{"id":"https://openalex.org/W2620143363","doi":"https://doi.org/10.1109/iwbf.2017.7935094","title":"Sensor dependency in efficient fingerprint image protection using selective JPEG2000 encryption","display_name":"Sensor dependency in efficient fingerprint image protection using selective JPEG2000 encryption","publication_year":2017,"publication_date":"2017-04-01","ids":{"openalex":"https://openalex.org/W2620143363","doi":"https://doi.org/10.1109/iwbf.2017.7935094","mag":"2620143363"},"language":"en","primary_location":{"id":"doi:10.1109/iwbf.2017.7935094","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbf.2017.7935094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087425116","display_name":"Martin Draschl","orcid":null},"institutions":[{"id":"https://openalex.org/I182212641","display_name":"University of Salzburg","ror":"https://ror.org/05gs8cd61","country_code":"AT","type":"education","lineage":["https://openalex.org/I182212641"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Martin Draschl","raw_affiliation_strings":["Department of Comuter Sciences, University of Salzburg, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Comuter Sciences, University of Salzburg, Austria","institution_ids":["https://openalex.org/I182212641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071905211","display_name":"Jutta H\u00e4mmerle-Uhl","orcid":"https://orcid.org/0009-0004-6938-6471"},"institutions":[{"id":"https://openalex.org/I182212641","display_name":"University of Salzburg","ror":"https://ror.org/05gs8cd61","country_code":"AT","type":"education","lineage":["https://openalex.org/I182212641"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Jutta Hammerle-Uhl","raw_affiliation_strings":["Department of Comuter Sciences, University of Salzburg, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Comuter Sciences, University of Salzburg, Austria","institution_ids":["https://openalex.org/I182212641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062946437","display_name":"Andreas Uhl","orcid":"https://orcid.org/0000-0002-5921-8755"},"institutions":[{"id":"https://openalex.org/I182212641","display_name":"University of Salzburg","ror":"https://ror.org/05gs8cd61","country_code":"AT","type":"education","lineage":["https://openalex.org/I182212641"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Andreas Uhl","raw_affiliation_strings":["Department of Comuter Sciences, University of Salzburg, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Comuter Sciences, University of Salzburg, Austria","institution_ids":["https://openalex.org/I182212641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087425116"],"corresponding_institution_ids":["https://openalex.org/I182212641"],"apc_list":null,"apc_paid":null,"fwci":0.7397,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.70061409,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"e87 a","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8818345665931702},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7165147066116333},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7085858583450317},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6207702159881592},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6072624921798706},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.5892280340194702},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.5742509365081787},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.48720377683639526},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.4684581756591797},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.44242286682128906},{"id":"https://openalex.org/keywords/biometric-data","display_name":"Biometric data","score":0.4191793203353882},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.41625291109085083},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4103164076805115},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4060383439064026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3866974115371704},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.34089112281799316},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3065432906150818},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2968212366104126},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.17115938663482666},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.1636095643043518}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8818345665931702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7165147066116333},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7085858583450317},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6207702159881592},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6072624921798706},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.5892280340194702},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.5742509365081787},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.48720377683639526},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4684581756591797},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.44242286682128906},{"id":"https://openalex.org/C2989513435","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometric data","level":3,"score":0.4191793203353882},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.41625291109085083},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4103164076805115},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4060383439064026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3866974115371704},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.34089112281799316},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3065432906150818},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2968212366104126},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.17115938663482666},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.1636095643043518}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwbf.2017.7935094","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbf.2017.7935094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W126986325","https://openalex.org/W1539250641","https://openalex.org/W1567367764","https://openalex.org/W2025104051","https://openalex.org/W2055747269","https://openalex.org/W2078286562","https://openalex.org/W2099307121","https://openalex.org/W2109131581","https://openalex.org/W2164482218","https://openalex.org/W2345422336","https://openalex.org/W2489520410","https://openalex.org/W2550857697","https://openalex.org/W3088890550","https://openalex.org/W4230579564","https://openalex.org/W6664552310"],"related_works":["https://openalex.org/W2389178160","https://openalex.org/W2355986883","https://openalex.org/W4245054042","https://openalex.org/W2545514196","https://openalex.org/W2144246620","https://openalex.org/W2564633714","https://openalex.org/W2950229125","https://openalex.org/W2030024189","https://openalex.org/W3211136635","https://openalex.org/W2175086517"],"abstract_inverted_index":{"Biometric":[0],"system":[1],"security":[2],"requires":[3],"cryptographic":[4],"protection":[5],"of":[6,40,51],"sample":[7],"data":[8,24,45],"under":[9],"certain":[10],"circumstances.":[11],"We":[12],"assess":[13],"low":[14],"complexity":[15],"selective":[16],"encryption":[17,53],"schemes":[18],"applied":[19],"to":[20],"JPEG2000":[21],"compressed":[22],"fingerprint":[23,27],"by":[25],"conducting":[26],"recognition":[28],"on":[29,55],"the":[30,38,56],"selectively":[31],"encrypted":[32],"data.":[33],"This":[34],"paper":[35],"specifically":[36],"investigates":[37],"effect":[39],"considering":[41],"different":[42],"sensors":[43],"for":[44],"acquisition":[46],"and":[47],"finds":[48],"significant":[49],"dependency":[50],"optimal":[52],"settings":[54],"sensor":[57],"employed.":[58]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
