{"id":"https://openalex.org/W3110599738","doi":"https://doi.org/10.1109/icspcc50002.2020.9259519","title":"Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud","display_name":"Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud","publication_year":2020,"publication_date":"2020-08-21","ids":{"openalex":"https://openalex.org/W3110599738","doi":"https://doi.org/10.1109/icspcc50002.2020.9259519","mag":"3110599738"},"language":"en","primary_location":{"id":"doi:10.1109/icspcc50002.2020.9259519","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspcc50002.2020.9259519","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046988714","display_name":"Mustafa A. Al Sibahee","orcid":"https://orcid.org/0000-0002-3943-8101"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I4210123264","display_name":"Iraq University College","ror":"https://ror.org/021817660","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210123264"]}],"countries":["CN","IQ"],"is_corresponding":true,"raw_author_name":"Mustafa A. Al Sibahee","raw_affiliation_strings":["Iraq University College, Basrah, Iraq","Shenzhen Institute of Huazhong University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Iraq University College, Basrah, Iraq","institution_ids":["https://openalex.org/I4210123264"]},{"raw_affiliation_string":"Shenzhen Institute of Huazhong University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048196007","display_name":"Songfeng Lu","orcid":"https://orcid.org/0000-0003-4489-2488"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songfeng Lu","raw_affiliation_strings":["Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Shenzhen Institute of Huazhong University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Shenzhen Institute of Huazhong University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055300515","display_name":"Zaid Ameen Abduljabbar","orcid":"https://orcid.org/0000-0002-8239-1409"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210134419","display_name":"Neusoft (China)","ror":"https://ror.org/02zc84r97","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210134419"]}],"countries":["CN","IQ"],"is_corresponding":false,"raw_author_name":"Zaid Ameen Abduljabbar","raw_affiliation_strings":["Al-Kinoouze University College, Basrah, Iraq","Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Neusoft Institute Guangdong, Guangdong, China","University of Basrah, Basrah, Iraq"],"affiliations":[{"raw_affiliation_string":"Al-Kinoouze University College, Basrah, Iraq","institution_ids":[]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Neusoft Institute Guangdong, Guangdong, China","institution_ids":["https://openalex.org/I4210134419"]},{"raw_affiliation_string":"University of Basrah, Basrah, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000781225","display_name":"Erasmus Xin Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134419","display_name":"Neusoft (China)","ror":"https://ror.org/02zc84r97","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210134419"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Erasmus Xin Liu","raw_affiliation_strings":["Neusoft Institute Guangdong, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Neusoft Institute Guangdong, Guangdong, China","institution_ids":["https://openalex.org/I4210134419"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053208810","display_name":"Yanli Ran","orcid":"https://orcid.org/0000-0003-1862-3268"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanli Ran","raw_affiliation_strings":["Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085919860","display_name":"Ahmed Abdulelah Jasim Al-ashoor","orcid":null},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Ahmed Abdulelah Jasim Al-ashoor","raw_affiliation_strings":["University of Basrah, Basrah, Iraq"],"affiliations":[{"raw_affiliation_string":"University of Basrah, Basrah, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014679193","display_name":"Mohammed Abdulridha Hussain","orcid":"https://orcid.org/0000-0001-5846-6143"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]},{"id":"https://openalex.org/I4210134419","display_name":"Neusoft (China)","ror":"https://ror.org/02zc84r97","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210134419"]}],"countries":["CN","IQ"],"is_corresponding":false,"raw_author_name":"Mohammed Abdulridha Hussain","raw_affiliation_strings":["Al-Kinoouze University College, Basrah, Iraq","Neusoft Institute Guangdong, Guangdong, China","University of Basrah, Basrah, Iraq"],"affiliations":[{"raw_affiliation_string":"Al-Kinoouze University College, Basrah, Iraq","institution_ids":[]},{"raw_affiliation_string":"Neusoft Institute Guangdong, Guangdong, China","institution_ids":["https://openalex.org/I4210134419"]},{"raw_affiliation_string":"University of Basrah, Basrah, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083247107","display_name":"Zaid Alaa Hussien","orcid":"https://orcid.org/0000-0002-4852-9785"},"institutions":[{"id":"https://openalex.org/I4210134419","display_name":"Neusoft (China)","ror":"https://ror.org/02zc84r97","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210134419"]},{"id":"https://openalex.org/I4210145266","display_name":"Southern Technical University","ror":"https://ror.org/03sax3264","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210145266"]}],"countries":["CN","IQ"],"is_corresponding":false,"raw_author_name":"Zaid Alaa Hussien","raw_affiliation_strings":["Neusoft Institute Guangdong, Guangdong, China","Southern Technical University, Basrah, Iraq"],"affiliations":[{"raw_affiliation_string":"Neusoft Institute Guangdong, Guangdong, China","institution_ids":["https://openalex.org/I4210134419"]},{"raw_affiliation_string":"Southern Technical University, Basrah, Iraq","institution_ids":["https://openalex.org/I4210145266"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5046988714"],"corresponding_institution_ids":["https://openalex.org/I158809036","https://openalex.org/I4210123264","https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.6839,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.7262721,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8133713006973267},{"id":"https://openalex.org/keywords/hash-based-message-authentication-code","display_name":"Hash-based message authentication code","score":0.5809407234191895},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5455167293548584},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.5396227240562439},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5081839561462402},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4948863387107849},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4304138720035553},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4294929504394531},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4127148389816284},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.33859485387802124},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.25250354409217834}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8133713006973267},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.5809407234191895},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5455167293548584},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.5396227240562439},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5081839561462402},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4948863387107849},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4304138720035553},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4294929504394531},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4127148389816284},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.33859485387802124},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25250354409217834},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icspcc50002.2020.9259519","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspcc50002.2020.9259519","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1660992078","https://openalex.org/W2008383026","https://openalex.org/W2092887161","https://openalex.org/W2099373758","https://openalex.org/W2099830559","https://openalex.org/W2104237724","https://openalex.org/W2131991463","https://openalex.org/W2164736805","https://openalex.org/W2559094099","https://openalex.org/W2587303381","https://openalex.org/W3012254913","https://openalex.org/W3151434649","https://openalex.org/W6683860943","https://openalex.org/W6733158061"],"related_works":["https://openalex.org/W2062056589","https://openalex.org/W3210438939","https://openalex.org/W3088876353","https://openalex.org/W2771872416","https://openalex.org/W1511774205","https://openalex.org/W2280933377","https://openalex.org/W2610693083","https://openalex.org/W2155394186","https://openalex.org/W2479697047","https://openalex.org/W2116285675"],"abstract_inverted_index":{"Document":[0],"integrity":[1,23,35,89,152],"and":[2,34,133,163,192,196,200],"origin":[3],"for":[4,92,153,169],"E2E":[5,52],"S2S":[6,53],"in":[7,18,46],"IoTcloud":[8],"have":[9,37],"recently":[10],"received":[11],"considerable":[12],"attention":[13,143],"because":[14],"of":[15,49,57,90,144,175,202],"their":[16],"importance":[17],"the":[19,47,58,88,142,147,150,198,203],"real-world":[20],"fields.":[21],"Maintaining":[22],"could":[24],"protect":[25,43,87],"decisions":[26],"made":[27],"based":[28,111],"on":[29,112],"these":[30],"message/image":[31,166],"documents.":[32],"Authentication":[33],"solutions":[36],"been":[38],"conducted":[39],"to":[40,62,70,76,86,114,180,184],"recognise":[41],"or":[42,74],"any":[44],"modification":[45],"exchange":[48],"documents":[50,91],"between":[51],"(smart-to-smart).":[54],"However,":[55],"none":[56],"proposed":[59,122,204],"schemes":[60],"appear":[61],"be":[63],"sufficiently":[64],"designed":[65],"as":[66],"a":[67,81,103,134,154,164,186],"secure":[68],"scheme":[69,83,123,148],"prevent":[71],"known":[72],"attacks":[73],"applicable":[75],"smart":[77],"devices.":[78],"We":[79],"propose":[80],"robust":[82,130],"that":[84,138],"aims":[85],"each":[93,170],"users":[94,126,155,171],"session":[95],"by":[96],"integrating":[97],"HMAC-SHA-256,":[98],"handwritten":[99],"feature":[100],"extraction":[101],"using":[102,119],"local":[104],"binary":[105],"pattern,":[106],"one-time":[107,128,165],"random":[108],"pixel":[109],"sequence":[110],"RC4":[113],"randomly":[115],"hide":[116],"authentication":[117,136],"codes":[118],"LSB.":[120],"The":[121,173],"can":[124],"provide":[125,181],"with":[127],"bio-key,":[129],"message":[131],"anonymity":[132],"disappearing":[135],"code":[137,168],"does":[139],"not":[140],"draw":[141],"eavesdroppers.":[145],"Thus,":[146],"improves":[149],"data":[151],"messages/image":[156],"documents,":[157],"phase":[158],"key":[159],"agreement,":[160],"bio-key":[161],"management":[162],"document":[167],"session.":[172],"concept":[174],"stego-anonymity":[176],"is":[177],"also":[178],"introduced":[179],"additional":[182],"security":[183,190],"cover":[185],"hashed":[187],"value.":[188],"Finally,":[189],"analysis":[191],"experimental":[193],"results":[194],"demonstrate":[195],"prove":[197],"invulnerability":[199],"efficiency":[201],"scheme.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
