{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:04Z","timestamp":1762004944517,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Sustain. Comput."],"published-print":{"date-parts":[[2020,4,1]]},"DOI":"10.1109\/tsusc.2018.2793466","type":"journal-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:42:06Z","timestamp":1516056126000},"page":"260-267","source":"Crossref","is-referenced-by-count":20,"title":["An Encryption Approach Using Information Fusion Techniques Involving Prime Numbers and Face Biometrics"],"prefix":"10.1109","volume":"5","author":[{"given":"Gerardo","family":"Iovane","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1358-006X","authenticated-orcid":false,"given":"Carmen","family":"Bisogni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2278-6086","authenticated-orcid":false,"given":"Luigi","family":"De Maio","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2517-2867","authenticated-orcid":false,"given":"Michele","family":"Nappi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_92"},{"key":"ref38","first-page":"1","article-title":"Hybrid fusion for biometrics: Combining score-level and decision-level fusion","author":"tao","year":"2008","journal-title":"Proc Comput Vis Pattern Recognit Workshop"},{"article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","year":"2008","author":"rukhin","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45344-X_52"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21236\/ADA389851"},{"key":"ref36","article-title":"Revisions to the JDL data fusion model","author":"steinberg","year":"1998","journal-title":"Proc Joint NATO\/IRIS"},{"key":"ref35","first-page":"38","article-title":"Rethinking the JDL data fusion levels","author":"steinberg","year":"2004","journal-title":"Proc of National Symp on Sensor Data Fusion"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.078"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1566-2535(01)00032-X"},{"key":"ref40","article-title":"Biometric fusion: Robust approach","author":"ushmaev","year":"2006","journal-title":"Proc Workshop Multimodal User Authentication"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1499799.1499815"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_95"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1080\/09720529.2014.894311","article-title":"An information fusion approach based on prime numbers coming from RSA algorithm and fractals for secure coding","volume":"18","author":"benedetto","year":"2015","journal-title":"J Discrete Math Sci Cryptogr"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/34.735803"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(99)00108-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"article-title":"Dependable and generic high-level information fusion - methods and algorithms for uncertainty management","year":"2007","author":"karlsson","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.10.025"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSBW.2005.22"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TIFS.2015.2402593","article-title":"A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion","volume":"10","author":"pieprzyk","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"year":"1994","key":"ref27","article-title":"Dsto (defence science and technology organization) data fusion special interest group. data fusion lexicon"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1117\/12.477612"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227990"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45344-X_51"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/704504"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85567-5_31"},{"key":"ref7","first-page":"571","article-title":"Fusion of face and iris features for multimodal biometrics","author":"chen","year":"2006","journal-title":"Proc Int Conf Biometrics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MCC.2017.3791012","article-title":"Biometrics in the cloud: Challenges and research opportunities","volume":"4","author":"nappi","year":"2017","journal-title":"IEEE Cloud Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-004-0223-4"},{"year":"2002","key":"ref1","article-title":"United States National Institute of Standards and Technology (NIST)"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/09720529.2010.10698283","article-title":"Face recognition using sift features and a region-based ranking","volume":"13","author":"manzo","year":"2010","journal-title":"J Discrete Math Sci Cryptogr"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.01.010"},{"key":"ref21","first-page":"1218","article-title":"Revisiting the JDL data fusion model II","author":"llinas","year":"2004","journal-title":"Proc 7th Int Conf Inf Fusion"},{"journal-title":"Multisensor Data Fusion","year":"1990","author":"waltz","key":"ref42"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1016\/j.patcog.2014.10.004","article-title":"Robust face recognition after plastic surgery using region-based approaches","volume":"48","author":"riccio","year":"2015","journal-title":"Pattern Recognit"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/36.763269"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2002.1000251"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2007.380628"},{"year":"1991","key":"ref26","article-title":"Department of Defence, Data fusion subpanel of the joint directors of laboratories, technical panel for c3"},{"article-title":"JDL, data fusion lexicon","year":"1991","author":"white","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.02.020"}],"container-title":["IEEE Transactions on Sustainable Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7274860\/9113128\/08259031.pdf?arnumber=8259031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T12:34:11Z","timestamp":1651062851000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8259031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":44,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsusc.2018.2793466","relation":{},"ISSN":["2377-3782","2377-3790"],"issn-type":[{"type":"electronic","value":"2377-3782"},{"type":"electronic","value":"2377-3790"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}