{"id":"https://openalex.org/W4411739425","doi":"https://doi.org/10.32604/cmc.2025.065206","title":"Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence","display_name":"Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411739425","doi":"https://doi.org/10.32604/cmc.2025.065206"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065206","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065206","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065206","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106254042","display_name":"Fatima Abu Siryeh","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fatima Abu Siryeh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118669262","display_name":"Hussein Alrammahi","orcid":"https://orcid.org/0000-0002-7331-7995"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hussein Alrammahi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5046879358","display_name":"Abdullahi Abdu \u0130brahim","orcid":"https://orcid.org/0000-0001-9145-1939"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdullahi Abdu \u0130brahim","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5106254042"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16876897,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"3","first_page":"5021","last_page":"5046"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8116599321365356},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7039761543273926},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6972047686576843},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.6559472680091858},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4566797614097595},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3622070252895355},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.32956093549728394},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.1622561812400818}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8116599321365356},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7039761543273926},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6972047686576843},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.6559472680091858},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4566797614097595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3622070252895355},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32956093549728394},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.1622561812400818},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065206","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065206","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065206","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065206","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2116467012","https://openalex.org/W2790136966","https://openalex.org/W2794372970","https://openalex.org/W2896681710","https://openalex.org/W2919430265","https://openalex.org/W2944254724","https://openalex.org/W2997999392","https://openalex.org/W3006625877","https://openalex.org/W3016560835","https://openalex.org/W3040780740","https://openalex.org/W3041855661","https://openalex.org/W3083774508","https://openalex.org/W3183632233","https://openalex.org/W3203222604","https://openalex.org/W4214840669","https://openalex.org/W4214851787","https://openalex.org/W4285468871","https://openalex.org/W4291805284","https://openalex.org/W4313245681","https://openalex.org/W4386847724"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1846726187","https://openalex.org/W1593964766","https://openalex.org/W2387614453","https://openalex.org/W2365808414"],"abstract_inverted_index":{"Biometric":[0],"template":[1,10,101,242],"protection":[2],"is":[3,117],"essential":[4],"for":[5,56,100,120],"finger-based":[6],"authentication":[7,123,266],"systems,":[8],"as":[9],"tampering":[11],"and":[12,34,46,75,84,116,143,155,171,195,247,271],"adversarial":[13,245],"attacks":[14,246],"threaten":[15],"the":[16,32,159,172,192],"security.":[17],"This":[18],"paper":[19],"proposes":[20],"a":[21,62],"DCT-based":[22],"fragile":[23,254],"watermarking":[24,77,255],"scheme":[25],"incorporating":[26],"AI-based":[27],"tamper":[28,63,233],"detection":[29,64,234],"to":[30,93,137,153,244],"improve":[31],"integrity":[33],"robustness":[35],"of":[36,66,127,197],"finger":[37],"authentication.":[38],"The":[39,58,79,104,147,231],"system":[40,105],"was":[41],"tested":[42,206],"against":[43,207],"NIST":[44,187],"SD4":[45,188],"Anguli":[47],"fingerprint":[48,249,261],"datasets,":[49],"wherein":[50],"10,000":[51],"watermarked":[52],"fingerprints":[53,128],"were":[54,89,133],"employed":[55],"training.":[57],"designed":[59],"approach":[60,148],"recorded":[61],"rate":[65,82,87],"98.3%,":[67],"performing":[68],"3\u20136%":[69],"better":[70,201],"than":[71],"current":[72],"DCT,":[73],"SVD,":[74],"DWT-based":[76],"approaches.":[78],"false":[80,85],"positive":[81],"(\u22641.2%)":[83],"negative":[86],"(\u22641.5%)":[88],"much":[90],"lower":[91],"compared":[92],"previous":[94],"research,":[95],"which":[96,239],"maintained":[97],"high":[98,268],"reliability":[99],"change":[102],"detection.":[103],"showed":[106],"real-time":[107,237],"performance,":[108],"averaging":[109],"12\u201318":[110],"ms":[111],"processing":[112],"time":[113],"per":[114],"template,":[115],"thus":[118],"suitable":[119],"real-world":[121],"biometric":[122,265],"scenarios.":[124],"Quality":[125],"analysis":[126],"indicated":[129],"that":[130,184,253],"NFIQ":[131],"scores":[132,203],"enhanced":[134],"from":[135],"2.07":[136],"1.81,":[138],"reflecting":[139],"improved":[140,191,218],"minutiae":[141],"clarity":[142],"ridge":[144,193,219],"structure":[145],"preservation.":[146],"also":[149,215],"exhibited":[150],"strong":[151],"resistance":[152],"compression":[154,167],"noise":[156,179],"distortions,":[157],"with":[158,186,256,267],"improvements":[160],"in":[161,200,217,229],"PSNR":[162],"being":[163],"2":[164],"dB":[165],"(JPEG":[166],"Q":[168],"=":[169,213,226],"80)":[170],"SSIM":[173],"values":[174],"rising":[175],"by":[176],"3%\u20135%":[177],"under":[178],"attacks.":[180],"Comparative":[181],"assessment":[182],"demonstrated":[183],"training":[185],"data":[189],"greatly":[190,240,259],"continuity":[194],"quality":[196],"fingerprints,":[198],"resulting":[199],"match":[202],"(260\u2013295)":[204],"when":[205],"Bozorth3.":[208],"Smaller":[209],"batch":[210,223],"sizes":[211,224],"(batch":[212,225],"2)":[214],"resulted":[216,228],"clarity,":[220],"whereas":[221],"larger":[222],"8)":[227],"distortions.":[230],"DCNN-based":[232],"model":[235],"supported":[236],"classification,":[238],"minimized":[241],"exposure":[243],"synthetic":[248],"forgeries.":[250],"Results":[251],"demonstrate":[252],"AI":[257],"indeed":[258],"enhances":[260],"security,":[262],"providing":[263],"privacy-preserving":[264],"robustness,":[269],"accuracy,":[270],"computational":[272],"efficiency.":[273]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
