{"id":"https://openalex.org/W4228996784","doi":"https://doi.org/10.1186/s13635-022-00129-6","title":"On the methodology of fingerprint template protection schemes conception : meditations on the reliability","display_name":"On the methodology of fingerprint template protection schemes conception : meditations on the reliability","publication_year":2022,"publication_date":"2022-03-25","ids":{"openalex":"https://openalex.org/W4228996784","doi":"https://doi.org/10.1186/s13635-022-00129-6"},"language":"en","primary_location":{"id":"doi:10.1186/s13635-022-00129-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-022-00129-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-022-00129-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-022-00129-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088753121","display_name":"Ayoub Lahmidi","orcid":"https://orcid.org/0000-0002-3593-5944"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Ayoub Lahmidi","raw_affiliation_strings":["LRIT Laboratory, associated unit to CNRST (URAC29), IT Rabat Center, Faculty of Sciences, Mohammed V University, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"LRIT Laboratory, associated unit to CNRST (URAC29), IT Rabat Center, Faculty of Sciences, Mohammed V University, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002881908","display_name":"Chouaib Moujahdi","orcid":"https://orcid.org/0000-0001-6658-5441"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Chouaib Moujahdi","raw_affiliation_strings":["Scientific Institute, Mohammed V University, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"Scientific Institute, Mohammed V University, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058132072","display_name":"Khalid Minaoui","orcid":"https://orcid.org/0000-0002-3918-8552"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalid Minaoui","raw_affiliation_strings":["LRIT Laboratory, associated unit to CNRST (URAC29), IT Rabat Center, Faculty of Sciences, Mohammed V University, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"LRIT Laboratory, associated unit to CNRST (URAC29), IT Rabat Center, Faculty of Sciences, Mohammed V University, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029438807","display_name":"Mohammed Rziza","orcid":"https://orcid.org/0000-0003-4974-5903"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed Rziza","raw_affiliation_strings":["LRIT Laboratory, associated unit to CNRST (URAC29), IT Rabat Center, Faculty of Sciences, Mohammed V University, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"LRIT Laboratory, associated unit to CNRST (URAC29), IT Rabat Center, Faculty of Sciences, Mohammed V University, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088753121"],"corresponding_institution_ids":["https://openalex.org/I126477371"],"apc_list":{"value":660,"currency":"GBP","value_usd":809},"apc_paid":{"value":660,"currency":"GBP","value_usd":809},"fwci":2.2367,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.87638947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"2022","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12009","display_name":"Hedgehog Signaling Pathway Studies","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8690133094787598},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.8119291067123413},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6657894253730774},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6079280376434326},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5740853548049927},{"id":"https://openalex.org/keywords/minutiae","display_name":"Minutiae","score":0.5602876543998718},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.5146740078926086},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4770640432834625},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.47667765617370605},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4472254514694214},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.4352509081363678},{"id":"https://openalex.org/keywords/fingerprint-verification-competition","display_name":"Fingerprint Verification Competition","score":0.41839566826820374},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.3830839991569519},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35068562626838684}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8690133094787598},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.8119291067123413},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6657894253730774},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6079280376434326},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5740853548049927},{"id":"https://openalex.org/C67174900","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Minutiae","level":4,"score":0.5602876543998718},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.5146740078926086},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4770640432834625},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.47667765617370605},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4472254514694214},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.4352509081363678},{"id":"https://openalex.org/C164995936","wikidata":"https://www.wikidata.org/wiki/Q5450283","display_name":"Fingerprint Verification Competition","level":4,"score":0.41839566826820374},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.3830839991569519},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35068562626838684},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13635-022-00129-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-022-00129-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-022-00129-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:43918d217017422fb2baa69272467eaf","is_oa":true,"landing_page_url":"https://doaj.org/article/43918d217017422fb2baa69272467eaf","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Information Security, Vol 2022, Iss 1, Pp 1-13 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13635-022-00129-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-022-00129-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-022-00129-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4228996784.pdf","grobid_xml":"https://content.openalex.org/works/W4228996784.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W86398923","https://openalex.org/W1485607686","https://openalex.org/W1486791786","https://openalex.org/W1490122681","https://openalex.org/W1963765109","https://openalex.org/W1989602801","https://openalex.org/W2005399687","https://openalex.org/W2014297961","https://openalex.org/W2032102966","https://openalex.org/W2035092087","https://openalex.org/W2050955476","https://openalex.org/W2057711921","https://openalex.org/W2062003616","https://openalex.org/W2063355793","https://openalex.org/W2074078450","https://openalex.org/W2097941081","https://openalex.org/W2100355289","https://openalex.org/W2106137793","https://openalex.org/W2114024372","https://openalex.org/W2117698047","https://openalex.org/W2118944716","https://openalex.org/W2125587922","https://openalex.org/W2145262111","https://openalex.org/W2146112636","https://openalex.org/W2146813141","https://openalex.org/W2160367574","https://openalex.org/W2166011144","https://openalex.org/W2166409200","https://openalex.org/W2315893942","https://openalex.org/W2485532734","https://openalex.org/W2797753993","https://openalex.org/W2806469009","https://openalex.org/W2889606499","https://openalex.org/W2912487318","https://openalex.org/W2914248317","https://openalex.org/W2929885558","https://openalex.org/W2990776054","https://openalex.org/W2997017393","https://openalex.org/W4230579564"],"related_works":["https://openalex.org/W2122988758","https://openalex.org/W2136721862","https://openalex.org/W1540357037","https://openalex.org/W3141678744","https://openalex.org/W2566091814","https://openalex.org/W3169072271","https://openalex.org/W2037502770","https://openalex.org/W2004286807","https://openalex.org/W2592489922","https://openalex.org/W2565799042"],"abstract_inverted_index":{"Abstract":[0],"Among":[1],"the":[2,15,29,80,85,88,110,133,191,195],"most":[3],"major":[4],"potential":[5],"attacks":[6],"against":[7],"fingerprint":[8,38,81,113,160,171],"authentication":[9],"systems":[10],"are":[11,21,40,49,94,99],"those":[12],"that":[13,53,71,93,109,162,190],"target":[14],"stored":[16],"reference":[17],"templates.":[18],"These":[19],"threats":[20],"extremely":[22],"damaging":[23],"as":[24,96,182],"they":[25],"can":[26],"lead":[27],"to":[28,36,62,66,84,121,141,166],"invasion":[30],"of":[31,57,90,112,197],"user":[32],"privacy.":[33],"The":[34],"countermeasures":[35],"secure":[37],"templates":[39,161],"therefore":[41],"an":[42],"indisputable":[43],"necessity.":[44],"In":[45],"literature,":[46],"although":[47],"there":[48],"so":[50],"many":[51],"approaches":[52],"address":[54],"this":[55,148,153],"kind":[56],"vulnerability,":[58],"it":[59],"turns":[60],"out":[61],"be":[63,119],"very":[64],"difficult":[65],"generalize":[67],"their":[68],"uses.":[69],"Given":[70],"each":[72],"system":[73],"has":[74],"its":[75],"own":[76],"particularities,":[77],"going":[78],"from":[79],"trait":[82],"acquisition":[83],"matching":[86],"process,":[87],"majority":[89],"protection":[91,115,124,144,157],"schemes,":[92],"proposed":[95,192],"generic":[97,143],"solutions,":[98],"not":[100],"sufficiently":[101],"mature":[102],"for":[103,126,159],"large-scale":[104],"deployment.":[105],"Consequently,":[106],"we":[107,150],"believe":[108],"methodology":[111],"template":[114],"schemes":[116,125],"conception":[117],"should":[118],"oriented":[120],"build":[122],"specific":[123],"every":[127],"unprotected":[128,170],"system,":[129],"which":[130],"will":[131],"provide":[132],"best":[134],"compromise":[135],"between":[136],"performance":[137],"and":[138,186,201],"security":[139],"compared":[140],"any":[142],"solution.":[145],"By":[146],"adopting":[147],"methodology,":[149],"propose":[151],"in":[152],"paper":[154],"a":[155,167],"new":[156],"scheme":[158],"is":[163],"well":[164],"adapted":[165],"well-known":[168],"existing":[169],"minutia":[172],"system.":[173],"Our":[174],"experimental":[175],"results,":[176],"obtained":[177],"using":[178],"standard":[179],"benchmarks":[180],"such":[181],"FVC":[183],"2002":[184],"DB1":[185],"DB2,":[187],"have":[188],"proven":[189],"technique":[193],"meets":[194],"requirements":[196],"revocability,":[198],"unlinkability,":[199],"non-invertibility,":[200],"high":[202],"recognition":[203],"accuracy.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
