{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:56Z","timestamp":1750221356247,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,25]],"date-time":"2018-02-25T00:00:00Z","timestamp":1519516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,25]]},"DOI":"10.1145\/3193025.3193029","type":"proceedings-article","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T17:51:36Z","timestamp":1526579496000},"page":"6-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting an Alteration in Biometric Fingerprint Databases"],"prefix":"10.1145","author":[{"given":"Yahaya Isah","family":"Shehu","sequence":"first","affiliation":[{"name":"Coventry University, Environment and Computing, Coventry, UK"}]},{"given":"Anne","family":"James","sequence":"additional","affiliation":[{"name":"Coventry University, Environment and Computing, Coventry, UK and Nottingham Trent University, Clifton Campus, Nottingham, UK"}]},{"given":"Vasile","family":"Palade","sequence":"additional","affiliation":[{"name":"Coventry University, Environment and Computing, Coventry, UK"}]}],"member":"320","published-online":{"date-parts":[[2018,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.12.013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Yan Y. and Osadciw L.A. 2008 February. Bridging biometrics and forensics. In Security Forensics Steganography and Watermarking of Multimedia Contents (p. 68190Q).  Yan Y. and Osadciw L.A. 2008 February. Bridging biometrics and forensics. In Security Forensics Steganography and Watermarking of Multimedia Contents (p. 68190Q).","DOI":"10.1117\/12.766810"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Nagar A. Nandakumar K. and Jain A.K. 2010. Biometric template transformation: a security analysis. Media Forensics and Security 10.  Nagar A. Nandakumar K. and Jain A.K. 2010. Biometric template transformation: a security analysis. Media Forensics and Security 10.","DOI":"10.1117\/12.839976"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.161"},{"volume-title":"International Conference on Audio-and Video-Based Biometric Person Authentication (pp. 223--228)","author":"Ratha N.K.","key":"e_1_3_2_1_7_1","unstructured":"Ratha , N.K. , Connell , J.H. and Bolle , R.M ., 2001, June. An analysis of minutiae matching strength . In International Conference on Audio-and Video-Based Biometric Person Authentication (pp. 223--228) . Springer Berlin Heidelberg. Ratha, N.K., Connell, J.H. and Bolle, R.M., 2001, June. An analysis of minutiae matching strength. In International Conference on Audio-and Video-Based Biometric Person Authentication (pp. 223--228). Springer Berlin Heidelberg."},{"volume-title":"Biometrics and Forensics (IWBF), 2015 International Workshop on (pp. 1--6). IEEE.","author":"Li G.","key":"e_1_3_2_1_8_1","unstructured":"Li , G. , Yang , B. , Rathgeb , C. and Busch , C ., 2015, March. Towards generating protected fingerprint templates based on bloom filters . In Biometrics and Forensics (IWBF), 2015 International Workshop on (pp. 1--6). IEEE. Li, G., Yang, B., Rathgeb, C. and Busch, C., 2015, March. Towards generating protected fingerprint templates based on bloom filters. In Biometrics and Forensics (IWBF), 2015 International Workshop on (pp. 1--6). IEEE."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.09.032"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.01.001"},{"volume-title":"Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics (pp. 593--601)","author":"Prasad M.V.","key":"e_1_3_2_1_11_1","unstructured":"Prasad , M.V. , Anugu , J.R. and Rao , C.R ., 2016. Fingerprint template protection using multiple spiral curves . In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics (pp. 593--601) . Springer India. Prasad, M.V., Anugu, J.R. and Rao, C.R., 2016. Fingerprint template protection using multiple spiral curves. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics (pp. 593--601). Springer India."},{"volume-title":"FAKE FACE DATABASE AND PRE-PROCESSING. In An International Conference.","author":"Singh A.","key":"e_1_3_2_1_12_1","unstructured":"Singh , A. , Singh , S.K. and Tiwari , S ., 2013 . FAKE FACE DATABASE AND PRE-PROCESSING. In An International Conference. Singh, A., Singh, S.K. and Tiwari, S., 2013. FAKE FACE DATABASE AND PRE-PROCESSING. In An International Conference."},{"key":"e_1_3_2_1_13_1","volume-title":"Database for download {online} Available from &lt;http:\/\/biometrics.idealtest.org\/findDownloadDbByMode.do?mode=Fingerprint&gt","author":"Biometric Ideal Test","year":"2010","unstructured":"Biometric Ideal Test ( 2010 ) Database for download {online} Available from &lt;http:\/\/biometrics.idealtest.org\/findDownloadDbByMode.do?mode=Fingerprint&gt ; {08\/20 2016} Biometric Ideal Test (2010) Database for download {online} Available from &lt;http:\/\/biometrics.idealtest.org\/findDownloadDbByMode.do?mode=Fingerprint&gt; {08\/20 2016}"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.11.091"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9316-0"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00064-3"},{"key":"e_1_3_2_1_17_1","first-page":"25","volume-title":"Pattern Analysis and Intelligent Robotics (ICPAIR), 2011 International Conference on (Vol. 1","author":"Nordin M.J.","unstructured":"Nordin , M.J. and Hamid , A.A.K.A. , 2011, June. Combining local binary pattern and principal component analysis on T-zone face area for face recognition . In Pattern Analysis and Intelligent Robotics (ICPAIR), 2011 International Conference on (Vol. 1 , pp. 25 -- 30 ). IEEE. Nordin, M.J. and Hamid, A.A.K.A., 2011, June. Combining local binary pattern and principal component analysis on T-zone face area for face recognition. In Pattern Analysis and Intelligent Robotics (ICPAIR), 2011 International Conference on (Vol. 1, pp. 25--30). IEEE."},{"key":"e_1_3_2_1_18_1","first-page":"2265","volume-title":"Signal Processing and Communications Applications Conference (SIU)","author":"Abdulrahman M.","year":"2014","unstructured":"Abdulrahman , M. , Gwadabe , T.R. , Abdu , F.J. and Eleyan , A ., 2014, April. Gabor wavelet transform based facial expression recognition using PCA and LBP . In Signal Processing and Communications Applications Conference (SIU) , 2014 22nd(pp. 2265 -- 2268 ). IEEE. Abdulrahman, M., Gwadabe, T.R., Abdu, F.J. and Eleyan, A., 2014, April. Gabor wavelet transform based facial expression recognition using PCA and LBP. In Signal Processing and Communications Applications Conference (SIU), 2014 22nd(pp. 2265--2268). IEEE."},{"key":"e_1_3_2_1_19_1","unstructured":"E. Tabassi C. Wilson and C. Watson 2005 Fingerprint Image Quality NISTIR 7151 &lt;https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2016\/12\/12\/> tabassi-image-quality.pdf Aug. 2005  E. Tabassi C. Wilson and C. Watson 2005 Fingerprint Image Quality NISTIR 7151 &lt;https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2016\/12\/12\/> tabassi-image-quality.pdf Aug. 2005"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.709565"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Pietik\u00e4inen M. Hadid A. Zhao G. and Ahonen T. 2011. Local binary patterns for still images. In Computer vision using local binary patterns (pp. 13--47). Springer London.  Pietik\u00e4inen M. Hadid A. Zhao G. and Ahonen T. 2011. Local binary patterns for still images. In Computer vision using local binary patterns (pp. 13--47). Springer London.","DOI":"10.1007\/978-0-85729-748-8_2"}],"event":{"name":"ICDSP 2018: 2018 2nd International Conference on Digital Signal Processing","acronym":"ICDSP 2018","location":"Tokyo Japan"},"container-title":["Proceedings of the 2nd International Conference on Digital Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193025.3193029","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3193025.3193029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:08Z","timestamp":1750213568000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193025.3193029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,25]]},"references-count":20,"alternative-id":["10.1145\/3193025.3193029","10.1145\/3193025"],"URL":"https:\/\/doi.org\/10.1145\/3193025.3193029","relation":{},"subject":[],"published":{"date-parts":[[2018,2,25]]},"assertion":[{"value":"2018-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}