{"id":"https://openalex.org/W2096655583","doi":"https://doi.org/10.5539/cis.v5n1p77","title":"Robustness of Multi Biometric Authentication Systems against Spoofing","display_name":"Robustness of Multi Biometric Authentication Systems against Spoofing","publication_year":2011,"publication_date":"2011-12-28","ids":{"openalex":"https://openalex.org/W2096655583","doi":"https://doi.org/10.5539/cis.v5n1p77","mag":"2096655583"},"language":"en","primary_location":{"id":"doi:10.5539/cis.v5n1p77","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v5n1p77","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/12528/9593","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ccsenet.org/journal/index.php/cis/article/download/12528/9593","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071705084","display_name":"Mahdi Hariri","orcid":"https://orcid.org/0000-0002-4970-3028"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mahdi Hariri","raw_affiliation_strings":["Electrical Engineering Department Iran University of Science and Technology (IUST) Narmak, Hengam Ave Tehran 16846, Iran","Iran University of Science and Technology (IUST), Tehran, Iran#TAB#"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department Iran University of Science and Technology (IUST) Narmak, Hengam Ave Tehran 16846, Iran","institution_ids":["https://openalex.org/I67009956"]},{"raw_affiliation_string":"Iran University of Science and Technology (IUST), Tehran, Iran#TAB#","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050563980","display_name":"Shahriar B. Shokouhi","orcid":"https://orcid.org/0000-0001-6266-6607"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Shahriar B. Shokouhi","raw_affiliation_strings":["Electrical Engineering Department Iran University of Science and Technology (IUST) Tehran 16846, Iran","Electrical Engineering department#R##N#Iran University of Science and Technology (IUST)"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department Iran University of Science and Technology (IUST) Tehran 16846, Iran","institution_ids":["https://openalex.org/I67009956"]},{"raw_affiliation_string":"Electrical Engineering department#R##N#Iran University of Science and Technology (IUST)","institution_ids":["https://openalex.org/I67009956"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071705084"],"corresponding_institution_ids":["https://openalex.org/I67009956"],"apc_list":null,"apc_paid":null,"fwci":0.3062,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.55665713,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9379000067710876,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9447867274284363},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8523522615432739},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8294373750686646},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8275181651115417},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5269982218742371},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49201342463493347},{"id":"https://openalex.org/keywords/trait","display_name":"Trait","score":0.4739244878292084},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4490000009536743},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4021283984184265},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37958455085754395}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9447867274284363},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8523522615432739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8294373750686646},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8275181651115417},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5269982218742371},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49201342463493347},{"id":"https://openalex.org/C106934330","wikidata":"https://www.wikidata.org/wiki/Q1971873","display_name":"Trait","level":2,"score":0.4739244878292084},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4490000009536743},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4021283984184265},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37958455085754395},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5539/cis.v5n1p77","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v5n1p77","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/12528/9593","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.5539/cis.v5n1p77","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v5n1p77","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/12528/9593","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2096655583.pdf","grobid_xml":"https://content.openalex.org/works/W2096655583.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1515847688","https://openalex.org/W1519435346","https://openalex.org/W1576817603","https://openalex.org/W1850501806","https://openalex.org/W2000538789","https://openalex.org/W2012712694","https://openalex.org/W2034473161","https://openalex.org/W2041942569","https://openalex.org/W2061272711","https://openalex.org/W2063355793","https://openalex.org/W2078136378","https://openalex.org/W2112434380","https://openalex.org/W2126818868","https://openalex.org/W2133334469","https://openalex.org/W2136885397","https://openalex.org/W2139340096","https://openalex.org/W2158275940","https://openalex.org/W2161694313","https://openalex.org/W2167652145","https://openalex.org/W2793792192","https://openalex.org/W4210306310","https://openalex.org/W4249256119"],"related_works":["https://openalex.org/W2998478967","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W3128793638","https://openalex.org/W2281508611","https://openalex.org/W4387799680","https://openalex.org/W3104966193","https://openalex.org/W4308237908","https://openalex.org/W1983660090","https://openalex.org/W2123843216"],"abstract_inverted_index":{"Nowadays":[0],"biometric":[1,17,35,53,64,132],"authentication":[2,18],"systems":[3,54,65,85,161],"have":[4,55],"been":[5,56],"more":[6,72],"developed,":[7],"especially":[8,157],"in":[9,106,158],"secure":[10,160],"and":[11,103,142],"financial":[12],"systems;":[13],"so":[14],"cracking":[15],"a":[16,22,34,38,43,107,130],"system":[19,133],"is":[20,46,121,155,166],"now":[21],"growing":[23],"concern.":[24],"But":[25],"their":[26],"security":[27],"has":[28,78],"not":[29],"received":[30],"enough":[31],"attention.":[32],"Imitating":[33],"trait":[36,141],"of":[37,62,83,94,101,117,126,129,145,177],"genuine":[39],"user":[40],"to":[41,58,70],"deceive":[42],"system,":[44],"spoofing,":[45],"the":[47,67,81,92,115,136,139,143,150,164,168,172],"most":[48,151],"important":[49],"attacking":[50],"method.":[51],"Multi":[52],"developed":[57],"overcome":[59],"some":[60],"weaknesses":[61],"single":[63],"because":[66],"forger":[68],"needs":[69],"imitate":[71],"than":[73],"one":[74],"trait.":[75],"No":[76],"research":[77],"further":[79],"investigated":[80],"vulnerability":[82,174],"multimodal":[84],"against":[86,123,175],"spoof":[87,113,140],"attack.":[88],"We":[89],"empirically":[90],"examine":[91],"robustness":[93,116,152],"five":[95],"fixed":[96,118],"rules":[97,120],"combining":[98],"similarity":[99],"scores":[100],"face":[102,154],"fingerprint":[104,165],"traits":[105],"bimodal":[108],"system.":[109],"By":[110],"producing":[111],"different":[112],"scores,":[114],"combination":[119,137],"examined":[122],"various":[124],"possibilities":[125,176],"spoofing.":[127,146,178],"Robustness":[128],"multi":[131],"depends":[134],"on":[135],"rule,":[138],"intensity":[144],"Min":[147],"rule":[148,170],"shows":[149,171],"when":[153,163],"spoofed":[156],"very":[159],"but":[162],"faked":[167],"max":[169],"least":[173]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-12-06T23:10:59.065948","created_date":"2025-10-10T00:00:00"}
