912},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.44190821051597595},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3845261335372925},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3717747926712036},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3611055612564087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32408392429351807},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07532081007957458}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8008710145950317},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7451531887054443},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6739991307258606},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5442999601364136},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.531758189201355},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.49560773372650146},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.444698303937912},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.44190821051597595},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3845261335372925},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3717747926712036},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3611055612564087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32408392429351807},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07532081007957458}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iceee.2015.7357994","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceee.2015.7357994","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1124694998","https://openalex.org/W1583531214","https://openalex.org/W1775358224","https://openalex.org/W1967060501","https://openalex.org/W1977815744","https://openalex.org/W2004617923","https://openalex.org/W2010986580","https://openalex.org/W2029499237","https://openalex.org/W2036194492","https://openalex.org/W2059502120","https://openalex.org/W2089551549","https://openalex.org/W2114024372","https://openalex.org/W2125188192","https://openalex.org/W2129905915","https://openalex.org/W2133059825","https://openalex.org/W2138584058","https://openalex.org/W2158008371","https://openalex.org/W2168892181","https://openalex.org/W2316482457","https://openalex.org/W2500986216","https://openalex.org/W6634726120","https://openalex.org/W6665386687","https://openalex.org/W6680096826","https://openalex.org/W6699342439","https://openalex.org/W6724342964"],"related_works":["https://openalex.org/W107105315","https://openalex.org/W1584537303","https://openalex.org/W1872724644","https://openalex.org/W2750549761","https://openalex.org/W4388155270","https://openalex.org/W28826848","https://openalex.org/W2122272819","https://openalex.org/W4367156293","https://openalex.org/W2130894091","https://openalex.org/W2123843216"],"abstract_inverted_index":{"Cryptosystems":[0],"based":[1],"on":[2,132],"biometrics":[3],"authentication":[4,32,88,155],"is":[5,47,72,89,100,117],"a":[6,76],"developing":[7],"area":[8],"in":[9],"the":[10,21,40,54,57,62,65,68,81,87,106,109,133,143,154],"field":[11],"of":[12,23,39,56,64,93,108,114,151],"modern":[13],"security":[14],"systems.":[15],"The":[16,37,146],"present":[17],"paper":[18],"deals":[19],"with":[20],"application":[22],"finger":[24],"veins":[25],"pattern":[26],"as":[27],"an":[28,51,112,138,149],"approach":[29],"for":[30,53,153],"user":[31,82],"and":[33,61,127,141],"encryption":[34,116,129],"key":[35,78,125],"generation.":[36],"design":[38],"optical":[41],"capture":[42],"system":[43],"by":[44],"near":[45],"infrared":[46],"described.":[48],"We":[49],"propose":[50],"algorithm":[52],"location":[55],"vein":[58],"intersection":[59],"points":[60],"quantification":[63],"angles":[66],"between":[67],"vein-branches,":[69],"this":[70],"information":[71,85],"used":[73],"to":[74,83,104],"generate":[75],"personal":[77],"that":[79],"allows":[80],"encrypt":[84],"after":[86,96],"approved.":[90],"A":[91],"testing":[92],"identity":[94],"verification,":[95],"subject":[97],"enrollment":[98],"process":[99],"presented.":[101],"In":[102],"order":[103],"demonstrate":[105],"potential":[107],"proposed":[110],"approach,":[111],"example":[113],"image":[115,123,128],"developed.":[118],"All":[119],"processes:":[120],"biometric":[121],"capture,":[122],"preprocessing,":[124],"generation":[126],"are":[130],"performed":[131],"same":[134],"embedded":[135],"platform":[136],"adding":[137],"important":[139],"portability":[140],"diminishing":[142],"execution":[144],"time.":[145],"results":[147],"show":[148],"accuracy":[150],"96.1%":[152],"system.":[156]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
