{"id":"https://openalex.org/W4409642247","doi":"https://doi.org/10.1109/tifs.2025.3559791","title":"A Random-Binding-Based Bio-Hashing Template Protection Method for Palm Vein Recognition","display_name":"A Random-Binding-Based Bio-Hashing Template Protection Method for Palm Vein Recognition","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409642247","doi":"https://doi.org/10.1109/tifs.2025.3559791"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3559791","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3559791","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087362387","display_name":"Tianming Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianming Xie","raw_affiliation_strings":["School of Automation Science and Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089840086","display_name":"Wenxiong Kang","orcid":"https://orcid.org/0000-0001-9023-7252"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenxiong Kang","raw_affiliation_strings":["School of Automation Science and Engineering and the School of Future Technology, South China University of Technology, Guangzhou, China","School of Automation Science and Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Engineering and the School of Future Technology, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]},{"raw_affiliation_string":"School of Automation Science and Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087362387"],"corresponding_institution_ids":["https://openalex.org/I90610280"],"apc_list":null,"apc_paid":null,"fwci":11.7796,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.98833187,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"20","issue":null,"first_page":"4243","last_page":"4255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13568","display_name":"Wood and Agarwood Research","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/1605","display_name":"Organic Chemistry"},"field":{"id":"https://openalex.org/fields/16","display_name":"Chemistry"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864633798599243},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5913888812065125},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5054793357849121},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4977324306964874},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19151777029037476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864633798599243},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5913888812065125},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5054793357849121},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4977324306964874},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19151777029037476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3559791","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3559791","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Zero hunger","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/2"}],"awards":[{"id":"https://openalex.org/G1122191357","display_name":null,"funder_award_id":"62376100","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8556967462","display_name":null,"funder_award_id":"61976095","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1980912678","https://openalex.org/W1998161813","https://openalex.org/W2000947714","https://openalex.org/W2005026521","https://openalex.org/W2028623495","https://openalex.org/W2126562928","https://openalex.org/W2129313573","https://openalex.org/W2144025519","https://openalex.org/W2190381199","https://openalex.org/W2249373598","https://openalex.org/W2466367677","https://openalex.org/W2755153801","https://openalex.org/W2755909956","https://openalex.org/W2777595189","https://openalex.org/W2791437400","https://openalex.org/W2806245398","https://openalex.org/W2891136208","https://openalex.org/W2891497694","https://openalex.org/W2902696888","https://openalex.org/W2921775711","https://openalex.org/W2922398519","https://openalex.org/W2946595465","https://openalex.org/W2954385999","https://openalex.org/W3128129619","https://openalex.org/W3155011310","https://openalex.org/W3157512872","https://openalex.org/W3161872650","https://openalex.org/W3175129878","https://openalex.org/W3176307736","https://openalex.org/W3194851450","https://openalex.org/W3200071806","https://openalex.org/W3202378260","https://openalex.org/W4206804369","https://openalex.org/W4210766683","https://openalex.org/W4213154066","https://openalex.org/W4296991123","https://openalex.org/W4309643846","https://openalex.org/W4382203279","https://openalex.org/W4385522522","https://openalex.org/W4386025785","https://openalex.org/W4389666879","https://openalex.org/W4392910465","https://openalex.org/W4394958733","https://openalex.org/W6803087517","https://openalex.org/W6861509668"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2033914206","https://openalex.org/W2042327336"],"abstract_inverted_index":{"To":[0],"mitigate":[1],"the":[2,25,30,61,91,111],"risk":[3],"of":[4,10,209],"data":[5],"breaches,":[6],"an":[7,160],"increasing":[8],"number":[9],"biometric":[11,17,36,77,93,113],"recognition":[12],"systems":[13],"are":[14,50,63],"introducing":[15],"encryption":[16],"template":[18,37,78],"protection":[19,38,79],"methods":[20,185],"and":[21,45,54,107,145,186,212],"directly":[22],"matching":[23],"in":[24,123],"encrypted":[26,183],"domain.":[27],"Depending":[28],"on":[29],"approach":[31],"to":[32,57,85,120],"key":[33,58],"management,":[34],"prevailing":[35],"strategies":[39],"can":[40],"be":[41],"categorized":[42],"into":[43],"declarative":[44],"distributive":[46],"methods.":[47,193],"The":[48],"former":[49],"challenged":[51],"by":[52,65],"complexities":[53],"vulnerabilities":[55],"linked":[56],"loss,":[59],"while":[60,204],"latter":[62],"compromised":[64],"fixed":[66,137],"mapping":[67,139],"rules":[68],"that":[69,81,104,141,198],"may":[70],"expose":[71],"personal":[72],"information.":[73],"We":[74,150],"present":[75],"a":[76,98,136,153,169],"method":[80,180,200],"combines":[82],"random-fixed":[83],"factors":[84,109,119],"handle":[86],"these":[87],"challenges,":[88],"thereby":[89],"protecting":[90],"user\u2019s":[92,112],"privacy.":[94],"Firstly,":[95],"we":[96,134,172,195],"introduce":[97],"random":[99],"activation":[100],"factor":[101],"generation":[102],"module":[103,116,140],"extracts":[105],"scaling":[106],"offset":[108],"from":[110],"data.":[114],"This":[115],"randomly":[117],"binds":[118],"different":[121],"positions":[122],"each":[124],"authentication":[125],"process,":[126],"rendering":[127],"distance-dependent":[128],"bitwise":[129],"cracking":[130],"algorithms":[131],"ineffective.":[132],"Secondly,":[133],"propose":[135],"multi-branch":[138],"enhances":[142],"feature":[143],"expression":[144],"minimizes":[146],"information":[147],"loss":[148],"post-encryption.":[149],"also":[151],"develop":[152],"trainable":[154],"min-max":[155],"hash":[156],"method,":[157],"optimized":[158],"using":[159],"improved":[161],"approximate":[162],"contrastive":[163],"loss.":[164],"Employing":[165],"palm":[166],"veins":[167],"as":[168],"case":[170],"study,":[171],"conducted":[173],"experiments":[174],"across":[175],"five":[176],"datasets,":[177],"where":[178],"our":[179,199],"outperformed":[181],"other":[182],"domain":[184],"showed":[187],"competitive":[188],"advantages":[189],"over":[190],"mainstream":[191],"non-encrypted":[192],"Moreover,":[194],"have":[196],"demonstrated":[197],"ensures":[201],"robust":[202],"performance":[203],"meeting":[205],"essential":[206],"security":[207],"requirements":[208],"irreversibility,":[210],"unlinkability,":[211],"revocability.":[213]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
