{"id":"https://openalex.org/W4414665249","doi":"https://doi.org/10.1145/3769862","title":"Dynamic Privacy-preserving Identity Generation from Fingerprint Sensor Data for Secure Applications","display_name":"Dynamic Privacy-preserving Identity Generation from Fingerprint Sensor Data for Secure Applications","publication_year":2025,"publication_date":"2025-09-30","ids":{"openalex":"https://openalex.org/W4414665249","doi":"https://doi.org/10.1145/3769862"},"language":"en","primary_location":{"id":"doi:10.1145/3769862","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769862","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1145/3769862","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119782157","display_name":"Priyabrata Dash","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Priyabrata Dash","raw_affiliation_strings":["Advanced Technology Development Centre, Indian Institute of Technology Kharagpur","Advanced Technology Development Centre, Indian Institute of Technology Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Advanced Technology Development Centre, Indian Institute of Technology Kharagpur","institution_ids":["https://openalex.org/I145894827"]},{"raw_affiliation_string":"Advanced Technology Development Centre, Indian Institute of Technology Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037212265","display_name":"Fagul Pandey","orcid":"https://orcid.org/0000-0002-3224-8575"},"institutions":[{"id":"https://openalex.org/I1335490905","display_name":"Synopsys (Switzerland)","ror":"https://ror.org/03mb54f81","country_code":"CH","type":"company","lineage":["https://openalex.org/I1335490905","https://openalex.org/I4210088951"]},{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["CH","IN"],"is_corresponding":false,"raw_author_name":"Fagul Pandey","raw_affiliation_strings":["Indian Institute of Technology Kharagpur","Synopsys Inc","Indian Institute of Technology Kharagpur, Kharagpur, India","Synopsys Inc, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur","institution_ids":["https://openalex.org/I145894827"]},{"raw_affiliation_string":"Synopsys Inc","institution_ids":["https://openalex.org/I1335490905"]},{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]},{"raw_affiliation_string":"Synopsys Inc, Bangalore, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066216499","display_name":"Monalisa Sarma","orcid":"https://orcid.org/0000-0001-5645-9716"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]},{"id":"https://openalex.org/I4210119464","display_name":"Quality and Reliability (Greece)","ror":"https://ror.org/02f8mda22","country_code":"GR","type":"company","lineage":["https://openalex.org/I4210119464"]}],"countries":["GR","IN"],"is_corresponding":false,"raw_author_name":"Monalisa Sarma","raw_affiliation_strings":["School of Quality and Reliability, Indian Institute of Technology Kharagpur","School of Quality and Reliability, Indian Institute of Technology Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"School of Quality and Reliability, Indian Institute of Technology Kharagpur","institution_ids":["https://openalex.org/I145894827","https://openalex.org/I4210119464"]},{"raw_affiliation_string":"School of Quality and Reliability, Indian Institute of Technology Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019043360","display_name":"Debasis Samanta","orcid":"https://orcid.org/0000-0002-6104-3771"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debasis Samanta","raw_affiliation_strings":["Computer Science & Engineering, Indian Institute of Technology Kharagpur","Computer Science & Engineering, Indian Institute of Technology Kharagpur, Kharagpur India"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering, Indian Institute of Technology Kharagpur","institution_ids":["https://openalex.org/I145894827"]},{"raw_affiliation_string":"Computer Science & Engineering, Indian Institute of Technology Kharagpur, Kharagpur India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5119782157"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33674524,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":"1","first_page":"1","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.7397000193595886},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5978999733924866},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5394999980926514},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5159000158309937},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5077000260353088},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4758000075817108},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4318999946117401},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.43050000071525574},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.4207000136375427}],"concepts":[{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.7397000193595886},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7383000254631042},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5978999733924866},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5394999980926514},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5159000158309937},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5077000260353088},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49790000915527344},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47589999437332153},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4758000075817108},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4318999946117401},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.43050000071525574},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4207000136375427},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3873000144958496},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.37880000472068787},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.33149999380111694},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.32249999046325684},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.30720001459121704},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.30709999799728394},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30160000920295715},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.28949999809265137},{"id":"https://openalex.org/C74370796","wikidata":"https://www.wikidata.org/wiki/Q15924863","display_name":"Signature recognition","level":3,"score":0.28949999809265137},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.26339998841285706},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3769862","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769862","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3769862","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769862","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W883317252","https://openalex.org/W1596070156","https://openalex.org/W1989602801","https://openalex.org/W1994114533","https://openalex.org/W1998235855","https://openalex.org/W2029672942","https://openalex.org/W2030653598","https://openalex.org/W2047311872","https://openalex.org/W2091221194","https://openalex.org/W2137750714","https://openalex.org/W2169495281","https://openalex.org/W2197125854","https://openalex.org/W2307206303","https://openalex.org/W2571302711","https://openalex.org/W2590565790","https://openalex.org/W2766284463","https://openalex.org/W2770520015","https://openalex.org/W2790797818","https://openalex.org/W2907648650","https://openalex.org/W2912698379","https://openalex.org/W3013893037","https://openalex.org/W3097087387","https://openalex.org/W3098852764","https://openalex.org/W3105562403","https://openalex.org/W3118308103","https://openalex.org/W3128925262","https://openalex.org/W3193280338","https://openalex.org/W4200364420","https://openalex.org/W4212928800","https://openalex.org/W4298143694","https://openalex.org/W4376864439","https://openalex.org/W4386379714"],"related_works":[],"abstract_inverted_index":{"In":[0],"secure":[1,7,181],"sensor-based":[2,182],"applications,":[3],"generating":[4,45],"unique":[5,48,94],"and":[6,14,66,73,80,90,111,123,139,190],"credentials":[8],"is":[9,99],"crucial":[10],"for":[11,23,44,180],"ensuring":[12],"trust":[13],"privacy.":[15],"Traditionally,":[16],"pseudo-random":[17],"number":[18],"generators":[19],"have":[20,125,133,153],"been":[21,134],"used":[22],"this":[24,104],"purpose.":[25],"However,":[26],"biometric":[27,165],"data,":[28],"especially":[29],"fingerprint":[30,51,64,116],"features,":[31],"has":[32],"emerged":[33],"as":[34,185],"a":[35,41,46,57,84,97],"robust":[36],"alternative.":[37],"This":[38],"article":[39],"proposes":[40],"dynamic":[42],"approach":[43,162],"privacy-preserving":[47],"identity":[49,95],"from":[50,62,103,118],"sensor":[52],"data.":[53],"The":[54,130],"method":[55,178],"isolates":[56],"region":[58],"of":[59,120],"interest":[60],"(ROI)":[61],"the":[63,127,161,176],"image":[65],"extracts":[67],"two":[68],"feature":[69,86],"sets:":[70],"minutiae-based":[71],"data":[72,166,187],"texture-based":[74],"information.":[75],"These":[76,173],"features":[77,174],"are":[78],"combined":[79],"optimized":[81],"to":[82,146],"produce":[83],"hybrid":[85],"vector":[87],"containing":[88],"discriminative":[89],"relevant":[91],"attributes.":[92],"A":[93],"(termed":[96],"key)":[98],"then":[100],"dynamically":[101],"generated":[102,131,168],"vector,":[105],"characterized":[106],"by":[107],"reliability,":[108],"revocability,":[109],"unlinkability,":[110],"irreversibility.":[112],"Extensive":[113],"evaluations":[114],"using":[115,137],"images":[117],"sensors":[119],"varying":[121],"quality":[122],"resolution":[124],"demonstrated":[126],"method\u2019s":[128],"robustness.":[129],"identities":[132],"statistically":[135],"validated":[136],"NIST":[138],"Diehard":[140],"test":[141],"suites,":[142],"confirming":[143],"strong":[144],"adherence":[145],"randomness":[147],"requirements.":[148],"Also,":[149],"comprehensive":[150],"security":[151],"analyses":[152],"shown":[154],"resilience":[155],"against":[156],"different":[157],"adversarial":[158],"attacks.":[159],"Notably,":[160],"avoids":[163],"storing":[164],"or":[167],"identities,":[169],"enhancing":[170],"privacy":[171],"protection.":[172],"make":[175],"proposed":[177],"ideal":[179],"applications":[183],"such":[184],"authentication,":[186],"storage":[188],"security,":[189],"digital":[191],"signature":[192],"schemes.":[193]},"counts_by_year":[],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
