{"id":"https://openalex.org/W2424570555","doi":"https://doi.org/10.1109/isias.2015.7492746","title":"Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment","display_name":"Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2424570555","doi":"https://doi.org/10.1109/isias.2015.7492746","mag":"2424570555"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2015.7492746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2015.7492746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055300515","display_name":"Zaid Ameen Abduljabbar","orcid":"https://orcid.org/0000-0002-8239-1409"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN","IQ"],"is_corresponding":true,"raw_author_name":"Zaid Ameen Abduljabbar","raw_affiliation_strings":["Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","University of Basrah, Basrah, Iraq"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"University of Basrah, Basrah, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083247107","display_name":"Zaid Alaa Hussien","orcid":"https://orcid.org/0000-0002-4852-9785"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN","IQ"],"is_corresponding":false,"raw_author_name":"Zaid Alaa Hussien","raw_affiliation_strings":["Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","University of Basrah, Basrah, Iraq"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"University of Basrah, Basrah, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060259717","display_name":"Ali A. Yassin","orcid":"https://orcid.org/0000-0003-4425-0071"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ali A. Yassin","raw_affiliation_strings":["Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014679193","display_name":"Mohammed Abdulridha Hussain","orcid":"https://orcid.org/0000-0001-5846-6143"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mohammed Abdulridha Hussain","raw_affiliation_strings":["Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026650827","display_name":"Salah H. Abbdal","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210145266","display_name":"Southern Technical University","ror":"https://ror.org/03sax3264","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210145266"]}],"countries":["CN","IQ"],"is_corresponding":false,"raw_author_name":"Salah H. Abbdal","raw_affiliation_strings":["Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","Southern Technical University, Basrah, Iraq"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Southern Technical University, Basrah, Iraq","institution_ids":["https://openalex.org/I4210145266"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["University of Basrah, Basrah, Iraq"],"affiliations":[{"raw_affiliation_string":"University of Basrah, Basrah, Iraq","institution_ids":["https://openalex.org/I126633494"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5055300515"],"corresponding_institution_ids":["https://openalex.org/I126633494","https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.2872,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61578825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8117771744728088},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.654420793056488},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.64255690574646},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6011331081390381},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.585386335849762},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5616762042045593},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5110210180282593},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4156051278114319},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40400537848472595},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26008838415145874},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11128923296928406},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09689739346504211}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8117771744728088},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.654420793056488},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.64255690574646},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6011331081390381},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.585386335849762},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5616762042045593},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5110210180282593},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4156051278114319},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40400537848472595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26008838415145874},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11128923296928406},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09689739346504211},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2015.7492746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2015.7492746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1564241452","https://openalex.org/W1966513254","https://openalex.org/W1989125524","https://openalex.org/W2016205391","https://openalex.org/W2017935068","https://openalex.org/W2018196284","https://openalex.org/W2074840859","https://openalex.org/W2099830559","https://openalex.org/W2102796633","https://openalex.org/W2104237724","https://openalex.org/W2117314358","https://openalex.org/W2141550789","https://openalex.org/W2146482978","https://openalex.org/W2150010995","https://openalex.org/W2155394186","https://openalex.org/W3151434649","https://openalex.org/W6654735058"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W4389340727","https://openalex.org/W1998027365","https://openalex.org/W2025389994","https://openalex.org/W2964962446","https://openalex.org/W4312518048","https://openalex.org/W2996769815"],"abstract_inverted_index":{"Recently,":[0],"security":[1,139],"issues":[2],"are":[3,165],"obstructing":[4],"the":[5,21,37,47,53,57,108,169,172],"development":[6],"and":[7,14,24,44,98,151,161,171],"using":[8],"of":[9,36,52,59,107],"cloud":[10,22,48],"computing":[11],"services.":[12],"Authentication":[13],"integrity":[15],"play":[16],"an":[17,121],"important":[18,138],"role":[19],"in":[20,79,120],"security,":[23],"numerous":[25],"concerns":[26],"have":[27],"been":[28],"raised":[29],"to":[30],"recognize":[31],"any":[32],"tampering":[33],"with":[34,67],"exchanges":[35],"image":[38,87,112,122,127],"document":[39,88,113,123],"between":[40,177],"two":[41],"entities":[42],"(sender":[43],"receiver)":[45],"within":[46],"environment.":[49],"However,":[50],"none":[51],"existing":[54],"solutions":[55],"reduce":[56],"probability":[58],"known":[60],"attacks":[61],"by":[62,168],"combining":[63,93],"cryptographic":[64,102],"hash":[65],"function":[66],"a":[68,84,99,125],"strong":[69],"factor":[70],"that":[71],"should":[72],"be":[73],"periodically":[74],"changed.":[75],"For":[76],"this":[77,80],"reason,":[78],"paper":[81],"we":[82],"propose":[83],"robust":[85,100,148],"one-time":[86,111],"authentication":[89,114],"scheme":[90,135],"based":[91],"on":[92],"non-interactive":[94],"onetime":[95],"biometric":[96,145,154],"key":[97,143,146,155,157,159,162],"wavelet-based":[101],"hashing":[103],"scheme.":[104],"The":[105,133],"result":[106],"combination":[109],"is":[110,118,179],"code":[115],"(OMAC).":[116],"OMAC":[117],"hidden":[119],"as":[124,142],"cover":[126],"through":[128],"reversible":[129],"data":[130],"embedding":[131],"steganography.":[132],"proposed":[134],"has":[136],"several":[137],"attributes,":[140],"such":[141],"agreement,":[144],"management,":[147,156],"OMAC,":[149],"invulnerability,":[150],"efficiency.":[152],"In":[153],"generation,":[158],"selection,":[160],"update":[163],"algorithms":[164],"performed":[166],"autonomously":[167],"sender":[170],"receiver;":[173],"thus,":[174],"no":[175],"interaction":[176],"them":[178],"needed.":[180]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
