{"id":"https://openalex.org/W3033608922","doi":"https://doi.org/10.1109/iwbf49977.2020.9107967","title":"Security Assessment of Partially Encrypted Visual Data: Using Iris Recognition as Generic Measure","display_name":"Security Assessment of Partially Encrypted Visual Data: Using Iris Recognition as Generic Measure","publication_year":2020,"publication_date":"2020-04-01","ids":{"openalex":"https://openalex.org/W3033608922","doi":"https://doi.org/10.1109/iwbf49977.2020.9107967","mag":"3033608922"},"language":"en","primary_location":{"id":"doi:10.1109/iwbf49977.2020.9107967","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbf49977.2020.9107967","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038930170","display_name":"Martin Rieger","orcid":null},"institutions":[{"id":"https://openalex.org/I182212641","display_name":"University of Salzburg","ror":"https://ror.org/05gs8cd61","country_code":"AT","type":"education","lineage":["https://openalex.org/I182212641"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Martin Rieger","raw_affiliation_strings":["Department of Computer Sciences, University of Salzburg, Salzburg, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, University of Salzburg, Salzburg, Austria","institution_ids":["https://openalex.org/I182212641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071905211","display_name":"Jutta H\u00e4mmerle-Uhl","orcid":"https://orcid.org/0009-0004-6938-6471"},"institutions":[{"id":"https://openalex.org/I182212641","display_name":"University of Salzburg","ror":"https://ror.org/05gs8cd61","country_code":"AT","type":"education","lineage":["https://openalex.org/I182212641"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Jutta Hammerle-Uhl","raw_affiliation_strings":["Department of Computer Sciences, University of Salzburg, Salzburg, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, University of Salzburg, Salzburg, Austria","institution_ids":["https://openalex.org/I182212641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062946437","display_name":"Andreas Uhl","orcid":"https://orcid.org/0000-0002-5921-8755"},"institutions":[{"id":"https://openalex.org/I182212641","display_name":"University of Salzburg","ror":"https://ror.org/05gs8cd61","country_code":"AT","type":"education","lineage":["https://openalex.org/I182212641"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Andreas Uhl","raw_affiliation_strings":["Department of Computer Sciences, University of Salzburg, Salzburg, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, University of Salzburg, Salzburg, Austria","institution_ids":["https://openalex.org/I182212641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038930170"],"corresponding_institution_ids":["https://openalex.org/I182212641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05016132,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"33","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.909835696220398},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7117729783058167},{"id":"https://openalex.org/keywords/iris-recognition","display_name":"Iris recognition","score":0.6602168679237366},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5188301801681519},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.5083145499229431},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5000021457672119},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.49721387028694153},{"id":"https://openalex.org/keywords/iris","display_name":"IRIS (biosensor)","score":0.47525832056999207},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.4710003435611725},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4640236496925354},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.45856061577796936},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.457798033952713},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.42352184653282166},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3904261589050293},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.32455873489379883},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.26080843806266785},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1851336658000946},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17190736532211304}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.909835696220398},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7117729783058167},{"id":"https://openalex.org/C112356035","wikidata":"https://www.wikidata.org/wiki/Q1672722","display_name":"Iris recognition","level":3,"score":0.6602168679237366},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5188301801681519},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.5083145499229431},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5000021457672119},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49721387028694153},{"id":"https://openalex.org/C2779503344","wikidata":"https://www.wikidata.org/wiki/Q5973514","display_name":"IRIS (biosensor)","level":3,"score":0.47525832056999207},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.4710003435611725},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4640236496925354},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.45856061577796936},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.457798033952713},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.42352184653282166},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3904261589050293},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32455873489379883},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.26080843806266785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1851336658000946},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17190736532211304},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwbf49977.2020.9107967","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbf49977.2020.9107967","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W126986325","https://openalex.org/W1830531919","https://openalex.org/W1972439872","https://openalex.org/W1973876682","https://openalex.org/W2053746207","https://openalex.org/W2055747269","https://openalex.org/W2078286562","https://openalex.org/W2078483536","https://openalex.org/W2100272833","https://openalex.org/W2120551067","https://openalex.org/W2133665775","https://openalex.org/W2160245619","https://openalex.org/W2164221787","https://openalex.org/W2164313150","https://openalex.org/W2165680521","https://openalex.org/W2345422336","https://openalex.org/W2418524250","https://openalex.org/W2507096059","https://openalex.org/W2550857697","https://openalex.org/W2620143363","https://openalex.org/W2810897711","https://openalex.org/W4292402161","https://openalex.org/W6638626010","https://openalex.org/W6664552310","https://openalex.org/W6683970204"],"related_works":["https://openalex.org/W2162640687","https://openalex.org/W2759939383","https://openalex.org/W2952386695","https://openalex.org/W2355560018","https://openalex.org/W2147209541","https://openalex.org/W4231710054","https://openalex.org/W2557390811","https://openalex.org/W3133795085","https://openalex.org/W3213945064","https://openalex.org/W2784078054"],"abstract_inverted_index":{"Security":[0],"assessment":[1],"of":[2,17,37,58,84],"partially":[3],"encrypted":[4,48,85],"visual":[5],"data":[6,50],"is":[7,39,51],"known":[8,18],"to":[9,25,47,53,77,92],"be":[10,26,78],"difficult.":[11],"We":[12],"show":[13],"that":[14],"a":[15,34,79],"set":[16],"image":[19,93],"quality":[20,94],"measures":[21],"turn":[22],"out":[23,76],"not":[24],"good":[27],"predictors":[28],"for":[29,82],"encryption":[30,61],"strength,":[31],"especially":[32],"if":[33],"different":[35],"extent":[36],"recognisability":[38],"present":[40],"in":[41,69,87],"the":[42,55,59,65],"data.":[43],"Iris":[44],"recognition":[45,73],"applied":[46],"sample":[49],"proposed":[52],"assess":[54],"protection":[56],"strength":[57],"employed":[60],"scheme.":[62],"When":[63],"choosing":[64],"settings":[66],"as":[67],"identified":[68],"this":[70],"work,":[71],"iris":[72],"performance":[74],"turns":[75],"viable":[80],"predictor":[81],"security":[83],"data,":[86],"more":[88],"consistent":[89],"manner":[90],"compared":[91],"measures.":[95]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
