{"id":"https://openalex.org/W2081481311","doi":"https://doi.org/10.1145/2536853.2536902","title":"Fingerprint Verification through Cloud Computing","display_name":"Fingerprint Verification through Cloud Computing","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2081481311","doi":"https://doi.org/10.1145/2536853.2536902","mag":"2081481311"},"language":"en","primary_location":{"id":"doi:10.1145/2536853.2536902","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2536853.2536902","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of International Conference on Advances in Mobile Computing &amp; Multimedia - MoMM '13","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036023336","display_name":"Fazal Noor","orcid":"https://orcid.org/0000-0002-0096-3435"},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Fazal Noor","raw_affiliation_strings":["Computer Science and Software Engineering Department, University of Hail, Hail, Saudi Arabia 966 551497218"],"affiliations":[{"raw_affiliation_string":"Computer Science and Software Engineering Department, University of Hail, Hail, Saudi Arabia 966 551497218","institution_ids":["https://openalex.org/I4210088963"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067940140","display_name":"Majed Alhaisoni","orcid":"https://orcid.org/0000-0002-0231-6899"},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Majed Alhaisoni","raw_affiliation_strings":["Computer Science and Software Engineering Department, University of Hail, Hail, Saudi Arabia 966 555130209"],"affiliations":[{"raw_affiliation_string":"Computer Science and Software Engineering Department, University of Hail, Hail, Saudi Arabia 966 555130209","institution_ids":["https://openalex.org/I4210088963"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036023336"],"corresponding_institution_ids":["https://openalex.org/I4210088963"],"apc_list":null,"apc_paid":null,"fwci":0.3192,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59165983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"301","last_page":"306"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8220624923706055},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.783363938331604},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.539766788482666},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.530009388923645},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.5209111571311951},{"id":"https://openalex.org/keywords/fingerprint-verification-competition","display_name":"Fingerprint Verification Competition","score":0.4782123267650604},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.4480382800102234},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.4329821467399597},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41770726442337036},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.4117480218410492},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.363547146320343},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.355938196182251},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3372736871242523},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24768131971359253},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21974927186965942},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17962467670440674}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8220624923706055},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.783363938331604},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.539766788482666},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.530009388923645},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.5209111571311951},{"id":"https://openalex.org/C164995936","wikidata":"https://www.wikidata.org/wiki/Q5450283","display_name":"Fingerprint Verification Competition","level":4,"score":0.4782123267650604},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4480382800102234},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4329821467399597},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41770726442337036},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.4117480218410492},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.363547146320343},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.355938196182251},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3372736871242523},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24768131971359253},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21974927186965942},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17962467670440674}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2536853.2536902","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2536853.2536902","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of International Conference on Advances in Mobile Computing &amp; Multimedia - MoMM '13","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320325395","display_name":"University of Hail","ror":"https://ror.org/013w98a82"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W113796674","https://openalex.org/W165460885","https://openalex.org/W182624124","https://openalex.org/W1543080632","https://openalex.org/W1911498302","https://openalex.org/W2030907583","https://openalex.org/W2114804025","https://openalex.org/W2131372145","https://openalex.org/W2138410152","https://openalex.org/W2145611910","https://openalex.org/W2151554945","https://openalex.org/W2156165081","https://openalex.org/W2159053996","https://openalex.org/W2163349370"],"related_works":["https://openalex.org/W2146126086","https://openalex.org/W2399348932","https://openalex.org/W2051294001","https://openalex.org/W2122988758","https://openalex.org/W2187019478","https://openalex.org/W2137512496","https://openalex.org/W2588889495","https://openalex.org/W1502375461","https://openalex.org/W2136721862","https://openalex.org/W2339806289"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"implement":[4],"a":[5],"Parallel":[6],"Distributed":[7],"Phase":[8],"Correlation":[9],"algorithm":[10,19],"for":[11,44,80,83,85,87],"fingerprint":[12],"verification":[13,91],"through":[14],"Cloud":[15,26],"computing":[16],"services.":[17],"The":[18],"is":[20],"proposed":[21],"to":[22,74],"be":[23,75],"hosted":[24],"by":[25],"Computing":[27],"Services":[28],"with":[29],"Quality":[30,35],"of":[31,36,48,89],"Service":[32],"(QoS)":[33],"and":[34,46,51,93],"Protection":[37],"(QoP).":[38],"We":[39],"also":[40],"propose":[41],"128-bit":[42],"encryption":[43],"security":[45],"privacy":[47],"individuals'":[49],"fingerprints":[50],"the":[52,78],"Wavelet":[53],"Scalar":[54],"Quantization":[55],"(WSQ)":[56],"compression":[57],"method.":[58],"Fingerprint":[59],"scanners":[60],"from":[61],"various":[62,90],"manufactures":[63],"have":[64],"different":[65],"specifications":[66],"in":[67],"image":[68,81],"capture":[69],"size,":[70,82],"etc.":[71],"Standards":[72],"need":[73],"set":[76],"on":[77],"specifications,":[79],"storage,":[84],"transmission,":[86],"interoperability":[88],"algorithms,":[92],"protection.":[94]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
