{"id":"https://openalex.org/W2613717821","doi":"https://doi.org/10.1145/3092816","title":"Texture to the Rescue","display_name":"Texture to the Rescue","publication_year":2017,"publication_date":"2017-08-11","ids":{"openalex":"https://openalex.org/W2613717821","doi":"https://doi.org/10.1145/3092816","mag":"2613717821"},"language":"en","primary_location":{"id":"doi:10.1145/3092816","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3092816","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprints.whiterose.ac.uk/116192/1/1705.02510.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029147151","display_name":"Ehsan Toreini","orcid":"https://orcid.org/0000-0002-5172-2957"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ehsan Toreini","raw_affiliation_strings":["Newcastle University, Newcastle upon Tyne, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Newcastle University, Newcastle upon Tyne, United Kingdom","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056489873","display_name":"Siamak F. Shahandashti","orcid":"https://orcid.org/0000-0002-5284-6847"},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Siamak F. Shahandashti","raw_affiliation_strings":["University of York, York, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of York, York, United Kingdom","institution_ids":["https://openalex.org/I52099693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100611635","display_name":"Feng Hao","orcid":"https://orcid.org/0000-0002-8664-5074"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Feng Hao","raw_affiliation_strings":["Newcastle University, Newcastle upon Tyne, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Newcastle University, Newcastle upon Tyne, United Kingdom","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029147151"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":1.1095,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.78279169,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"20","issue":"3","first_page":"1","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7591232061386108},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7507979869842529},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.5713105201721191},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5695421695709229},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5362346172332764},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5361478328704834},{"id":"https://openalex.org/keywords/interleaving","display_name":"Interleaving","score":0.530236005783081},{"id":"https://openalex.org/keywords/texture","display_name":"Texture (cosmology)","score":0.5119851231575012},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4979877471923828},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44174331426620483},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.410905659198761},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.34078124165534973},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.20617184042930603},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1773597002029419},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15672752261161804}],"concepts":[{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7591232061386108},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7507979869842529},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.5713105201721191},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5695421695709229},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5362346172332764},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5361478328704834},{"id":"https://openalex.org/C28034677","wikidata":"https://www.wikidata.org/wiki/Q17092530","display_name":"Interleaving","level":2,"score":0.530236005783081},{"id":"https://openalex.org/C2781195486","wikidata":"https://www.wikidata.org/wiki/Q289436","display_name":"Texture (cosmology)","level":3,"score":0.5119851231575012},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4979877471923828},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44174331426620483},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.410905659198761},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.34078124165534973},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.20617184042930603},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1773597002029419},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15672752261161804},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3092816","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3092816","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},{"id":"pmh:oai:wrap.warwick.ac.uk:111568","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:eprints.whiterose.ac.uk:116192","is_oa":true,"landing_page_url":"https://orcid.org/0000-0002-5284-6847>","pdf_url":"https://eprints.whiterose.ac.uk/116192/1/1705.02510.pdf","source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:durham-repository.worktribe.com:1291937","is_oa":false,"landing_page_url":"https://durham-repository.worktribe.com/output/1291937","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:eprints.whiterose.ac.uk:116192","is_oa":true,"landing_page_url":"https://orcid.org/0000-0002-5284-6847>","pdf_url":"https://eprints.whiterose.ac.uk/116192/1/1705.02510.pdf","source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2613717821.pdf"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W42037993","https://openalex.org/W178487800","https://openalex.org/W1485497075","https://openalex.org/W1530255708","https://openalex.org/W1558882078","https://openalex.org/W1974821667","https://openalex.org/W1976609088","https://openalex.org/W1980073965","https://openalex.org/W1981925673","https://openalex.org/W1983754865","https://openalex.org/W2005055373","https://openalex.org/W2006500012","https://openalex.org/W2031951895","https://openalex.org/W2032551902","https://openalex.org/W2071315556","https://openalex.org/W2072306277","https://openalex.org/W2073808537","https://openalex.org/W2077230361","https://openalex.org/W2086936614","https://openalex.org/W2092988036","https://openalex.org/W2102796633","https://openalex.org/W2108272946","https://openalex.org/W2129236194","https://openalex.org/W2133059825","https://openalex.org/W2149098690","https://openalex.org/W2149750701","https://openalex.org/W2165731615","https://openalex.org/W2165831888","https://openalex.org/W2169212403","https://openalex.org/W2289458927","https://openalex.org/W2342204193","https://openalex.org/W2465567107","https://openalex.org/W2483049553","https://openalex.org/W2490257335","https://openalex.org/W4243143616","https://openalex.org/W4250932520"],"related_works":["https://openalex.org/W1988155854","https://openalex.org/W3014822659","https://openalex.org/W2117826006","https://openalex.org/W4362496757","https://openalex.org/W1621827506","https://openalex.org/W2566091814","https://openalex.org/W4205397417","https://openalex.org/W2114937328","https://openalex.org/W2148654711","https://openalex.org/W4308654646"],"abstract_inverted_index":{"In":[0],"this":[1,69],"article,":[2],"we":[3,124,148],"propose":[4],"a":[5,18,55,61,132],"novel":[6],"paper":[7,83,87,118,129],"fingerprinting":[8,82,137],"technique":[9],"based":[10,84,222],"on":[11,81,85,140,144,223],"analyzing":[12],"the":[13,23,28,35,42,86,93,97,106,117,127,141,145,176,184,215],"translucent":[14],"patterns":[15,26,49],"revealed":[16],"when":[17],"light":[19],"source":[20,135],"shines":[21],"through":[22],"paper.":[24],"These":[25],"represent":[27],"inherent":[29],"texture":[30,130],"of":[31,38,111,168,187,193,214],"paper,":[32],"formed":[33],"by":[34,54,92],"random":[36,109],"interleaving":[37],"wooden":[39],"particles":[40],"during":[41],"manufacturing":[43],"process.":[44],"We":[45,89,158],"show":[46],"that":[47,95,126,161],"these":[48],"can":[50],"be":[51],"easily":[52],"captured":[53],"commodity":[56],"camera":[57],"and":[58,113,153],"condensed":[59],"into":[60],"compact":[62],"2,048-bit":[63],"fingerprint":[64,217],"code.":[65],"Prominent":[66],"works":[67],"in":[68,116,218],"area":[70],"(Nature":[71],"2005,":[72],"IEEE":[73],"S8P":[74],"2009,":[75],"CCS":[76],"2011)":[77],"have":[78,183],"all":[79],"focused":[80],"\u201csurface.\u201d":[88],"are":[90],"motivated":[91],"observation":[94],"capturing":[96],"surface":[98],"alone":[99],"misses":[100],"important":[101],"distinctive":[102],"features":[103,139],"such":[104],"as":[105],"noneven":[107],"thickness,":[108],"distribution":[110],"impurities,":[112],"different":[114],"materials":[115],"with":[119,179],"varying":[120],"opacities.":[121],"Through":[122],"experiments,":[123],"demonstrate":[125],"embedded":[128],"provides":[131],"more":[133],"reliable":[134],"for":[136,195,203],"than":[138,175],"surface.":[142],"Based":[143],"collected":[146],"datasets,":[147],"achieve":[149],"0%":[150,154],"false":[151,155],"rejection":[152],"acceptance":[156],"rates.":[157],"further":[159],"report":[160],"our":[162,199],"extracted":[163,216],"fingerprints":[164,197],"contain":[165],"807":[166],"degrees":[167],"freedom":[169],"(DoF),":[170],"which":[171],"is":[172],"much":[173],"higher":[174],"249":[177],"DoF":[178,194],"iris":[180],"codes":[181],"(that":[182],"same":[185],"size":[186],"2,048":[188],"bits).":[189],"The":[190],"high":[191],"amount":[192],"texture-based":[196],"makes":[198],"method":[200],"extremely":[201],"scalable":[202],"recognition":[204],"among":[205],"very":[206],"large":[207],"databases;":[208],"it":[209],"also":[210],"allows":[211],"secure":[212],"usage":[213],"privacy-preserving":[219],"authentication":[220],"schemes":[221],"error":[224],"correction":[225],"techniques.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
