{"id":"https://openalex.org/W2043994772","doi":"https://doi.org/10.1109/ncvpripg.2013.6776240","title":"Reversible watermarking technique to enhance security of a biometric authentication system","display_name":"Reversible watermarking technique to enhance security of a biometric authentication system","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2043994772","doi":"https://doi.org/10.1109/ncvpripg.2013.6776240","mag":"2043994772"},"language":"en","primary_location":{"id":"doi:10.1109/ncvpripg.2013.6776240","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ncvpripg.2013.6776240","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078638661","display_name":"Vaibhav B. Joshi","orcid":null},"institutions":[{"id":"https://openalex.org/I98389781","display_name":"Dhirubhai Ambani Institute of Information and Communication Technology","ror":"https://ror.org/02d5b7g69","country_code":"IN","type":"education","lineage":["https://openalex.org/I98389781"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vaibhav B. Joshi","raw_affiliation_strings":["DAIICT, Gujarat, India","DAIICT Gandhinagar, India"],"affiliations":[{"raw_affiliation_string":"DAIICT, Gujarat, India","institution_ids":["https://openalex.org/I98389781"]},{"raw_affiliation_string":"DAIICT Gandhinagar, India","institution_ids":["https://openalex.org/I98389781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071626652","display_name":"Mehul S. Raval","orcid":"https://orcid.org/0000-0002-3895-1448"},"institutions":[{"id":"https://openalex.org/I52527943","display_name":"Ahmedabad University","ror":"https://ror.org/02swff503","country_code":"IN","type":"education","lineage":["https://openalex.org/I52527943"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mehul S. Raval","raw_affiliation_strings":["IICT, Ahmedabad University, Gujarat, India","IICT, Ahmedabad University, Ahmedabad, India#TAB#"],"affiliations":[{"raw_affiliation_string":"IICT, Ahmedabad University, Gujarat, India","institution_ids":["https://openalex.org/I52527943"]},{"raw_affiliation_string":"IICT, Ahmedabad University, Ahmedabad, India#TAB#","institution_ids":["https://openalex.org/I52527943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085892724","display_name":"Suman K. Mitra","orcid":"https://orcid.org/0000-0002-1039-5566"},"institutions":[{"id":"https://openalex.org/I98389781","display_name":"Dhirubhai Ambani Institute of Information and Communication Technology","ror":"https://ror.org/02d5b7g69","country_code":"IN","type":"education","lineage":["https://openalex.org/I98389781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Suman Mitra","raw_affiliation_strings":["DAIICT, Gujarat, India","DAIICT Gandhinagar, India"],"affiliations":[{"raw_affiliation_string":"DAIICT, Gujarat, India","institution_ids":["https://openalex.org/I98389781"]},{"raw_affiliation_string":"DAIICT Gandhinagar, India","institution_ids":["https://openalex.org/I98389781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041505327","display_name":"Priti P. Rege","orcid":"https://orcid.org/0000-0003-0584-5208"},"institutions":[{"id":"https://openalex.org/I878213199","display_name":"Savitribai Phule Pune University","ror":"https://ror.org/044g6d731","country_code":"IN","type":"education","lineage":["https://openalex.org/I878213199"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Priti P. Rege","raw_affiliation_strings":["College of Engineering Pune, Pune, Maharastra, India","College of Engineering, Pune, Pune India"],"affiliations":[{"raw_affiliation_string":"College of Engineering Pune, Pune, Maharastra, India","institution_ids":["https://openalex.org/I878213199"]},{"raw_affiliation_string":"College of Engineering, Pune, Pune India","institution_ids":["https://openalex.org/I878213199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020906333","display_name":"S. K. Parulkar","orcid":null},"institutions":[{"id":"https://openalex.org/I1329621470","display_name":"Bhabha Atomic Research Centre","ror":"https://ror.org/05w6wfp17","country_code":"IN","type":"facility","lineage":["https://openalex.org/I1329621470","https://openalex.org/I2799351866","https://openalex.org/I3149292468"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. K. Parulkar","raw_affiliation_strings":["Bhabha Atomic Research Centre, Mumbai, Maharastra, India","Bhabha Atomic Research Centre; Mumbai India"],"affiliations":[{"raw_affiliation_string":"Bhabha Atomic Research Centre, Mumbai, Maharastra, India","institution_ids":["https://openalex.org/I1329621470"]},{"raw_affiliation_string":"Bhabha Atomic Research Centre; Mumbai India","institution_ids":["https://openalex.org/I1329621470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5078638661"],"corresponding_institution_ids":["https://openalex.org/I98389781"],"apc_list":null,"apc_paid":null,"fwci":0.3192,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.5732693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"4283","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8349637985229492},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8138294816017151},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8067748546600342},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7439877390861511},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6131483316421509},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5170395970344543},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.45126819610595703},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38505375385284424},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3645840287208557},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35641735792160034},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33884716033935547},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.23048549890518188}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8349637985229492},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8138294816017151},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8067748546600342},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7439877390861511},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6131483316421509},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5170395970344543},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.45126819610595703},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38505375385284424},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3645840287208557},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35641735792160034},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33884716033935547},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.23048549890518188},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ncvpripg.2013.6776240","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ncvpripg.2013.6776240","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335179","display_name":"Board of Research in Nuclear Sciences","ror":"https://ror.org/02m388s04"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W200571003","https://openalex.org/W1812030059","https://openalex.org/W2032551902","https://openalex.org/W2040148195","https://openalex.org/W2063355793","https://openalex.org/W2065224899","https://openalex.org/W2105770740","https://openalex.org/W2106137793","https://openalex.org/W2107291320","https://openalex.org/W2117698047","https://openalex.org/W2125587922","https://openalex.org/W2135459805","https://openalex.org/W2144596760","https://openalex.org/W2146813141","https://openalex.org/W2155959919","https://openalex.org/W4230579564","https://openalex.org/W6638568299"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W1559740347","https://openalex.org/W2098152888","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2183032046"],"abstract_inverted_index":{"For":[0],"every":[1],"biometric":[2,20,28,44,117,141,155,177,185],"template":[3,14,36,56,96,128,186],"protecting":[4,15],"technique,":[5],"non-reversibility,":[6],"accuracy,":[7],"and":[8,113,137,149],"revocability":[9],"are":[10,23,42,80,157],"essential":[11],"features.":[12],"Several":[13],"techniques":[16],"like":[17],"bio-hash":[18],"or":[19,53],"crypto":[21],"system":[22],"used":[24,158],"to":[25,134],"transform":[26,50],"raw":[27],"features":[29,153],"into":[30],"alternative":[31],"form":[32],"known":[33],"as":[34],"protected":[35,40,55,78],"[2].":[37],"As":[38],"the":[39,65,83,86,145,161,166,184],"templates":[41,79,102],"non-reversible,":[43],"verification":[45,92,109],"is":[46,67,97,106],"done":[47],"in":[48,64,82,130,165,183],"a":[49,104,116,125],"domain.":[51],"Tampered":[52],"stolen":[54],"may":[57],"cause":[58],"false":[59],"validation;":[60],"therefore":[61],"its":[62,89,171],"authentication":[63,118,142],"database":[66,84,101],"essential.":[68],"Reversible":[69],"watermarking":[70,132],"technique":[71,110,133],"provides":[72,187],"one":[73],"such":[74],"effective":[75],"mechanism.":[76],"Watermark":[77,163],"stored":[81],"at":[85],"time":[87],"of":[88,154,181],"enrollment.":[90],"During":[91],"phase,":[93],"incoming":[94],"query":[95],"compared":[98],"with":[99],"many":[100],"until":[103],"match":[105],"established.":[107],"This":[108],"increase":[111],"complexity":[112],"burden":[114,139],"on":[115,140],"system.":[119,143],"In":[120,144],"this":[121],"paper,":[122],"we":[123],"propose":[124],"tag":[126],"based":[127],"searching":[129],"reversible":[131],"check":[135],"authenticity":[136],"reduce":[138],"proposal,":[146],"rotation,":[147],"scale":[148],"translation":[150],"(RST)":[151],"invariant":[152],"image":[156],"for":[159],"tagging":[160],"data.":[162],"reversibility":[164],"proposed":[167],"method":[168],"ensures":[169],"that":[170],"presence":[172,180],"do":[173],"not":[174],"affect":[175],"native":[176],"authentication.":[178],"Moreover":[179],"watermark":[182],"security":[188],"against":[189],"replay":[190],"attack.":[191]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
