{"id":"https://openalex.org/W2921789223","doi":"https://doi.org/10.1109/tii.2019.2903264","title":"Asymmetrical and Biometric Encrypted Optical Scanning Holography (ABE-OSH)","display_name":"Asymmetrical and Biometric Encrypted Optical Scanning Holography (ABE-OSH)","publication_year":2019,"publication_date":"2019-03-06","ids":{"openalex":"https://openalex.org/W2921789223","doi":"https://doi.org/10.1109/tii.2019.2903264","mag":"2921789223"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2019.2903264","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2019.2903264","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002456113","display_name":"P.W.M. Tsang","orcid":"https://orcid.org/0000-0003-0066-2031"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Peter W. M. Tsang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, City University of Hong Kong, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, City University of Hong Kong, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103497598","display_name":"Aimin Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I21945476","display_name":"Shanghai Normal University","ror":"https://ror.org/01cxqmw89","country_code":"CN","type":"education","lineage":["https://openalex.org/I21945476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aimin Yan","raw_affiliation_strings":["Shanghai Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Normal University, Shanghai, China","institution_ids":["https://openalex.org/I21945476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063569263","display_name":"Ting\u2010Chung Poon","orcid":"https://orcid.org/0000-0002-7070-6856"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ting-Chung Poon","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Virginia Tech, Backsburg, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Virginia Tech, Backsburg, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032731924","display_name":"Hoson Lam","orcid":"https://orcid.org/0000-0002-4388-4593"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hoson Lam","raw_affiliation_strings":["Department of Electrical and Computer Engineering, City University of Hong Kong, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, City University of Hong Kong, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002456113"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":1.0122,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.8023449,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"16","issue":"2","first_page":"1094","last_page":"1101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11408","display_name":"Advanced Optical Imaging Technologies","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8957198858261108},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6871781349182129},{"id":"https://openalex.org/keywords/holography","display_name":"Holography","score":0.6298264265060425},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6032401919364929},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49556052684783936},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.46476683020591736},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.45103156566619873},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44362303614616394},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.348747193813324},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3213549852371216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21393170952796936},{"id":"https://openalex.org/keywords/optics","display_name":"Optics","score":0.1178741455078125},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08708757162094116}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8957198858261108},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6871781349182129},{"id":"https://openalex.org/C187590223","wikidata":"https://www.wikidata.org/wiki/Q527628","display_name":"Holography","level":2,"score":0.6298264265060425},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6032401919364929},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49556052684783936},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.46476683020591736},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.45103156566619873},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44362303614616394},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.348747193813324},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3213549852371216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21393170952796936},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.1178741455078125},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08708757162094116}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2019.2903264","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2019.2903264","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5205830224","display_name":null,"funder_award_id":"61575124","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1983474422","https://openalex.org/W1996360405","https://openalex.org/W2042226614","https://openalex.org/W2043254979","https://openalex.org/W2062128972","https://openalex.org/W2067789087","https://openalex.org/W2068820542","https://openalex.org/W2098772797","https://openalex.org/W2120086177","https://openalex.org/W2121907296","https://openalex.org/W2125286394","https://openalex.org/W2132516411","https://openalex.org/W2145401778","https://openalex.org/W2146360671","https://openalex.org/W2208207611","https://openalex.org/W2231014136","https://openalex.org/W2280018517","https://openalex.org/W2284088842","https://openalex.org/W2294084307","https://openalex.org/W2469883432","https://openalex.org/W2515691705","https://openalex.org/W2538012393","https://openalex.org/W2548298793","https://openalex.org/W2606501931","https://openalex.org/W2757469199","https://openalex.org/W2762466743","https://openalex.org/W2795772271","https://openalex.org/W2895466322","https://openalex.org/W2954889267","https://openalex.org/W4232836212","https://openalex.org/W4241366606","https://openalex.org/W6697127079","https://openalex.org/W6729456096","https://openalex.org/W6736511641"],"related_works":["https://openalex.org/W2389178160","https://openalex.org/W2355986883","https://openalex.org/W2545514196","https://openalex.org/W4245054042","https://openalex.org/W2144246620","https://openalex.org/W2030024189","https://openalex.org/W2564633714","https://openalex.org/W2950229125","https://openalex.org/W3211136635","https://openalex.org/W4361858202"],"abstract_inverted_index":{"In":[0,75,100],"this":[1],"article,":[2],"we":[3,201],"report":[4],"an":[5],"optical":[6],"scanning":[7],"holography":[8],"(OSH)":[9],"system":[10,86],"that":[11,27,176,177],"is":[12,31,55,81,108,123,138,187,198,211],"equipped":[13],"with":[14,110,125,170,206],"biometric":[15,79,97,105,181],"and":[16,42,51,116,146,152,165,174,194],"the":[17,40,59,76,84,89,101,104,117,120,126,131,144,157,180,183,189,195,208],"asymmetrical":[18],"Rivest-Shamir-Adleman":[19],"(RSA)":[20],"encryption.":[21],"Past":[22],"research":[23],"works":[24],"have":[25,161,202],"demonstrated":[26,162,203],"either":[28,179],"encryption":[29,60,80,166,185],"alone":[30],"vulnerable":[32],"to":[33,57,87,130,141,155,213],"certain":[34],"types":[35],"of":[36,91,119,133,167],"attacks":[37],"if":[38],"both":[39,143],"encrypted":[41,98,106,124,147],"source":[43,145],"data":[44,122,148],"are":[45],"available.":[46],"Essentially,":[47],"given":[48],"sufficient":[49],"time":[50],"computation":[52],"power,":[53],"it":[54,137],"possible":[56,140],"deduce":[58],"key":[61,186],"from":[62],"these":[63,134],"two":[64,73,135],"datasets.":[65],"Our":[66],"proposed":[67,172,209],"method":[68],"can":[69],"be":[70,192],"divided":[71],"into":[72,95],"stages.":[74],"first":[77],"stage,":[78,103,151],"incorporated":[82],"in":[83,149],"OSH":[85],"convert":[88],"image":[90,197],"a":[92,96],"physical":[93,168],"object":[94],"hologram.":[99],"second":[102],"hologram":[107,190],"encoded":[109],"differential":[111],"pulse":[112],"code":[113],"modulation":[114],"(DPCM),":[115],"polarity":[118],"DPCM":[121],"RSA":[127,184],"algorithm.":[128],"Due":[129],"cascade":[132],"stages,":[136],"not":[139],"identify":[142],"each":[150],"use":[153],"them":[154],"hack":[156],"decryption":[158],"key.":[159],"We":[160],"fast":[163],"capturing":[164],"objects":[169],"our":[171,204],"method,":[173],"shown":[175],"when":[178],"or":[182],"missing,":[188],"cannot":[191],"recovered":[193],"reconstructed":[196],"incomprehensible.":[199],"While":[200],"idea":[205],"OSH,":[207],"technique":[210],"applicable":[212],"any":[214],"digital":[215],"holographic":[216],"systems.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
