{"id":"https://openalex.org/W3002998118","doi":"https://doi.org/10.1109/cisp-bmei48845.2019.8965958","title":"Learning-Based Index-of-Maximum Hashing for Touch-Stroke Template Protection","display_name":"Learning-Based Index-of-Maximum Hashing for Touch-Stroke Template Protection","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3002998118","doi":"https://doi.org/10.1109/cisp-bmei48845.2019.8965958","mag":"3002998118"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei48845.2019.8965958","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei48845.2019.8965958","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062304104","display_name":"Jinwei Zhi","orcid":null},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jinwei Zhi","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033118976","display_name":"Shih Yin Ooi","orcid":null},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Shih Yin Ooi","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051093782","display_name":"Andrew Beng Jin Teoh","orcid":"https://orcid.org/0000-0001-5063-9484"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Andrew Beng Jin Teoh","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062304104"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":null,"apc_paid":null,"fwci":0.8293,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74536639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7668306827545166},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.74830561876297},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7414023876190186},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.705720067024231},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5214097499847412},{"id":"https://openalex.org/keywords/template-matching","display_name":"Template matching","score":0.4881039559841156},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.48042964935302734},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.4771506190299988},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.23429012298583984},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18237832188606262}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7668306827545166},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.74830561876297},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7414023876190186},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.705720067024231},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5214097499847412},{"id":"https://openalex.org/C158096908","wikidata":"https://www.wikidata.org/wiki/Q3983303","display_name":"Template matching","level":3,"score":0.4881039559841156},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.48042964935302734},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.4771506190299988},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.23429012298583984},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18237832188606262},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei48845.2019.8965958","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei48845.2019.8965958","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1490122681","https://openalex.org/W1988790447","https://openalex.org/W2063355793","https://openalex.org/W2110401929","https://openalex.org/W2129905915","https://openalex.org/W2151854612","https://openalex.org/W2304776229","https://openalex.org/W2425857666","https://openalex.org/W2578023488","https://openalex.org/W2755909956","https://openalex.org/W2777595189","https://openalex.org/W2900131811","https://openalex.org/W2903510116","https://openalex.org/W3104110632","https://openalex.org/W4285719527","https://openalex.org/W6756113376"],"related_works":["https://openalex.org/W2807766446","https://openalex.org/W2023434790","https://openalex.org/W2122813395","https://openalex.org/W2989733199","https://openalex.org/W1603625628","https://openalex.org/W2902696888","https://openalex.org/W2915004488","https://openalex.org/W2532434580","https://openalex.org/W2992938135","https://openalex.org/W1591428358","https://openalex.org/W2883747428","https://openalex.org/W3155011310","https://openalex.org/W2903082373","https://openalex.org/W2743220979","https://openalex.org/W2563738197","https://openalex.org/W1983192482","https://openalex.org/W2095521709","https://openalex.org/W2963419754","https://openalex.org/W23705084","https://openalex.org/W3203869173"],"abstract_inverted_index":{"Touch-stroke":[0],"dynamics":[1],"is":[2,35,60],"an":[3,86],"emerging":[4],"biometrics":[5],"which":[6],"captures":[7],"a":[8,14,26,126],"user's":[9],"unique":[10],"way":[11],"of":[12,16,51,64,69],"swiping":[13],"set":[15],"\u201cstrokes\u201d":[17],"on":[18,93,143],"the":[19,52,57,62,71,76,94,120],"mobile":[20],"devices,":[21],"and":[22,47,99,129,164],"uses":[23],"them":[24],"as":[25,79,101,152,154],"matching":[27],"template.":[28,133],"Unexceptional":[29],"to":[30,38,44,55,124],"other":[31],"biometrics,":[32],"this":[33,82,108],"template":[34,59,77,90,142,157],"also":[36],"vulnerable":[37],"adversary":[39],"attacks":[40],"that":[41],"may":[42],"lead":[43],"privacy":[45],"invasion":[46],"impersonation":[48],"risk.":[49],"One":[50],"ideal":[53],"ways":[54],"protect":[56],"biometric":[58],"through":[61],"method":[63,91,136],"cancelable":[65,88,131],"biometrics.":[66],"On":[67],"top":[68],"distorting":[70],"original":[72,141],"template,":[73],"it":[74],"makes":[75],"revocable":[78],"well.":[80],"In":[81],"work,":[83],"we":[84],"propose":[85],"improved":[87],"touch-stroke":[89,132,145],"based":[92,103,116],"Index-of-Maximum":[95],"(IoM)":[96],"hashing":[97,106,118],"[10],":[98],"termed":[100],"learning":[102,122],"IoM":[104,113],"(LIoM)":[105],"throughout":[107],"paper.":[109],"Unlike":[110],"vanilla":[111],"data-agnostic":[112],"hashing,":[114],"data-driven":[115],"LIoM":[117],"utilizes":[119],"supervising":[121],"mechanism":[123],"generate":[125],"more":[127],"discriminative":[128],"compact":[130],"The":[134],"proposed":[135],"achieved":[137],"better":[138],"performance":[139],"than":[140],"Frank":[144],"dynamic":[146],"database":[147],"with":[148],"same":[149],"feature":[150],"length":[151],"well":[153],"satisfies":[155],"three":[156],"protection":[158],"design":[159],"criteria,":[160],"namely":[161],"irreversibility,":[162],"revocability":[163],"unlinkability.":[165]},"counts_by_year":[{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
