{"id":"https://openalex.org/W2478226929","doi":"https://doi.org/10.1145/2930669","title":"FE-SViT","display_name":"FE-SViT","publication_year":2016,"publication_date":"2016-08-02","ids":{"openalex":"https://openalex.org/W2478226929","doi":"https://doi.org/10.1145/2930669","mag":"2478226929"},"language":"en","primary_location":{"id":"doi:10.1145/2930669","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2930669","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://handle.unsw.edu.au/1959.4/unsworks_46823","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091725820","display_name":"Kai Xi","orcid":"https://orcid.org/0009-0008-5251-2274"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Kai Xi","raw_affiliation_strings":["Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["University of New South Wales, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Canberra, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055345322","display_name":"B. V. K. Vijaya Kumar","orcid":"https://orcid.org/0000-0001-7126-6381"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"B. V. K. Vijaya Kumar","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091725820"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":null,"apc_paid":null,"fwci":0.2522,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.51947124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"15","issue":"4","first_page":"1","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9688000082969666,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8428287506103516},{"id":"https://openalex.org/keywords/parallelizable-manifold","display_name":"Parallelizable manifold","score":0.7420890927314758},{"id":"https://openalex.org/keywords/minutiae","display_name":"Minutiae","score":0.6440178155899048},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5894038677215576},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5616804361343384},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5222326517105103},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.47900742292404175},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4372294843196869},{"id":"https://openalex.org/keywords/vertex","display_name":"Vertex (graph theory)","score":0.4190012514591217},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3989768624305725},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.3950819969177246},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.38827550411224365},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36355841159820557},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32926639914512634},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.2705252170562744},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2688654959201813},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15697813034057617},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.13100329041481018}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8428287506103516},{"id":"https://openalex.org/C148047603","wikidata":"https://www.wikidata.org/wiki/Q1014612","display_name":"Parallelizable manifold","level":2,"score":0.7420890927314758},{"id":"https://openalex.org/C67174900","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Minutiae","level":4,"score":0.6440178155899048},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5894038677215576},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5616804361343384},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5222326517105103},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.47900742292404175},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4372294843196869},{"id":"https://openalex.org/C80899671","wikidata":"https://www.wikidata.org/wiki/Q1304193","display_name":"Vertex (graph theory)","level":3,"score":0.4190012514591217},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3989768624305725},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.3950819969177246},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.38827550411224365},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36355841159820557},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32926639914512634},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2705252170562744},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2688654959201813},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15697813034057617},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.13100329041481018}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2930669","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2930669","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},{"id":"pmh:oai:unsworks.unsw.edu.au:1959.4/unsworks_46823","is_oa":true,"landing_page_url":"http://handle.unsw.edu.au/1959.4/unsworks_46823","pdf_url":null,"source":{"id":"https://openalex.org/S4377196481","display_name":"UNSWorks (UNSW Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31746571","host_organization_name":"UNSW Sydney","host_organization_lineage":["https://openalex.org/I31746571"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/unsworks_46823","is_oa":true,"landing_page_url":"http://hdl.handle.net/1959.4/unsworks_46823","pdf_url":null,"source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM Transactions on Embedded Computing Systems, 15, 4, 1-24","raw_type":"http://purl.org/coar/resource_type/c_6501"}],"best_oa_location":{"id":"pmh:oai:unsworks.unsw.edu.au:1959.4/unsworks_46823","is_oa":true,"landing_page_url":"http://handle.unsw.edu.au/1959.4/unsworks_46823","pdf_url":null,"source":{"id":"https://openalex.org/S4377196481","display_name":"UNSWorks (UNSW Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31746571","host_organization_name":"UNSW Sydney","host_organization_lineage":["https://openalex.org/I31746571"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/14","display_name":"Life below water"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1519351129","https://openalex.org/W1542110294","https://openalex.org/W1547249794","https://openalex.org/W1589647164","https://openalex.org/W1639795441","https://openalex.org/W1900213973","https://openalex.org/W1975172169","https://openalex.org/W1989602801","https://openalex.org/W1994114533","https://openalex.org/W1998235855","https://openalex.org/W2014061207","https://openalex.org/W2027344419","https://openalex.org/W2030433289","https://openalex.org/W2035092087","https://openalex.org/W2063355793","https://openalex.org/W2069726237","https://openalex.org/W2074078450","https://openalex.org/W2097507545","https://openalex.org/W2106137793","https://openalex.org/W2110401929","https://openalex.org/W2110765466","https://openalex.org/W2111251300","https://openalex.org/W2123194256","https://openalex.org/W2125587922","https://openalex.org/W2135220659","https://openalex.org/W2137750714","https://openalex.org/W2140371390","https://openalex.org/W2144596760","https://openalex.org/W2145262111","https://openalex.org/W2146813141","https://openalex.org/W2150207142","https://openalex.org/W2150250664","https://openalex.org/W2161239015","https://openalex.org/W2187498142","https://openalex.org/W2536220535","https://openalex.org/W2921511979","https://openalex.org/W4230579564","https://openalex.org/W4237304100","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2566091814","https://openalex.org/W1540357037","https://openalex.org/W2020992254","https://openalex.org/W2565799042","https://openalex.org/W2122988758","https://openalex.org/W2126450185","https://openalex.org/W3169072271","https://openalex.org/W2082047178","https://openalex.org/W2136721862","https://openalex.org/W1981872252"],"abstract_inverted_index":{"As":[0],"a":[1,47,70],"promising":[2],"bio-cryptographic":[3],"technique,":[4],"the":[5,25],"fuzzy":[6,72],"extractor":[7,73],"seamlessly":[8],"binds":[9],"biometrics":[10],"and":[11,16,38,78,89],"cryptography":[12],"for":[13,95],"template":[14],"protection":[15],"key":[17],"generation.":[18],"However,":[19],"most":[20],"existing":[21],"methods":[22],"hardly":[23],"solve":[24],"following":[26],"issues":[27],"simultaneously:":[28],"(1)":[29],"Fingerprint":[30],"registration,":[31],"(2)":[32],"Verification":[33],"accuracy,":[34],"(3)":[35],"Security":[36],"strength,":[37],"(4)":[39],"Computational":[40],"efficiency.":[41],"In":[42],"this":[43],"article,":[44],"we":[45],"introduce":[46],"bio-crypto-oriented":[48],"fingerprint":[49],"verification":[50,80],"scheme":[51],"-":[52],"Selective":[53],"Vertex-indexed":[54],"Triangulation":[55],"(SViT)":[56],"which":[57,91],"maps":[58],"minutia":[59],"global":[60],"topology":[61],"to":[62],"local":[63],"triangulation":[64],"with":[65],"minimum":[66],"information":[67],"loss.":[68],"Then,":[69],"SViT-based":[71],"framework":[74],"(FE-SViT)":[75],"is":[76,82,86],"proposed":[77],"high":[79],"accuracy":[81],"achieved.":[83],"The":[84],"FE-SViT":[85],"highly":[87],"parallelizable":[88],"efficient":[90],"makes":[92],"it":[93],"suitable":[94],"embedded":[96],"devices.":[97]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-08-23T00:00:00"}
