{"id":"https://openalex.org/W6964765098","doi":"https://doi.org/10.26190/unsworks/2866","title":"Privacy-Preserving Fingerprint Authentication System Design and Analysis","display_name":"Privacy-Preserving Fingerprint Authentication System Design and Analysis","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W6964765098","doi":"https://doi.org/10.26190/unsworks/2866"},"language":"en","primary_location":{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/55230","is_oa":true,"landing_page_url":"http://hdl.handle.net/1959.4/55230","pdf_url":"https://unsworks.unsw.edu.au/fapi/datastream/unsworks:36835/SOURCE02?view=true","source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"http://purl.org/coar/resource_type/c_db06"},"type":"dissertation","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://unsworks.unsw.edu.au/fapi/datastream/unsworks:36835/SOURCE02?view=true","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Li, Cai","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li, Cai","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9381999969482422,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9381999969482422,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.026000000536441803,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.0024999999441206455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.838699996471405},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.718500018119812},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7121000289916992},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6273000240325928},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.5180000066757202},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.4456000030040741},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.36329999566078186},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.3409999907016754}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.838699996471405},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.718500018119812},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7121000289916992},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7057999968528748},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6273000240325928},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.5180000066757202},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47929999232292175},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.4456000030040741},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41200000047683716},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3919000029563904},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36329999566078186},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3409999907016754},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.33009999990463257},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.2858999967575073},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27129998803138733},{"id":"https://openalex.org/C74370796","wikidata":"https://www.wikidata.org/wiki/Q15924863","display_name":"Signature recognition","level":3,"score":0.2612999975681305},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.22370000183582306},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.20579999685287476},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2046000063419342},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2012999951839447},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.20029999315738678},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.1988999992609024},{"id":"https://openalex.org/C2984192347","wikidata":"https://www.wikidata.org/wiki/Q1497831","display_name":"Security system","level":2,"score":0.195700004696846},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.19439999759197235},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.19169999659061432},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.18780000507831573},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1875},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.18140000104904175},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.16850000619888306},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1673000007867813},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.1647000014781952},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1565999984741211},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.15549999475479126},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.15539999306201935},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.1525000035762787},{"id":"https://openalex.org/C67174900","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Minutiae","level":4,"score":0.15129999816417694},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.14990000426769257},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.1476999968290329}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/55230","is_oa":true,"landing_page_url":"http://hdl.handle.net/1959.4/55230","pdf_url":"https://unsworks.unsw.edu.au/fapi/datastream/unsworks:36835/SOURCE02?view=true","source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"http://purl.org/coar/resource_type/c_db06"},{"id":"pmh:oai:unsworks.unsw.edu.au:1959.4/55230","is_oa":true,"landing_page_url":"http://handle.unsw.edu.au/1959.4/55230","pdf_url":"http://handle.unsw.edu.au/1959.4/55230","source":{"id":"https://openalex.org/S4377196481","display_name":"UNSWorks (UNSW Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31746571","host_organization_name":"UNSW Sydney","host_organization_lineage":["https://openalex.org/I31746571"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Thesis"},{"id":"doi:10.26190/unsworks/2866","is_oa":true,"landing_page_url":"https://doi.org/10.26190/unsworks/2866","pdf_url":null,"source":{"id":"https://openalex.org/S7407053176","display_name":"University of New South Wales","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/55230","is_oa":true,"landing_page_url":"http://hdl.handle.net/1959.4/55230","pdf_url":"https://unsworks.unsw.edu.au/fapi/datastream/unsworks:36835/SOURCE02?view=true","source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"http://purl.org/coar/resource_type/c_db06"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5748515725135803}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W6964765098.pdf","grobid_xml":"https://content.openalex.org/works/W6964765098.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Fingerprint":[0],"recognition":[1],"is":[2,77,103,127,142,197,290,306,327,356,512,600,603],"one":[3],"of":[4,24,36,62,189,249,252,262,286,298,334,429,437,482,490,519,544,558,581,617,623],"the":[5,21,34,89,107,111,116,187,209,215,241,250,257,264,283,294,331,350,360,427,448,473,488,492,508,517,532,542,552,565,575,578],"most":[6],"mature":[7],"and":[8,18,29,45,85,154,179,267,321,337,343,373,433,460,525,555,570,572,597,619],"popular":[9,583],"biometric":[10,68,72,94,195],"authentication":[11,69,73,246,322,529],"techniques":[12,26],"due":[13],"to":[14,42,53,105,162,204,224,229,235,293,340,376,404,407,608],"its":[15,124],"stability,":[16],"individuality":[17],"cost-effectiveness.":[19],"Although":[20],"widespread":[22],"use":[23,172,518],"fingerprint":[25,49,238,254,309,335,371,415,584],"in":[27,133,150,201,240,256,330,353,359,577],"military":[28],"civil":[30],"applications":[31,203],"significantly":[32,486],"enhances":[33],"security":[35,131,288,332,554,590],"private":[37],"data,":[38],"it":[39,102,305],"gives":[40],"rise":[41],"a":[43,97,128,194,236,299,412,479,500,587,613,620],"new":[44,588],"challenging":[46],"issue":[47],"\u2014":[48],"templates":[50,95,109,140,222],"themselves":[51,141],"need":[52,161],"be":[54,163,230],"protected":[55],"because":[56,248,507],"they":[57],"are":[58,119,157,182,271,393,402,445,476],"also":[59,227,503,604],"considered":[60],"part":[61],"an":[63],"individual\u2019s":[64],"privacy.":[65],"Current":[66],"privacy-preserving":[67],"(also":[70],"called":[71],"with":[74,531],"template":[75,196,217,511],"protection)":[76],"divided":[78],"into":[79,96,447],"two":[80],"main":[81],"categories:":[82],"cancelable":[83,152,166,370,400,413,431,440],"biometrics":[84,153,432],"biocryptosystems.":[86,277,434,559],"In":[87,260,302,560],"particular,":[88,561],"former":[90],"irreversibly":[91],"transforms":[92],"original":[93,108,216,438,493],"transformed":[98,112,207,221,474,509],"domain":[99],"so":[100],"that":[101,160,213,282,308,397],"difficult":[104],"derive":[106],"from":[110,211,312,495,536],"ones":[113],"even":[114],"if":[115],"transformation":[117],"parameters":[118],"known.":[120],"A":[121],"biocryptosystem,":[122,237],"as":[123,193,225,274,458],"name":[125],"implies,":[126],"hybrid":[129],"biometric-cryptography":[130],"framework":[132],"which":[134,395,452,485,593],"template-dependent":[135],"helper":[136,497],"data":[137],"rather":[138],"than":[139],"physically":[143],"stored":[144],"for":[145,276,469],"verification.":[146],"Despite":[147],"much":[148],"progress":[149],"developing":[151],"biocryptosystems,":[155],"there":[156],"some":[158,341,582,605],"challenges":[159],"addressed.":[164],"Regarding":[165],"biometrics,":[167],"previously":[168],"proposed":[169,369],"schemes":[170,372,401],"typically":[171,183],"many-to-one":[173],"or":[174],"infinite-to-one":[175],"transformations":[176],"(e.g.,":[177],"DITOM),":[178],"their":[180],"securities":[181],"proven":[184],"by":[185,218,465,478],"analyzing":[186],"non-invertibility":[188],"these":[190,348,399],"transformations.":[191],"However,":[192],"often":[198,272],"repeatedly":[199],"used":[200,273,538],"various":[202],"generate":[205],"different":[206,470],"templates,":[208],"risk":[210],"attacks":[212,378],"recover":[214],"correlating":[219],"multiple":[220],"(referred":[223],"ARMs)":[226],"needs":[228],"seriously":[231],"considered.":[232],"With":[233],"respect":[234],"cryptosystems":[239,310,336,610,625],"literature":[242],"cannot":[243],"achieve":[244,318],"satisfactory":[245],"accuracy":[247,556,615],"difficulty":[251,489],"overcoming":[253],"variations":[255,315],"encrypted":[258],"domain.":[259],"terms":[261],"security,":[263,571,599],"average":[265],"min-entropy":[266],"Shannon":[268],"conditional":[269],"entropy":[270,569],"metrics":[275],"Previous":[278],"work":[279,351,549,606],"has":[280],"shown":[281],"upper":[284],"bound":[285],"entropy-based":[287],"(EBS)":[289],"inversely":[291],"related":[292,607],"error":[295],"tolerance":[296],"level":[297,629],"specific":[300],"biocryptosystem.":[301],"this":[303,354],"case,":[304],"unlikely":[307],"suffering":[311],"large":[313],"intra-class":[314],"can":[316,453,502],"simultaneously":[317],"high":[319,520],"EBS":[320,579],"accuracy.":[323],"This":[324,423],"fact,":[325],"however,":[326],"widely":[328,537],"ignored":[329],"analysis":[333,557,591,616],"therefore":[338],"leads":[339],"false":[342],"misleading":[344],"conclusions.":[345],"Aimed":[346],"at":[347],"issues,":[349],"pursued":[352],"thesis":[355],"briefly":[357],"summarized":[358],"following":[361],"three":[362],"parts.":[363],"Firstly,":[364,435],"we":[365,410,562],"review":[366],"four":[367],"recently":[368],"investigate":[374],"how":[375],"launch":[377],"via":[379],"record":[380],"multiplicity":[381],"(ARMs)":[382],"on":[383,551,627],"them":[384],"through":[385],"cryptanalysis.":[386],"Concrete":[387],"attack":[388],"methods":[389],"against":[390,462],"each":[391],"scheme":[392,424],"presented,":[394],"prove":[396],"all":[398],"susceptible":[403],"ARMs.":[405],"Secondly,":[406,472],"resist":[408,505],"ARMs,":[409],"propose":[411],"alignment-free":[414],"fuzzy":[416,449],"vault":[417,450],"using":[418],"pair-polar":[419],"(P-P)":[420],"minutiae":[421,442,523],"structures.":[422],"fully":[425],"combines":[426],"advantages":[428],"both":[430],"instead":[436],"features,":[439],"P-P":[441,522],"structure":[443],"features":[444,475,494],"encoded":[446],"scheme,":[451],"provide":[454],"privacy-enhancing":[455],"characteristics,":[456],"such":[457],"revocability":[459],"protection":[461],"cross-matching":[463],"attacks,":[464],"setting":[466],"distinct":[467],"seeds":[468],"applications.":[471],"blurred":[477],"greater":[480],"number":[481],"chaff":[483],"points,":[484],"increases":[487],"deriving":[491],"compromised":[496],"data.":[498],"Such":[499],"construction":[501],"help":[504],"ARMs":[506],"feature":[510],"not":[513],"explicitly":[514],"stored.":[515],"Moreover,":[516],"discriminative":[521],"structures":[524],"fine":[526],"quantization":[527],"improves":[528],"accuracy,":[530],"experimental":[533],"results":[534],"obtained":[535],"public":[539],"databases":[540],"demonstrating":[541],"superiority":[543],"our":[545,548],"system.":[546],"Finally,":[547],"focuses":[550],"theoretical":[553,614],"firstly":[563],"illustrate":[564],"intriguing":[566],"relationship":[567],"between":[568],"then":[573],"correct":[574],"mistakes":[576],"analyses":[580],"cryptosystems.":[585],"Afterwards,":[586],"biocryptosystem-oriented":[589],"framework,":[592],"jointly":[594],"considers":[595],"information-theoretic":[596],"computational":[598],"proposed.":[601],"There":[602],"multibiometric":[609,624],"(MBCs),":[611],"including":[612],"MBCs":[618],"fingerprint-based":[621],"implementation":[622],"based":[626],"decision":[628],"fusion":[630],"(MBCDs).":[631]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
