{"id":"https://openalex.org/W4392255482","doi":"https://doi.org/10.1145/3637732.3637777","title":"Advanced Research on High-security-level Error-correction-based Iris Recognition System","display_name":"Advanced Research on High-security-level Error-correction-based Iris Recognition System","publication_year":2023,"publication_date":"2023-11-09","ids":{"openalex":"https://openalex.org/W4392255482","doi":"https://doi.org/10.1145/3637732.3637777"},"language":"en","primary_location":{"id":"doi:10.1145/3637732.3637777","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3637732.3637777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 10th International Conference on Biomedical and Bioinformatics Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054844662","display_name":"Kuo-Chun Lin","orcid":"https://orcid.org/0000-0002-1914-1511"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Kuo-Chun Lin","raw_affiliation_strings":["Institute of Communications Engineering, National Sun Yat-sen University, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-1914-1511","affiliations":[{"raw_affiliation_string":"Institute of Communications Engineering, National Sun Yat-sen University, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101675209","display_name":"Yen\u2010Ming Chen","orcid":"https://orcid.org/0000-0002-0786-3314"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yen-Ming Chen","raw_affiliation_strings":["Institute of Communications Engineering, National Sun Yat-sen University, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-0786-3314","affiliations":[{"raw_affiliation_string":"Institute of Communications Engineering, National Sun Yat-sen University, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054844662"],"corresponding_institution_ids":["https://openalex.org/I142974352"],"apc_list":null,"apc_paid":null,"fwci":0.1919,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49823584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"59","last_page":"66"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13192","display_name":"Forensic Fingerprint Detection Methods","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8105087876319885},{"id":"https://openalex.org/keywords/iris-recognition","display_name":"Iris recognition","score":0.7906811237335205},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.693185567855835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5746544599533081},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5392310619354248},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5341934561729431},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.510162353515625},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.48354673385620117},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.46997588872909546},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3217623233795166},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24995145201683044},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2489004135131836},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07368671894073486}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8105087876319885},{"id":"https://openalex.org/C112356035","wikidata":"https://www.wikidata.org/wiki/Q1672722","display_name":"Iris recognition","level":3,"score":0.7906811237335205},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.693185567855835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5746544599533081},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5392310619354248},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5341934561729431},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.510162353515625},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.48354673385620117},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.46997588872909546},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3217623233795166},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24995145201683044},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2489004135131836},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07368671894073486},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3637732.3637777","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3637732.3637777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 10th International Conference on Biomedical and Bioinformatics Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1516512487","https://openalex.org/W1974821667","https://openalex.org/W1985103528","https://openalex.org/W1985110735","https://openalex.org/W1991266632","https://openalex.org/W2021773817","https://openalex.org/W2022596562","https://openalex.org/W2025546194","https://openalex.org/W2029672942","https://openalex.org/W2040310339","https://openalex.org/W2104553965","https://openalex.org/W2114024372","https://openalex.org/W2121738109","https://openalex.org/W2124386111","https://openalex.org/W2129905915","https://openalex.org/W2146112636","https://openalex.org/W2149064334","https://openalex.org/W2149999708","https://openalex.org/W2152726786","https://openalex.org/W2165831888","https://openalex.org/W2171431911","https://openalex.org/W2171759622","https://openalex.org/W2187810150","https://openalex.org/W2552409694","https://openalex.org/W2598222294","https://openalex.org/W2760476150","https://openalex.org/W2762129651","https://openalex.org/W2789499556","https://openalex.org/W2800426337","https://openalex.org/W2803865709","https://openalex.org/W2895705849","https://openalex.org/W2924606157","https://openalex.org/W2999890098","https://openalex.org/W3105562403","https://openalex.org/W3160027900","https://openalex.org/W4382203467","https://openalex.org/W4385577107","https://openalex.org/W6658858456","https://openalex.org/W6681909610","https://openalex.org/W6683436568","https://openalex.org/W6757126528","https://openalex.org/W6781032069"],"related_works":["https://openalex.org/W2018223046","https://openalex.org/W2294693339","https://openalex.org/W1971649232","https://openalex.org/W2573408845","https://openalex.org/W2774310452","https://openalex.org/W231692020","https://openalex.org/W3092387234","https://openalex.org/W2024700913","https://openalex.org/W2588548263","https://openalex.org/W2135013219"],"abstract_inverted_index":{"Over":[0],"recent":[1],"years,":[2],"biometric":[3],"systems":[4,18],"have":[5],"been":[6,128],"popularly":[7],"applied":[8],"in":[9],"various":[10],"scenarios.":[11],"Unfortunately,":[12],"potential":[13],"threats":[14],"associated":[15],"with":[16,87],"these":[17],"may":[19],"lead":[20],"to":[21,28,48,92,115],"significant":[22],"social":[23],"concerns":[24],"and":[25,149],"pose":[26],"risks":[27],"security.":[29],"In":[30],"this":[31,105],"paper,":[32],"an":[33,67,150],"error-correction-based":[34,58],"iris":[35,121],"recognition":[36,152],"(EC-IR)":[37],"scheme":[38,135],"which":[39],"uses":[40],"multi-scale":[41],"dominating":[42],"feature":[43],"points":[44],"(msDFPs)":[45],"is":[46,69,113],"produced":[47],"improve":[49,98],"the":[50,73,76,82,93,99,107,111,117,131],"security":[51,102,147],"level":[52],"against":[53],"a":[54,124,137,143],"stricter":[55],"concern":[56],"of":[57,75,101,110,119,146],"attack.":[59,96],"The":[60],"EC-based":[61],"attack":[62],"can":[63,84],"be":[64,85],"initiated":[65],"if":[66],"attacker":[68],"thoroughly":[70],"knowledgeable":[71],"about":[72],"structure":[74],"adopted":[77],"error":[78],"correcting":[79],"code.":[80],"Hence,":[81],"system":[83],"compromised":[86],"much":[88],"fewer":[89],"attempts":[90],"compared":[91],"brute":[94],"force":[95],"To":[97],"number":[100],"bits":[103,148],"under":[104],"attack,":[106],"extraction":[108],"method":[109],"msDFPs":[112],"proposed":[114,132],"modify":[116],"essence":[118],"original":[120],"data.":[122],"As":[123],"result,":[125],"it":[126],"has":[127],"demonstrated":[129],"that":[130,140],"msDFPs-based":[133],"EC-IR":[134],"provides":[136],"well-balanced":[138],"design":[139],"ensures":[141],"both":[142],"large":[144],"value":[145],"optimized":[151],"performance.":[153]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
