{"id":"https://openalex.org/W1681223851","doi":"https://doi.org/10.1109/iwcmc.2015.7289189","title":"Vulnerabilities of fuzzy vault schemes using biometric data with traces","display_name":"Vulnerabilities of fuzzy vault schemes using biometric data with traces","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1681223851","doi":"https://doi.org/10.1109/iwcmc.2015.7289189","mag":"1681223851"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2015.7289189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2015.7289189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049786046","display_name":"Maryam Lafkih","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Maryam Lafkih","raw_affiliation_strings":["LRIT, Mohammed V University, Rabat, Morocco","LRIT (Associated unit with CNRST, URAC 29), Faculty of Sciences, Mohammed V University, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"LRIT, Mohammed V University, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]},{"raw_affiliation_string":"LRIT (Associated unit with CNRST, URAC 29), Faculty of Sciences, Mohammed V University, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060364800","display_name":"Patrick Lacharme","orcid":"https://orcid.org/0000-0003-1186-750X"},"institutions":[{"id":"https://openalex.org/I194210350","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs de Caen","ror":"https://ror.org/01fpqqe90","country_code":"FR","type":"education","lineage":["https://openalex.org/I194210350","https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I4210139483","display_name":"GREYC","ror":"https://ror.org/043749971","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I194210350","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210139483","https://openalex.org/I4210159245","https://openalex.org/I98702875"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Patrick Lacharme","raw_affiliation_strings":["GREYC, ENSICAEN, Caen, France","ENSICAEN, GREYC, F-14032 Caen, France"],"affiliations":[{"raw_affiliation_string":"GREYC, ENSICAEN, Caen, France","institution_ids":["https://openalex.org/I4210139483","https://openalex.org/I194210350"]},{"raw_affiliation_string":"ENSICAEN, GREYC, F-14032 Caen, France","institution_ids":["https://openalex.org/I4210139483","https://openalex.org/I194210350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079967426","display_name":"Christophe Rosenberger","orcid":"https://orcid.org/0000-0002-2042-9029"},"institutions":[{"id":"https://openalex.org/I194210350","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs de Caen","ror":"https://ror.org/01fpqqe90","country_code":"FR","type":"education","lineage":["https://openalex.org/I194210350","https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I4210139483","display_name":"GREYC","ror":"https://ror.org/043749971","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I194210350","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210139483","https://openalex.org/I4210159245","https://openalex.org/I98702875"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Christophe Rosenberger","raw_affiliation_strings":["GREYC, ENSICAEN, Caen, France","ENSICAEN, GREYC, F-14032 Caen, France"],"affiliations":[{"raw_affiliation_string":"GREYC, ENSICAEN, Caen, France","institution_ids":["https://openalex.org/I4210139483","https://openalex.org/I194210350"]},{"raw_affiliation_string":"ENSICAEN, GREYC, F-14032 Caen, France","institution_ids":["https://openalex.org/I4210139483","https://openalex.org/I194210350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020295680","display_name":"Mounia Mikram","orcid":"https://orcid.org/0000-0002-6647-5098"},"institutions":[{"id":"https://openalex.org/I4210149368","display_name":"\u00c9cole des Sciences de I'information","ror":"https://ror.org/04wx25x02","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210149368"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mounia Mikram","raw_affiliation_strings":["School of Information Sciences, Rabat, Morocco","The School of Information Sciences, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"School of Information Sciences, Rabat, Morocco","institution_ids":["https://openalex.org/I4210149368"]},{"raw_affiliation_string":"The School of Information Sciences, Rabat, Morocco","institution_ids":["https://openalex.org/I4210149368"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029506928","display_name":"Sanaa Ghouzali","orcid":"https://orcid.org/0000-0001-9381-4246"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sanaa Ghouzali","raw_affiliation_strings":["Information Technology Department, King Saud University, Riyadh, Kingdom of Saudi Arabia","Information Technology Department, College of Computer and Information Sciences, King Saud University Riyadh, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information Technology Department, King Saud University, Riyadh, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Information Technology Department, College of Computer and Information Sciences, King Saud University Riyadh, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038224021","display_name":"Mohammed El Haziti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammed El Haziti","raw_affiliation_strings":["Higher School of Technology, Sale, Morocco"],"affiliations":[{"raw_affiliation_string":"Higher School of Technology, Sale, Morocco","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112238886","display_name":"Driss Aboutajdine","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Driss Aboutajdine","raw_affiliation_strings":["LRIT, Mohammed V University, Rabat, Morocco","LRIT (Associated unit with CNRST, URAC 29), Faculty of Sciences, Mohammed V University, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"LRIT, Mohammed V University, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]},{"raw_affiliation_string":"LRIT (Associated unit with CNRST, URAC 29), Faculty of Sciences, Mohammed V University, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5049786046"],"corresponding_institution_ids":["https://openalex.org/I126477371"],"apc_list":null,"apc_paid":null,"fwci":0.27218597,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.55040765,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"18","issue":null,"first_page":"822","last_page":"827"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8860366344451904},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.742016613483429},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6368871927261353},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6069103479385376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5953933000564575},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.4755506217479706},{"id":"https://openalex.org/keywords/modality","display_name":"Modality (human\u2013computer interaction)","score":0.46417877078056335},{"id":"https://openalex.org/keywords/modalities","display_name":"Modalities","score":0.4514625370502472},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4135516285896301},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3938780725002289},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3499719500541687},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3314005136489868},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30164986848831177}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8860366344451904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.742016613483429},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6368871927261353},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6069103479385376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5953933000564575},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4755506217479706},{"id":"https://openalex.org/C2780226545","wikidata":"https://www.wikidata.org/wiki/Q6888030","display_name":"Modality (human\u2013computer interaction)","level":2,"score":0.46417877078056335},{"id":"https://openalex.org/C2779903281","wikidata":"https://www.wikidata.org/wiki/Q6888026","display_name":"Modalities","level":2,"score":0.4514625370502472},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4135516285896301},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3938780725002289},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3499719500541687},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3314005136489868},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30164986848831177},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2015.7289189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2015.7289189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W87666968","https://openalex.org/W627818147","https://openalex.org/W853463248","https://openalex.org/W1577532209","https://openalex.org/W1591385104","https://openalex.org/W1987266619","https://openalex.org/W2010135280","https://openalex.org/W2011999296","https://openalex.org/W2026973959","https://openalex.org/W2032551902","https://openalex.org/W2060987772","https://openalex.org/W2063355793","https://openalex.org/W2070060274","https://openalex.org/W2085861891","https://openalex.org/W2102498100","https://openalex.org/W2106137793","https://openalex.org/W2114320288","https://openalex.org/W2118498934","https://openalex.org/W2120500060","https://openalex.org/W2161239015","https://openalex.org/W2164294799","https://openalex.org/W2165335818","https://openalex.org/W2165367855","https://openalex.org/W2165821613","https://openalex.org/W2185987550","https://openalex.org/W2290375200","https://openalex.org/W2994340921","https://openalex.org/W3160027900","https://openalex.org/W6677235924","https://openalex.org/W6683896060"],"related_works":["https://openalex.org/W4233349824","https://openalex.org/W3014822659","https://openalex.org/W4362496757","https://openalex.org/W2051501574","https://openalex.org/W2117826006","https://openalex.org/W2050967184","https://openalex.org/W2566091814","https://openalex.org/W2114937328","https://openalex.org/W2148654711","https://openalex.org/W4200422973"],"abstract_inverted_index":{"Biometric":[0],"cryptosystems":[1,10],"represent":[2],"emerging":[3],"techniques":[4],"for":[5],"biometric":[6,31,37,57,82,130],"template":[7],"protection.":[8],"These":[9],"are":[11,28],"vulnerable":[12],"to":[13,98,102],"different":[14],"types":[15],"of":[16,73,93,126,129],"attacks,":[17],"as":[18],"brute":[19],"force":[20],"attacks":[21,24],"or":[22,41],"correlation":[23],"if":[25],"several":[26],"templates":[27],"compromised.":[29],"Another":[30],"security":[32,125],"issue":[33],"comes":[34],"from":[35],"certain":[36],"data":[38,76],"(as":[39],"fingerprint":[40,112],"face":[42,114],"image)":[43],"that":[44,86,117],"can":[45],"leave":[46],"traces,":[47],"but":[48],"are,":[49],"in":[50,60],"the":[51,54,71,87,94,103,124],"same":[52],"time,":[53],"most":[55],"commonly":[56],"modalities":[58,115],"used":[59],"mobile":[61],"security.":[62],"In":[63],"this":[64,118,127],"paper,":[65],"a":[66,90],"new":[67],"attack":[68],"based":[69],"on":[70,79,123],"alteration":[72],"original":[74],"user":[75,96],"is":[77],"investigated":[78],"fuzzy":[80],"Vault":[81],"cryptosystems.":[83,131],"We":[84],"assume":[85],"attacker":[88],"uses":[89],"modified":[91],"version":[92],"real":[95],"image":[97],"gain":[99],"unauthorized":[100],"access":[101],"system":[104],"(mobile":[105],"phone).":[106],"Experimental":[107],"results":[108],"carried":[109],"out":[110],"using":[111],"and":[113],"show":[116],"assumption":[119],"has":[120],"serious":[121],"impact":[122],"type":[128]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
