{"id":"https://openalex.org/W4416962863","doi":"https://doi.org/10.1109/icumt67815.2025.11268571","title":"Biometric Signature Recovery under Rotational Attacks Using Embedded Watermarks","display_name":"Biometric Signature Recovery under Rotational Attacks Using Embedded Watermarks","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4416962863","doi":"https://doi.org/10.1109/icumt67815.2025.11268571"},"language":null,"primary_location":{"id":"doi:10.1109/icumt67815.2025.11268571","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt67815.2025.11268571","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120681622","display_name":"Ruben Copado-Torreblanca","orcid":null},"institutions":[{"id":"https://openalex.org/I170486558","display_name":"Pompeu Fabra University","ror":"https://ror.org/04n0g0b29","country_code":"ES","type":"education","lineage":["https://openalex.org/I170486558"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Ruben Copado-Torreblanca","raw_affiliation_strings":["Tecnocampus, Universitat Pompeu Fabra Matar&#x00F3;,Engineering Department,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"Tecnocampus, Universitat Pompeu Fabra Matar&#x00F3;,Engineering Department,Barcelona,Spain","institution_ids":["https://openalex.org/I170486558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056214167","display_name":"Marcos Fa\u00fandez-Zanuy","orcid":"https://orcid.org/0000-0003-0605-1282"},"institutions":[{"id":"https://openalex.org/I170486558","display_name":"Pompeu Fabra University","ror":"https://ror.org/04n0g0b29","country_code":"ES","type":"education","lineage":["https://openalex.org/I170486558"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Marcos Faundez-Zanuy","raw_affiliation_strings":["Tecnocampus, Universitat Pompeu Fabra Matar&#x00F3;,Engineering Department,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"Tecnocampus, Universitat Pompeu Fabra Matar&#x00F3;,Engineering Department,Barcelona,Spain","institution_ids":["https://openalex.org/I170486558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5120681622"],"corresponding_institution_ids":["https://openalex.org/I170486558"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41783367,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"306","last_page":"310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.5232999920845032,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.5232999920845032,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.32760000228881836,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.04190000146627426,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7886999845504761},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7760000228881836},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6996999979019165},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6510000228881836},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5490000247955322},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5005000233650208},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4674000144004822},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.4399000108242035},{"id":"https://openalex.org/keywords/orientation","display_name":"Orientation (vector space)","score":0.4025000035762787}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7886999845504761},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7760000228881836},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7421000003814697},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6996999979019165},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6510000228881836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5685999989509583},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5582000017166138},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5490000247955322},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5005000233650208},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4674000144004822},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.4399000108242035},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4275999963283539},{"id":"https://openalex.org/C16345878","wikidata":"https://www.wikidata.org/wiki/Q107472979","display_name":"Orientation (vector space)","level":2,"score":0.4025000035762787},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.40230000019073486},{"id":"https://openalex.org/C74370796","wikidata":"https://www.wikidata.org/wiki/Q15924863","display_name":"Signature recognition","level":3,"score":0.391400009393692},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.3837999999523163},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36629998683929443},{"id":"https://openalex.org/C74050887","wikidata":"https://www.wikidata.org/wiki/Q848368","display_name":"Rotation (mathematics)","level":2,"score":0.31290000677108765},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.27000001072883606},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.26919999718666077},{"id":"https://openalex.org/C112356035","wikidata":"https://www.wikidata.org/wiki/Q1672722","display_name":"Iris recognition","level":3,"score":0.2689000070095062},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.26499998569488525},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2563999891281128},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2556999921798706},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.2547999918460846}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icumt67815.2025.11268571","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt67815.2025.11268571","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1586405805","https://openalex.org/W1964932721","https://openalex.org/W2053438338","https://openalex.org/W2061828128","https://openalex.org/W2127331101","https://openalex.org/W2165370616","https://openalex.org/W4387195799","https://openalex.org/W4405506919","https://openalex.org/W4408447654"],"related_works":[],"abstract_inverted_index":{"The":[0],"robustness":[1],"of":[2,54,97,109,159],"biometric":[3,64,114,163],"signature":[4,82],"recognition":[5,34],"systems":[6,18,164],"is":[7,88],"critical":[8],"to":[9,21,32,50,63,90,103,128,145,174],"their":[10],"adoption":[11],"in":[12,45,162],"secure":[13],"authentication":[14],"frameworks.":[15],"However,":[16],"such":[17,24],"are":[19],"vulnerable":[20],"geometric":[22,176],"transformations,":[23],"as":[25,135,137],"rotation,":[26,94],"that":[27,75,118,167],"can":[28,169],"be":[29,170],"maliciously":[30],"applied":[31,93],"degrade":[33],"performance.":[35],"In":[36],"this":[37,86],"work,":[38],"we":[39],"explore":[40],"a":[41,47,55,68,171],"realistic":[42],"adversarial":[43],"scenario":[44],"which":[46],"hacker":[48],"attempts":[49],"conceal":[51],"the":[52,81,92,98,107,152,157],"identity":[53],"signer":[56],"by":[57],"rotating":[58],"online":[59],"handwritten":[60],"signatures":[61],"prior":[62,102],"recognition.":[65],"We":[66,105],"propose":[67],"defense":[69],"mechanism":[70],"based":[71],"on":[72,113],"blind":[73],"watermarking":[74,168],"embeds":[76],"orientation":[77,101],"metadata":[78],"directly":[79],"into":[80],"signal.":[83],"During":[84],"recognition,":[85],"watermark":[87],"extracted":[89],"estimate":[91],"enabling":[95],"restoration":[96],"original":[99],"signal":[100],"matching.":[104],"evaluate":[106],"impact":[108],"varying":[110],"rotation":[111],"angles":[112],"performance":[115],"and":[116,165],"demonstrate":[117],"our":[119],"watermark-assisted":[120],"correction":[121],"method":[122],"significantly":[123],"improves":[124],"accuracy,":[125],"restoring":[126],"it":[127],"near-original":[129],"levels.":[130],"Specifically,":[131],"accuracy":[132],"improved":[133],"from":[134],"low":[136],"$\\mathbf{2":[138],".":[139],"8":[140],"\\%}$":[141,149],"at":[142],"\u00b1":[143],"90\u00b0":[144],"over":[146],"$\\mathbf{9":[147],"9":[148],"after":[150],"applying":[151],"correction.":[153],"Our":[154],"results":[155],"highlight":[156],"importance":[158],"signal-level":[160],"integrity":[161],"show":[166],"viable":[172],"strategy":[173],"counteract":[175],"spoofing":[177],"attacks.":[178]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-03T00:00:00"}
