{"id":"https://openalex.org/W4289327122","doi":"https://doi.org/10.23919/apsipa.2018.8659731","title":"A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code","display_name":"A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W4289327122","doi":"https://doi.org/10.23919/apsipa.2018.8659731"},"language":"en","primary_location":{"id":"doi:10.23919/apsipa.2018.8659731","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apsipa.2018.8659731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022128373","display_name":"Xingbo Dong","orcid":"https://orcid.org/0000-0001-9782-6068"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Xing-Bo Dong","raw_affiliation_strings":["School of Information Technology, Monash University, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University, Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068764025","display_name":"Zhe Jin","orcid":"https://orcid.org/0000-0003-4501-7992"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Zhe Jin","raw_affiliation_strings":["School of Information Technology, Monash University, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University, Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069916756","display_name":"KokSheik Wong","orcid":"https://orcid.org/0000-0002-4893-2291"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"KokSheik Wong","raw_affiliation_strings":["School of Information Technology, Monash University, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University, Malaysia","institution_ids":["https://openalex.org/I11662577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022128373"],"corresponding_institution_ids":["https://openalex.org/I11662577"],"apc_list":null,"apc_paid":null,"fwci":0.3303,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.60823444,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"908","last_page":"915"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/minutiae","display_name":"Minutiae","score":0.8056877255439758},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7579824924468994},{"id":"https://openalex.org/keywords/locality-sensitive-hashing","display_name":"Locality-sensitive hashing","score":0.6860433220863342},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6681883335113525},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6255449056625366},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5823286771774292},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4753049314022064},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.4595036208629608},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.44900378584861755},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4237423539161682},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.4081304669380188},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3928273618221283},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3807220757007599},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34393349289894104},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.2725105583667755},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.2525627613067627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12047374248504639}],"concepts":[{"id":"https://openalex.org/C67174900","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Minutiae","level":4,"score":0.8056877255439758},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7579824924468994},{"id":"https://openalex.org/C74270461","wikidata":"https://www.wikidata.org/wiki/Q1625299","display_name":"Locality-sensitive hashing","level":4,"score":0.6860433220863342},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6681883335113525},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6255449056625366},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5823286771774292},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4753049314022064},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.4595036208629608},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.44900378584861755},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4237423539161682},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4081304669380188},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3928273618221283},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3807220757007599},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34393349289894104},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2725105583667755},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.2525627613067627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12047374248504639},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/apsipa.2018.8659731","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apsipa.2018.8659731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1490122681","https://openalex.org/W1504113980","https://openalex.org/W1516726196","https://openalex.org/W1542412379","https://openalex.org/W1573182127","https://openalex.org/W1584467222","https://openalex.org/W1963765109","https://openalex.org/W1973752187","https://openalex.org/W1975362803","https://openalex.org/W1991266632","https://openalex.org/W1998161813","https://openalex.org/W2014136002","https://openalex.org/W2026297886","https://openalex.org/W2048387976","https://openalex.org/W2053171205","https://openalex.org/W2063355793","https://openalex.org/W2064071310","https://openalex.org/W2087451113","https://openalex.org/W2099278510","https://openalex.org/W2110401929","https://openalex.org/W2112770353","https://openalex.org/W2122290055","https://openalex.org/W2126960670","https://openalex.org/W2160367574","https://openalex.org/W2170865952","https://openalex.org/W2171431911","https://openalex.org/W2979473749","https://openalex.org/W2983923309","https://openalex.org/W4230579564","https://openalex.org/W6677028317","https://openalex.org/W6678306643"],"related_works":["https://openalex.org/W2566091814","https://openalex.org/W1540357037","https://openalex.org/W2020992254","https://openalex.org/W2565799042","https://openalex.org/W2122988758","https://openalex.org/W2126450185","https://openalex.org/W3169072271","https://openalex.org/W2082047178","https://openalex.org/W3037288134","https://openalex.org/W2136721862"],"abstract_inverted_index":{"Hashing":[0],"technology":[1],"has":[2],"gained":[3],"much":[4],"attention":[5],"in":[6,46],"protecting":[7],"the":[8,30,34,47,69,72,91,130,135,145,160,169],"biometric":[9,38,41,98],"template":[10,172],"lately.":[11],"For":[12],"instance,":[13],"Index-of-Max":[14],"(IoM),":[15],"a":[16,22,81,102,106],"recently":[17],"reported":[18],"hashing":[19,26,74],"technique,":[20,27],"is":[21,138,147],"ranking-based":[23],"locality":[24],"sensitive":[25],"which":[28,67],"illustrates":[29],"feasibility":[31],"to":[32,89,124],"protect":[33],"ordered":[35,50],"and":[36,51,59,95,153,162,177],"fixed-length":[37],"template.":[39,99],"However,":[40],"templates":[42],"are":[43,155],"not":[44],"always":[45],"form":[48,125],"of":[49,71,84,93,132,171],"fixed-length.":[52],"Rather,":[53],"it":[54],"may":[55],"be":[56],"an":[57],"unordered":[58,94],"variable":[60,96,108],"size":[61,97,109],"point":[62],"set,":[63],"e.g.,":[64],"fingerprint":[65,113,150],"minutiae,":[66],"restricts":[68],"usage":[70],"traditional":[73],"technology.":[75],"In":[76],"this":[77],"paper,":[78],"we":[79],"propose":[80],"generalized":[82],"version":[83],"IoM":[85],"hashing,":[86],"namely":[87],"gIoM,":[88],"enable":[90],"utilization":[92],"We":[100],"demonstrate":[101],"realization":[103],"by":[104],"using":[105],"well-known":[107],"feature":[110,127],"vector":[111],"-":[112],"Minutia":[114],"Cylinder-Code":[115],"(MCC).":[116],"The":[117],"gIoM":[118,167],"transforms":[119],"MCC":[120,133],"into":[121],"index":[122],"domain":[123],"indexing-based":[126],"representation.":[128],"Consequently,":[129],"inversion":[131],"from":[134],"transformed":[136],"representation":[137],"computational":[139],"infeasible,":[140],"thus":[141],"achieving":[142],"non-invertibility":[143],"while":[144],"performance":[146],"preserved.":[148],"Public":[149],"databases":[151],"FVC2002":[152],"FVC2004":[154],"employed":[156],"for":[157],"experiments.":[158],"Furthermore,":[159],"security":[161],"privacy":[163],"analysis":[164],"suggest":[165],"that":[166],"meets":[168],"criteria":[170],"protection,":[173],"namely,":[174],"non-invertibility,":[175],"revocability,":[176],"non-linkability.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
