{"id":"https://openalex.org/W2029672942","doi":"https://doi.org/10.1109/tifs.2015.2402593","title":"A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion","display_name":"A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion","publication_year":2015,"publication_date":"2015-02-10","ids":{"openalex":"https://openalex.org/W2029672942","doi":"https://doi.org/10.1109/tifs.2015.2402593","mag":"2029672942"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2015.2402593","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2402593","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083055362","display_name":"Li Cai","orcid":"https://orcid.org/0000-0002-8298-0449"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Cai Li","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales at Canberra, Canberra, Australia","[School of Engineering and Information Technology, University of New South Wales at Canberra, Canberra, Australia]"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales at Canberra, Canberra, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]},{"raw_affiliation_string":"[School of Engineering and Information Technology, University of New South Wales at Canberra, Canberra, Australia]","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales at Canberra, Canberra, Australia","[School of Engineering and Information Technology, University of New South Wales at Canberra, Canberra, Australia]"],"raw_orcid":"https://orcid.org/0000-0003-0230-1432","affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales at Canberra, Canberra, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]},{"raw_affiliation_string":"[School of Engineering and Information Technology, University of New South Wales at Canberra, Canberra, Australia]","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045977578","display_name":"Josef Pieprzyk","orcid":"https://orcid.org/0000-0002-1917-6466"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Josef Pieprzyk","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, Science and Engineering Faculty, Queensland University of Technology, Brisbane, QLD, Australia","School of Electrical Engineering and Computer Science, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Qld., Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, Science and Engineering Faculty, Queensland University of Technology, Brisbane, QLD, Australia","institution_ids":["https://openalex.org/I160993911"]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Qld., Australia","institution_ids":["https://openalex.org/I160993911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","Sch. of Comput. Sci. & Software Eng., Univ. of Wollongong, Wollongong, NSW, Australia#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Sch. of Comput. Sci. & Software Eng., Univ. of Wollongong, Wollongong, NSW, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083055362"],"corresponding_institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":7.5231,"has_fulltext":false,"cited_by_count":79,"citation_normalized_percentile":{"value":0.97799989,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"10","issue":"6","first_page":"1193","last_page":"1206"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7892317771911621},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.788089394569397},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7146731615066528},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6126625537872314},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.6108223795890808},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5511679649353027},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5337971448898315},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5017776489257812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4670649468898773},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4486966133117676},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.43446293473243713},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3745138645172119}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7892317771911621},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.788089394569397},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7146731615066528},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6126625537872314},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.6108223795890808},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5511679649353027},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5337971448898315},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5017776489257812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4670649468898773},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4486966133117676},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43446293473243713},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3745138645172119},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2015.2402593","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2402593","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1571936621","https://openalex.org/W1594652978","https://openalex.org/W1602485673","https://openalex.org/W1971524123","https://openalex.org/W1989602801","https://openalex.org/W1990978919","https://openalex.org/W2014061207","https://openalex.org/W2014203677","https://openalex.org/W2032551902","https://openalex.org/W2035092087","https://openalex.org/W2036653215","https://openalex.org/W2040403168","https://openalex.org/W2044862799","https://openalex.org/W2058454401","https://openalex.org/W2070060274","https://openalex.org/W2074078450","https://openalex.org/W2074623901","https://openalex.org/W2079191383","https://openalex.org/W2098081605","https://openalex.org/W2099434011","https://openalex.org/W2099783228","https://openalex.org/W2106137793","https://openalex.org/W2110765466","https://openalex.org/W2112367529","https://openalex.org/W2114024372","https://openalex.org/W2118407210","https://openalex.org/W2119334679","https://openalex.org/W2123097583","https://openalex.org/W2125587922","https://openalex.org/W2135220659","https://openalex.org/W2144253890","https://openalex.org/W2146112636","https://openalex.org/W2156309524","https://openalex.org/W2162442687","https://openalex.org/W2162720573","https://openalex.org/W2163208397","https://openalex.org/W2169185337","https://openalex.org/W2266204622","https://openalex.org/W2309693750","https://openalex.org/W2570008916","https://openalex.org/W2951040975","https://openalex.org/W3123586397","https://openalex.org/W3160027900","https://openalex.org/W4234162184","https://openalex.org/W4252841717","https://openalex.org/W4285719527","https://openalex.org/W6635966985","https://openalex.org/W6674914766","https://openalex.org/W6677610113","https://openalex.org/W6681749759","https://openalex.org/W6684856836"],"related_works":["https://openalex.org/W1528334372","https://openalex.org/W1515856307","https://openalex.org/W2126445990","https://openalex.org/W197565096","https://openalex.org/W2092526533","https://openalex.org/W2352423969","https://openalex.org/W2347867225","https://openalex.org/W2130331872","https://openalex.org/W2012789718","https://openalex.org/W1989430648"],"abstract_inverted_index":{"Biometric":[0],"cryptosystems":[1],"provide":[2],"an":[3,49],"innovative":[4],"solution":[5],"for":[6],"cryptographic":[7],"key":[8],"generation,":[9],"encryption":[10],"as":[11,13],"well":[12],"biometric":[14,23,29,58,110],"template":[15],"protection.":[16],"Besides":[17],"high":[18],"authentication":[19,128],"accuracy,":[20],"a":[21,73,89,132],"good":[22],"cryptosystem":[24,92,133],"is":[25],"expected":[26],"to":[27,53,105],"protect":[28,107],"templates":[30],"effectively,":[31],"which":[32],"requires":[33],"that":[34,78,119],"helper":[35],"data":[36],"does":[37],"not":[38],"reveal":[39],"significant":[40],"information":[41],"about":[42],"the":[43,55,120],"templates.":[44],"Previous":[45],"works":[46],"predominantly":[47],"follow":[48],"appropriate":[50],"entropy":[51],"definition":[52],"measure":[54],"security":[56,69,75,116,125],"of":[57,67],"cryptosystems.":[59],"In":[60,85],"this":[61],"paper,":[62],"we":[63,87],"point":[64],"out":[65],"limitations":[66],"entropy-based":[68],"analysis":[70,76,117],"and":[71,115,126],"propose":[72],"new":[74],"framework":[77],"combines":[79],"information-theoretic":[80],"approach":[81],"with":[82,131],"computational":[83],"security.":[84],"addition,":[86],"construct":[88],"fingerprint-based":[90],"multibiometric":[91],"(MBC)":[93],"using":[94],"decision":[95],"level":[96],"fusion.":[97],"Hash":[98],"functions":[99],"are":[100],"employed":[101],"in":[102],"our":[103],"construction":[104],"further":[106],"each":[108],"single":[109,136],"trait.":[111],"The":[112],"experimental":[113],"results":[114],"demonstrate":[118],"proposed":[121],"MBC":[122],"provides":[123],"stronger":[124],"better":[127],"accuracy":[129],"compared":[130],"based":[134],"on":[135],"biometric.":[137]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":14},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
