{"id":"https://openalex.org/W4231408676","doi":"https://doi.org/10.1109/icitst.2013.6750224","title":"Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange","display_name":"Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W4231408676","doi":"https://doi.org/10.1109/icitst.2013.6750224"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2013.6750224","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750224","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110817295","display_name":"Hisham Al-Assam","orcid":null},"institutions":[{"id":"https://openalex.org/I92864154","display_name":"University of Buckingham","ror":"https://ror.org/03kd28f18","country_code":"GB","type":"education","lineage":["https://openalex.org/I92864154"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Hisham Al-Assam","raw_affiliation_strings":["Department of Applied Computing, University of Buckingham, Buckingham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Applied Computing, University of Buckingham, Buckingham, United Kingdom","institution_ids":["https://openalex.org/I92864154"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031166616","display_name":"Rasber Dh. Rashid","orcid":"https://orcid.org/0000-0002-5531-087X"},"institutions":[{"id":"https://openalex.org/I92864154","display_name":"University of Buckingham","ror":"https://ror.org/03kd28f18","country_code":"GB","type":"education","lineage":["https://openalex.org/I92864154"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rasber Rashid","raw_affiliation_strings":["Department of Applied Computing, University of Buckingham, Buckingham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Applied Computing, University of Buckingham, Buckingham, United Kingdom","institution_ids":["https://openalex.org/I92864154"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108472555","display_name":"Sabah Jassim","orcid":"https://orcid.org/0000-0002-3007-871X"},"institutions":[{"id":"https://openalex.org/I92864154","display_name":"University of Buckingham","ror":"https://ror.org/03kd28f18","country_code":"GB","type":"education","lineage":["https://openalex.org/I92864154"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sabah Jassim","raw_affiliation_strings":["Department of Applied Computing, University of Buckingham, Buckingham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Applied Computing, University of Buckingham, Buckingham, United Kingdom","institution_ids":["https://openalex.org/I92864154"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110817295"],"corresponding_institution_ids":["https://openalex.org/I92864154"],"apc_list":null,"apc_paid":null,"fwci":0.88672943,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.78523566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"369","last_page":"374"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7981826066970825},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7691872119903564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6570832133293152},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5598621368408203},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5515117049217224},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5418844819068909},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.49779248237609863},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4758707880973816},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38271015882492065},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19622835516929626},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.132235586643219}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7981826066970825},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7691872119903564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6570832133293152},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5598621368408203},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5515117049217224},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5418844819068909},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.49779248237609863},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4758707880973816},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38271015882492065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19622835516929626},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.132235586643219}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2013.6750224","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750224","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W320258471","https://openalex.org/W1527836117","https://openalex.org/W1769662020","https://openalex.org/W2001103715","https://openalex.org/W2027022089","https://openalex.org/W2032551902","https://openalex.org/W2041942569","https://openalex.org/W2042702225","https://openalex.org/W2057315937","https://openalex.org/W2058361065","https://openalex.org/W2069448730","https://openalex.org/W2103560185","https://openalex.org/W2143366165","https://openalex.org/W2149407554","https://openalex.org/W2165831888","https://openalex.org/W2318546271","https://openalex.org/W6699746588"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W2076845124","https://openalex.org/W3104966193","https://openalex.org/W3046827176","https://openalex.org/W4315694784"],"abstract_inverted_index":{"Although":[0],"biometric":[1,42,58,71,92,124,153],"authentication":[2,11,24,39,100],"is":[3],"perceived":[4],"to":[5,16,22,40,53,61,95,137],"be":[6,172],"more":[7],"reliable":[8],"than":[9],"traditional":[10],"schemes,":[12],"it":[13,20,170],"becomes":[14],"vulnerable":[15],"several":[17],"attacks":[18,140],"when":[19],"comes":[21],"remote":[23,38,80,98],"over":[25],"open":[26],"networks.":[27],"Steganography":[28],"based":[29,150],"techniques":[30],"have":[31],"been":[32],"used":[33],"in":[34],"the":[35,48,55,116,155,164],"context":[36],"of":[37,57,65,118,157],"hide":[41],"feature":[43],"vectors.":[44],"Biometric":[45],"cryptosystems,":[46],"on":[47,130,151],"other":[49,79],"hand,":[50],"are":[51,73],"proposed":[52,165],"enhance":[54],"security":[56,168],"systems":[59],"and":[60,78,122,128,134,141,147,175],"create":[62],"revocable":[63],"representations":[64],"individuals.":[66],"However,":[67],"neither":[68],"steganography":[69,90],"nor":[70],"cryptosystems":[72,93],"immune":[74],"against":[75],"replay":[76,139],"attack":[77],"attacks.":[81],"This":[82],"paper":[83],"proposes":[84],"a":[85,131],"novel":[86],"approach":[87],"that":[88,109,163],"combines":[89],"with":[91],"effectively":[94],"establish":[96],"robust":[97],"mutual":[99,132],"between":[101],"two":[102],"parties":[103],"as":[104,106],"well":[105],"key":[107,125],"exchange":[108],"facilitates":[110],"one-time":[111,135],"stego-keys.":[112],"The":[113],"proposal":[114],"involves":[115],"use":[117],"random":[119],"orthonormal":[120],"projection":[121],"multifactor":[123],"binding":[126],"techniques,":[127],"relies":[129],"challenge/response":[133],"stego-keys":[136],"prevent":[138],"provide":[142],"non-repudiation":[143],"feature.":[144],"Implementation":[145],"details":[146],"simulation":[148],"results":[149],"face":[152],"show":[154],"viability":[156],"our":[158],"proposal.":[159],"Furthermore,":[160],"we":[161],"argue":[162],"scheme":[166],"enhances":[167],"while":[169],"can":[171],"both":[173],"user-friendly":[174],"cost-effective.":[176]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
