{"id":"https://openalex.org/W2010135280","doi":"https://doi.org/10.1145/1128817.1128845","title":"Finding the original point set hidden among chaff","display_name":"Finding the original point set hidden among chaff","publication_year":2006,"publication_date":"2006-03-21","ids":{"openalex":"https://openalex.org/W2010135280","doi":"https://doi.org/10.1145/1128817.1128845","mag":"2010135280"},"language":"en","primary_location":{"id":"doi:10.1145/1128817.1128845","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105408906","display_name":"Ee\u2010Chien Chang","orcid":"https://orcid.org/0000-0003-4613-0866"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Ee-Chien Chang","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100844867","display_name":"Shen Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ren Shen","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001079500","display_name":"Francis Weijian Teo","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Francis Weijian Teo","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5105408906"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":7.0931,"has_fulltext":false,"cited_by_count":98,"citation_normalized_percentile":{"value":0.97561508,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"182","last_page":"188"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13192","display_name":"Forensic Fingerprint Detection Methods","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/minutiae","display_name":"Minutiae","score":0.8189989328384399},{"id":"https://openalex.org/keywords/chaff","display_name":"Chaff","score":0.7022910118103027},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6812605857849121},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.551383376121521},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5140188932418823},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5103885531425476},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5098406672477722},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4572567045688629},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.45684659481048584},{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.42547816038131714},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3521338999271393},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34996306896209717},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3384295701980591},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3148934841156006},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.22884207963943481}],"concepts":[{"id":"https://openalex.org/C67174900","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Minutiae","level":4,"score":0.8189989328384399},{"id":"https://openalex.org/C78573896","wikidata":"https://www.wikidata.org/wiki/Q30470787","display_name":"Chaff","level":2,"score":0.7022910118103027},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6812605857849121},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.551383376121521},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5140188932418823},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5103885531425476},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5098406672477722},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4572567045688629},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.45684659481048584},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.42547816038131714},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3521338999271393},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34996306896209717},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3384295701980591},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3148934841156006},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.22884207963943481},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1128817.1128845","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarbank.nus.edu.sg:10635/40134","is_oa":false,"landing_page_url":"http://scholarbank.nus.edu.sg/handle/10635/40134","pdf_url":null,"source":{"id":"https://openalex.org/S7407052290","display_name":"National University of Singapore","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus","raw_type":""},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.66.5049","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.5049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.comp.nus.edu.sg/~changec/publications/2006_ASIACCS.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W14320823","https://openalex.org/W1606443045","https://openalex.org/W1639795441","https://openalex.org/W2032551902","https://openalex.org/W2061310300","https://openalex.org/W2100925693","https://openalex.org/W2138474025","https://openalex.org/W2144596760","https://openalex.org/W2165367855","https://openalex.org/W2570008916","https://openalex.org/W2947000318","https://openalex.org/W3160027900","https://openalex.org/W4241168046","https://openalex.org/W7062114214"],"related_works":["https://openalex.org/W2128907997","https://openalex.org/W1981872252","https://openalex.org/W1540357037","https://openalex.org/W2124627279","https://openalex.org/W2565799042","https://openalex.org/W2082047178","https://openalex.org/W2107624769","https://openalex.org/W2363916701","https://openalex.org/W3037288134","https://openalex.org/W3203463822"],"abstract_inverted_index":{"In":[0,154],"biometric":[1],"identification,":[2],"a":[3,9,98,164,220],"fingerprint":[4,23],"is":[5,61,95,101,199],"typically":[6],"represented":[7],"as":[8,33],"set":[10],"of":[11,70,81,88,106,137,151,196,224,236],"minutiae":[12,27,125,169],"which":[13,161],"are":[14,43,54,126],"2D":[15],"points.":[16],"A":[17],"method":[18],"[4]":[19],"to":[20,56,63,103,111,119,147,163,166,201,218,241],"protect":[21],"the":[22,26,36,48,77,85,92,113,124,131,135,141,149,152,168,171,181,194,216,237,242],"template":[24,79,227],"hides":[25],"by":[28,47,140],"adding":[29],"random":[30],"points":[31,42,53,66,71,90,94,198],"(known":[32],"chaff)":[34],"into":[35],"original":[37,78,93,182],"point":[38],"set.":[39],"The":[40,115],"chaff":[41,89,116,197],"added":[44],"one-by-one,":[45],"constrained":[46],"requirement":[49],"that":[50,176],"no":[51],"two":[52],"close":[55],"each":[57],"other,":[58],"until":[59],"it":[60],"impossible":[62],"add":[64],"more":[65,221],"or":[67],"sufficient":[68],"number":[69,87,136,195],"have":[72],"been":[73,145],"added.":[74],"Therefore,":[75],"if":[76,123],"consists":[80],"s":[82,109,190],"points,":[83],"and":[84,91,193],"total":[86],"m,":[96],"then":[97],"brute-force":[99,142,185],"attacker":[100,143,178,206],"expected":[102,200],"examine":[104],"half":[105],"m":[107],"chooses":[108],"possibilities":[110],"find":[112,180],"original.":[114],"generated":[117,129],"seem":[118],"be":[120,202],"\"random\",":[121],"especially":[122],"also":[127,230],"randomly":[128],"in":[130],"same":[132],"manner.":[133],"Indeed,":[134],"searches":[138],"required":[139],"has":[144],"used":[146],"measure":[148],"security":[150,225],"method.":[153],"this":[155],"paper,":[156],"we":[157],"give":[158,231],"an":[159,232],"observation":[160],"leads":[162],"way":[165],"distinguish":[167],"from":[170],"chaff.":[172],"Extensive":[173],"simulations":[174],"show":[175],"our":[177,205],"can":[179],"better":[183],"than":[184],"search.":[186],"For":[187],"e.g.":[188],"when":[189],"=":[191],"1":[192],"about":[203,210],"313,":[204],"on":[207],"average":[208],"takes":[209],"100":[211],"searches.":[212],"Our":[213],"results":[214],"highlight":[215],"need":[217],"adopt":[219],"rigorous":[222],"notion":[223],"for":[226],"protection.":[228],"We":[229],"empirical":[233],"lower":[234],"bound":[235],"entropy":[238],"loss":[239],"due":[240],"sketch.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":13},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":20}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
