{"id":"https://openalex.org/W3011722241","doi":"https://doi.org/10.1109/wifs47025.2019.9034982","title":"Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification","display_name":"Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3011722241","doi":"https://doi.org/10.1109/wifs47025.2019.9034982","mag":"3011722241"},"language":"en","primary_location":{"id":"doi:10.1109/wifs47025.2019.9034982","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs47025.2019.9034982","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061163098","display_name":"Jascha Kolberg","orcid":"https://orcid.org/0000-0002-3128-8049"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jascha Kolberg","raw_affiliation_strings":["da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053420666","display_name":"Pia Bauspies","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pia Bauspies","raw_affiliation_strings":["da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081957330","display_name":"Marta Gomez\u2010Barrero","orcid":"https://orcid.org/0000-0003-4581-5353"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marta Gomez-Barrero","raw_affiliation_strings":["da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087866084","display_name":"Christian Rathgeb","orcid":"https://orcid.org/0000-0003-1901-9468"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christian Rathgeb","raw_affiliation_strings":["da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110236021","display_name":"Markus D\u00fcrmuth","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus Durmuth","raw_affiliation_strings":["Mobile Security, Ruhr-University Bochum"],"affiliations":[{"raw_affiliation_string":"Mobile Security, Ruhr-University Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017716310","display_name":"Christoph Busch","orcid":"https://orcid.org/0000-0002-9159-2923"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christoph Busch","raw_affiliation_strings":["da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5061163098"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.8244,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.86541058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8267061710357666},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8240058422088623},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7370947599411011},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7158800363540649},{"id":"https://openalex.org/keywords/iris-recognition","display_name":"Iris recognition","score":0.6061729192733765},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5404224991798401},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5217569470405579},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.4981961250305176},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4694870114326477},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37305665016174316},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3325548768043518},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3261716663837433},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28231269121170044},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26068103313446045}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8267061710357666},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8240058422088623},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7370947599411011},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7158800363540649},{"id":"https://openalex.org/C112356035","wikidata":"https://www.wikidata.org/wiki/Q1672722","display_name":"Iris recognition","level":3,"score":0.6061729192733765},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5404224991798401},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5217569470405579},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.4981961250305176},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4694870114326477},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37305665016174316},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3325548768043518},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3261716663837433},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28231269121170044},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26068103313446045},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wifs47025.2019.9034982","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs47025.2019.9034982","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W178227285","https://openalex.org/W1480491915","https://openalex.org/W1491861813","https://openalex.org/W1554153316","https://openalex.org/W1675339804","https://openalex.org/W1945892390","https://openalex.org/W1964194361","https://openalex.org/W1974821667","https://openalex.org/W1985110735","https://openalex.org/W1998798912","https://openalex.org/W2022596562","https://openalex.org/W2054714865","https://openalex.org/W2121956088","https://openalex.org/W2129905915","https://openalex.org/W2144798081","https://openalex.org/W2160242612","https://openalex.org/W2161087606","https://openalex.org/W2465072430","https://openalex.org/W2507096059","https://openalex.org/W2584824687","https://openalex.org/W2949351795","https://openalex.org/W4244370119","https://openalex.org/W4297991408","https://openalex.org/W6607197667","https://openalex.org/W6719631278","https://openalex.org/W6763098245"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W2121300814","https://openalex.org/W2018223046","https://openalex.org/W2294693339","https://openalex.org/W1971649232","https://openalex.org/W2573408845","https://openalex.org/W2774310452","https://openalex.org/W231692020","https://openalex.org/W3092387234","https://openalex.org/W2024700913"],"abstract_inverted_index":{"When":[0],"employing":[1],"biometric":[2,12],"recognition":[3,86],"systems,":[4],"we":[5,72],"have":[6],"to":[7,68,83,97],"take":[8],"into":[9],"account":[10],"that":[11],"data":[13],"are":[14,31,43,95],"considered":[15],"sensitive":[16],"data.":[17],"This":[18,103],"has":[19],"raised":[20],"some":[21],"privacy":[22],"issues,":[23],"and":[24,45],"therefore":[25],"secure":[26],"systems":[27],"providing":[28],"template":[29,119],"protection":[30,37,120],"required.":[32],"Using":[33],"homomorphic":[34],"encryption,":[35],"permanent":[36],"can":[38],"be":[39],"ensured,":[40],"since":[41],"templates":[42],"stored":[44],"compared":[46],"in":[47,121,128,132],"the":[48,53,61,64,69,85,88,93,98,101,111,115,129,135,143],"encrypted":[49],"domain.":[50],"In":[51,81],"addition,":[52],"unprotected":[54],"system's":[55],"accuracy":[56],"is":[57],"preserved.":[58],"To":[59],"solve":[60],"problem":[62],"of":[63,92,100],"computational":[65],"overload":[66],"linked":[67],"encryption":[70],"scheme,":[71],"present":[73],"an":[74,105],"early":[75],"decision":[76],"making":[77],"strategy":[78],"for":[79],"iris-codes.":[80],"order":[82],"improve":[84],"accuracy,":[87],"most":[89],"consistent":[90],"bits":[91],"iris-code":[94],"moved":[96],"beginning":[99],"template.":[102],"allows":[104],"accurate":[106],"block-wise":[107,136],"comparison,":[108],"thereby":[109],"reducing":[110],"execution":[112],"time.":[113],"Hence,":[114],"resulting":[116],"system":[117],"grants":[118],"a":[122,139],"computationally":[123],"efficient":[124],"way.":[125],"More":[126],"specifically,":[127],"experimental":[130],"evaluation":[131],"identification":[133],"mode,":[134],"comparison":[137],"achieves":[138],"92%":[140],"speed-up":[141],"on":[142],"IITD":[144],"database":[145],"with":[146],"300":[147],"enrolled":[148],"templates.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
