{"id":"https://openalex.org/W2766406607","doi":"https://doi.org/10.1145/3144789.3144822","title":"A Privacy-preserving Cancelable Palmprint Template Generation Scheme Using Noise Data","display_name":"A Privacy-preserving Cancelable Palmprint Template Generation Scheme Using Noise Data","publication_year":2017,"publication_date":"2017-07-17","ids":{"openalex":"https://openalex.org/W2766406607","doi":"https://doi.org/10.1145/3144789.3144822","mag":"2766406607"},"language":"en","primary_location":{"id":"doi:10.1145/3144789.3144822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3144789.3144822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Intelligent Information Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101952794","display_name":"Jian Qiu","orcid":"https://orcid.org/0000-0001-7873-0722"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Qiu","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan","institution_ids":["https://openalex.org/I34949971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052917423","display_name":"Hengjian Li","orcid":"https://orcid.org/0000-0002-9702-824X"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hengjian Li","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan","institution_ids":["https://openalex.org/I34949971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101739938","display_name":"Jiwen Dong","orcid":"https://orcid.org/0000-0001-8830-8621"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwen Dong","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan","institution_ids":["https://openalex.org/I34949971"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101504236","display_name":"Guang Feng","orcid":"https://orcid.org/0009-0002-1696-654X"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Feng","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Network based Intelligent Computing, University of Jinan","institution_ids":["https://openalex.org/I34949971"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101952794"],"corresponding_institution_ids":["https://openalex.org/I34949971"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14855447,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6805770397186279},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.64710533618927},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5741881728172302},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5092133283615112},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3642003536224365},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3232680559158325},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2480764091014862},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19668662548065186},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.11116060614585876}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6805770397186279},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.64710533618927},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5741881728172302},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5092133283615112},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3642003536224365},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3232680559158325},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2480764091014862},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19668662548065186},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.11116060614585876},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3144789.3144822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3144789.3144822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Intelligent Information Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1173300035","https://openalex.org/W1493193822","https://openalex.org/W1582233190","https://openalex.org/W1823041771","https://openalex.org/W1968353813","https://openalex.org/W2000947714","https://openalex.org/W2019487368","https://openalex.org/W2023434790","https://openalex.org/W2070899847","https://openalex.org/W2084845841","https://openalex.org/W2106137793","https://openalex.org/W2114214092","https://openalex.org/W2259862790","https://openalex.org/W2268810205","https://openalex.org/W2561675875","https://openalex.org/W2578517905","https://openalex.org/W3112293456"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2105887828","https://openalex.org/W2087240539","https://openalex.org/W4236520801","https://openalex.org/W2122599759","https://openalex.org/W1537234410","https://openalex.org/W1995022398","https://openalex.org/W2114205111","https://openalex.org/W2033914206","https://openalex.org/W2042327336"],"abstract_inverted_index":{"In":[0,98],"order":[1,75],"to":[2,28,76,149,167],"achieve":[3],"more":[4],"secure":[5],"and":[6,36,49,81,88,123,169],"privacy-preserving,":[7],"a":[8,44,160],"new":[9],"method":[10],"of":[11,32,103,139,156,163],"cancelable":[12,56],"palmprint":[13,34,57,96],"template":[14],"generation":[15],"scheme":[16],"using":[17],"noise":[18,84,105,124,164],"data":[19,85,106,141],"is":[20,26,41,47,51,59,91,107,134,142],"proposed.":[21],"Firstly,":[22],"the":[23,30,33,37,55,63,78,83,94,101,113,131,145,150,154],"random":[24,121],"projection":[25,122],"used":[27],"reduce":[29],"dimension":[31,39,69],"image":[35,40,70],"reduced":[38,68],"normalized.":[42,53],"Secondly,":[43],"chaotic":[45,65],"matrix":[46,66],"produced":[48],"it":[50],"also":[52],"Then":[54],"feature":[58],"generated":[60,126],"by":[61],"comparing":[62],"normalized":[64],"with":[67,86,144],"after":[71],"normalization.":[72],"Finally,":[73],"in":[74,127],"enhance":[77],"privacy":[79,170],"protection,":[80],"then":[82],"independent":[87],"identically":[89],"distributed":[90],"added,":[92],"as":[93],"final":[95],"features.":[97],"this":[99],"article,":[100],"algorithm":[102],"adding":[104,159],"analyzed":[108],"theoretically.":[109],"Experimental":[110],"results":[111],"on":[112,153],"Hong":[114],"Kong":[115],"PolyU":[116],"Palmprint":[117],"Database":[118],"verify":[119],"that":[120],"are":[125],"an":[128],"uncomplicated":[129],"way,":[130],"computational":[132],"complexity":[133],"low.":[135],"The":[136],"theoretical":[137],"analysis":[138],"nosie":[140],"consistent":[143],"experimental":[146],"results.":[147],"According":[148],"system":[151],"requirement,":[152],"basis":[155],"guaranteeing":[157],"accuracy,":[158],"certain":[161],"amount":[162],"will":[165],"contribute":[166],"security":[168],"protection.":[171]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
