{"id":"https://openalex.org/W1975172169","doi":"https://doi.org/10.1109/tifs.2014.2328095","title":"A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement","display_name":"A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement","publication_year":2014,"publication_date":"2014-06-03","ids":{"openalex":"https://openalex.org/W1975172169","doi":"https://doi.org/10.1109/tifs.2014.2328095","mag":"1975172169"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2328095","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2328095","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/6819111/06824822.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/10206/6819111/06824822.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064277907","display_name":"Wencheng Yang","orcid":"https://orcid.org/0000-0001-7800-2215"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I4394709116","display_name":"UNSW Canberra","ror":"https://ror.org/0125wpx05","country_code":null,"type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Wencheng Yang","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia","[School of Engineering and Information Technology, University of New South, Wales Canberra, ACT, Australia]"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]},{"raw_affiliation_string":"[School of Engineering and Information Technology, University of New South, Wales Canberra, ACT, Australia]","institution_ids":["https://openalex.org/I31746571","https://openalex.org/I4394709116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I4394709116","display_name":"UNSW Canberra","ror":"https://ror.org/0125wpx05","country_code":null,"type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia","[School of Engineering and Information Technology, University of New South, Wales Canberra, ACT, Australia]"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]},{"raw_affiliation_string":"[School of Engineering and Information Technology, University of New South, Wales Canberra, ACT, Australia]","institution_ids":["https://openalex.org/I31746571","https://openalex.org/I4394709116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047661937","display_name":"Song Wang","orcid":"https://orcid.org/0000-0002-0239-7991"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Song Wang","raw_affiliation_strings":["Department of Electronic Engineering, La Trobe University, Melbourne, VIC, Australia","Department of Electronic Engineering, La Trobe University, Melbourne, VIC, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, La Trobe University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I196829312"]},{"raw_affiliation_string":"Department of Electronic Engineering, La Trobe University, Melbourne, VIC, Australia#TAB#","institution_ids":["https://openalex.org/I196829312"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064277907"],"corresponding_institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571","https://openalex.org/I4394709116"],"apc_list":null,"apc_paid":null,"fwci":7.6547,"has_fulltext":true,"cited_by_count":78,"citation_normalized_percentile":{"value":0.97884473,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"9","issue":"7","first_page":"1179","last_page":"1192"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/delaunay-triangulation","display_name":"Delaunay triangulation","score":0.8976752758026123},{"id":"https://openalex.org/keywords/quadrangle","display_name":"Quadrangle","score":0.7339668273925781},{"id":"https://openalex.org/keywords/chews-second-algorithm","display_name":"Chew's second algorithm","score":0.647158682346344},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.625575065612793},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5801831483840942},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.514370322227478},{"id":"https://openalex.org/keywords/constrained-delaunay-triangulation","display_name":"Constrained Delaunay triangulation","score":0.38049232959747314},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33635812997817993},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2917564809322357},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.06384235620498657}],"concepts":[{"id":"https://openalex.org/C68010082","wikidata":"https://www.wikidata.org/wiki/Q192445","display_name":"Delaunay triangulation","level":2,"score":0.8976752758026123},{"id":"https://openalex.org/C27258493","wikidata":"https://www.wikidata.org/wiki/Q7268308","display_name":"Quadrangle","level":2,"score":0.7339668273925781},{"id":"https://openalex.org/C183342303","wikidata":"https://www.wikidata.org/wiki/Q105742691","display_name":"Chew's second algorithm","level":4,"score":0.647158682346344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.625575065612793},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5801831483840942},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.514370322227478},{"id":"https://openalex.org/C128321387","wikidata":"https://www.wikidata.org/wiki/Q5164356","display_name":"Constrained Delaunay triangulation","level":3,"score":0.38049232959747314},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33635812997817993},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2917564809322357},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.06384235620498657},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2014.2328095","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2328095","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/6819111/06824822.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tifs.2014.2328095","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2328095","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/6819111/06824822.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.6600000262260437}],"awards":[{"id":"https://openalex.org/G1332690422","display_name":null,"funder_award_id":"LP120100595","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"},{"id":"https://openalex.org/G6743765033","display_name":null,"funder_award_id":"LP100200538","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1975172169.pdf","grobid_xml":"https://content.openalex.org/works/W1975172169.grobid-xml"},"referenced_works_count":57,"referenced_works":["https://openalex.org/W86398923","https://openalex.org/W181285811","https://openalex.org/W1495327900","https://openalex.org/W1519351129","https://openalex.org/W1542372215","https://openalex.org/W1569096659","https://openalex.org/W1599789598","https://openalex.org/W1606480398","https://openalex.org/W1889346539","https://openalex.org/W1963765109","https://openalex.org/W1974213704","https://openalex.org/W1981115560","https://openalex.org/W1990891585","https://openalex.org/W1998235855","https://openalex.org/W2002827932","https://openalex.org/W2007091165","https://openalex.org/W2014061207","https://openalex.org/W2017723092","https://openalex.org/W2020992254","https://openalex.org/W2021667425","https://openalex.org/W2027344419","https://openalex.org/W2032551902","https://openalex.org/W2035092087","https://openalex.org/W2037894298","https://openalex.org/W2043392840","https://openalex.org/W2044862799","https://openalex.org/W2045199475","https://openalex.org/W2047750060","https://openalex.org/W2065224899","https://openalex.org/W2074078450","https://openalex.org/W2075931228","https://openalex.org/W2079317687","https://openalex.org/W2106137793","https://openalex.org/W2109211915","https://openalex.org/W2110765466","https://openalex.org/W2111251300","https://openalex.org/W2117698047","https://openalex.org/W2126960670","https://openalex.org/W2128270135","https://openalex.org/W2131461205","https://openalex.org/W2133309269","https://openalex.org/W2135220659","https://openalex.org/W2138630782","https://openalex.org/W2145262111","https://openalex.org/W2146813141","https://openalex.org/W2155643927","https://openalex.org/W2159546316","https://openalex.org/W2160367574","https://openalex.org/W2161239015","https://openalex.org/W2232398035","https://openalex.org/W2320835389","https://openalex.org/W3160027900","https://openalex.org/W6676269646","https://openalex.org/W6678870007","https://openalex.org/W6680213980","https://openalex.org/W6681599561","https://openalex.org/W6682987809"],"related_works":["https://openalex.org/W2353304988","https://openalex.org/W2359979928","https://openalex.org/W1989161402","https://openalex.org/W1751078205","https://openalex.org/W2384614608","https://openalex.org/W2132199339","https://openalex.org/W2361950850","https://openalex.org/W2129412583","https://openalex.org/W2317689579","https://openalex.org/W330979007"],"abstract_inverted_index":{"Although":[0],"some":[1,200],"nice":[2],"properties":[3],"of":[4,24,159],"the":[5,33,87,157,172,188,192],"Delaunay":[6,73,88,99,113,135,173,189,193],"triangle-based":[7,89,190],"structure":[8,90],"have":[9,20],"been":[10,21],"exploited":[11],"in":[12,40,64],"many":[13],"fingerprint":[14,75],"authentication":[15,76],"systems":[16,26,42],"and":[17,36,93,107,115,167,183,199],"satisfactory":[18],"outcomes":[19],"reported,":[22],"most":[23],"these":[25,41,65],"operate":[27],"without":[28,196],"template":[29,48,121,160],"protection.":[30],"In":[31,67],"addition,":[32],"feature":[34,95],"sets":[35],"similarity":[37],"measures":[38],"utilized":[39],"are":[43,101],"not":[44,61],"suitable":[45],"for":[46],"existing":[47,120],"protection":[49,122],"techniques.":[50],"Moreover,":[51],"local":[52,83,149],"structural":[53,84],"change":[54,85],"caused":[55],"by":[56],"nonlinear":[57,81,105],"distortion":[58,106],"is":[59],"often":[60],"considered":[62],"adequately":[63],"systems.":[66,203],"this":[68,140],"paper,":[69],"we":[70,125],"propose":[71,126],"a":[72,129],"quadrangle-based":[74,174,194],"system":[77,175,195],"to":[78,104,119,127,145],"deal":[79],"with":[80,176],"distortion-induced":[82],"that":[86,171],"suffers.":[91],"Fixed-length":[92],"alignment-free":[94],"vectors":[96],"extracted":[97],"from":[98,112,133],"quadrangles":[100],"less":[102],"sensitive":[103],"more":[108],"discriminative":[109],"than":[110,187],"those":[111],"triangles":[114],"can":[116,139,179],"be":[117],"applied":[118],"directly.":[123],"Furthermore,":[124],"construct":[128],"unique":[130,141],"topology":[131,142,177,197],"code":[132,143,178],"each":[134],"quadrangle.":[136],"Not":[137],"only":[138],"help":[144],"carry":[146],"out":[147],"accurate":[148],"registration":[150],"under":[151],"distortion,":[152],"but":[153],"it":[154],"also":[155],"enhances":[156],"security":[158,168,185],"data.":[161],"Experimental":[162],"results":[163],"on":[164],"public":[165],"databases":[166],"analysis":[169],"show":[170],"achieve":[180],"better":[181],"performance":[182],"higher":[184],"level":[186],"system,":[191],"code,":[198],"other":[201],"similar":[202]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":14},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
