메뉴 건너뛰기




Volumn 92, Issue 6, 2004, Pages 948-959

Biometric cryptosystems: Issues and challenges

Author keywords

Authentication; Biometrics; Confidentiality; Cryptography; Entropy; Fingerprints; Invariance; Key binding; Key generation; Key release; Multibiometrics; Privacy; Secrecy; Security

Indexed keywords

ALGORITHMS; DATA ACQUISITION; DATA PRIVACY; DATABASE SYSTEMS; DIGITAL COMMUNICATION SYSTEMS; ELECTRONIC CRIME COUNTERMEASURES; INVARIANCE; SECURITY SYSTEMS;

EID: 10044222391     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2004.827372     Document Type: Conference Paper
Times cited : (768)

References (31)
  • 1
    • 84860946243 scopus 로고    scopus 로고
    • IDG News Service. (February 14). [Online]
    • US global piracy losses estimated at $9.2B in 2002, IDG News Service. (2003, February 14). [Online]. Available: http://www.computerworld.com/ securitytopics/security/cybercrirne/story/0,10801,78545,00.html
    • (2003) US Global Piracy Losses Estimated at $9.2B in 2002
  • 2
    • 84860940336 scopus 로고    scopus 로고
    • Business Software Alliance. (June 10). [Online]
    • Four out of every ten software programs are pirated world-wide. Business Software Alliance. (2002, June 10). [Online]. Available: http://global.bsa.org/ usa/press/newsreleases//2002-06-10.1129.phtml
    • (2002) Four out of Every Ten Software Programs are Pirated World-wide
  • 3
    • 0003508558 scopus 로고    scopus 로고
    • Federal information processing standards publication 197, National Institute of Standards and Technology. [Online]
    • Advanced encryption standard (AES). Federal information processing standards publication 197, National Institute of Standards and Technology. (2001). [Online]. Available: http://csrc.nisi.gov/publications/fips/fips197/ fips-197.pdf
    • (2001) Advanced Encryption Standard (AES)
  • 5
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • D. V. Klein. "Foiling the cracker: a survey of, and improvements to, password security," in Proc. 2nd USENIX Workshop Security, 1990, pp. 5-14.
    • (1990) Proc. 2nd USENIX Workshop Security , pp. 5-14
    • Klein, D.V.1
  • 6
    • 21244456672 scopus 로고    scopus 로고
    • Passwords exposed: Users are the weakest link
    • June. [Online]
    • I. Armstrong. (2003, June) Passwords exposed: Users are the weakest link. SC Mag. [Online], Available: http:/www.scmagazine.com/features/index.cfm? fuseaction=FeatureDetails&newsUID=43b97d8d-3605-4a18-b9bc- 03c063008dc8&newsType=Features
    • (2003) SC Mag.
    • Armstrong, I.1
  • 9
    • 0742302033 scopus 로고    scopus 로고
    • Fundamentals of biometric authentication technologies
    • J. L. Wayman, "Fundamentals of biometric authentication technologies," Int. J. Image Graph., vol. 1, no. 1, pp. 93-113, 2001.
    • (2001) Int. J. Image Graph. , vol.1 , Issue.1 , pp. 93-113
    • Wayman, J.L.1
  • 11
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.1    Connell, J.2    Bolle, R.3
  • 13
    • 19444368925 scopus 로고    scopus 로고
    • Biometric encryption - Enrollment and verification procedures
    • _, "Biometric encryption - enrollment and verification procedures," in Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, 1998, pp. 24-35.
    • (1998) Proc. SPIE, Optical Pattern Recognition IX , vol.3386 , pp. 24-35
  • 14
    • 8344236959 scopus 로고    scopus 로고
    • Biometric encryption
    • R. K. Nichols, Ed. New York: McGraw-Hill
    • _, "Biometric encryption," in ICSA Guide to Cryptography, R. K. Nichols, Ed. New York: McGraw-Hill, 1999.
    • (1999) ICSA Guide to Cryptography
  • 18
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • Nov.
    • J. G. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Machine Intell., vol. 15, pp. 1148-1161, Nov. 1993.
    • (1993) IEEE Trans. Pattern Anal. Machine Intell. , vol.15 , pp. 1148-1161
    • Daugman, J.G.1
  • 22
    • 0034829626 scopus 로고    scopus 로고
    • Cryptographic key generation from voice
    • _, "Cryptographic key generation from voice," in Proc. 2001 IEEE Symp. Security and Privacy, pp. 202-213.
    • Proc. 2001 IEEE Symp. Security and Privacy , pp. 202-213
  • 29
    • 0031233235 scopus 로고    scopus 로고
    • An identity authentication system using fingerprints
    • Sept.
    • A. K. Jain, L. Hong, S. Pankanti, and R. Bolle, "An identity authentication system using fingerprints," Proc. IEEE, vol. 85, pp. 1365-1388, Sept. 1997.
    • (1997) Proc. IEEE , vol.85 , pp. 1365-1388
    • Jain, A.K.1    Hong, L.2    Pankanti, S.3    Bolle, R.4
  • 31
    • 85024264226 scopus 로고    scopus 로고
    • Biometrics: Uses and abuses
    • Aug.
    • B. Schneier, "Biometrics: uses and abuses," Commun. ACM, vol. 42, no. 8, p. 136, Aug. 1999.
    • (1999) Commun. ACM , vol.42 , Issue.8 , pp. 136
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.