메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 56-61

Robust, short and sensitive authentication tags using secure sketch

Author keywords

Authentication; Robustness; Secure sketch; Sensitivity; Two level quantization

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MULTIMEDIA SYSTEMS; ROBUSTNESS (CONTROL SYSTEMS); SENSITIVITY ANALYSIS;

EID: 33750905324     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1161366.1161377     Document Type: Conference Paper
Times cited : (30)

References (17)
  • 1
    • 33746049783 scopus 로고    scopus 로고
    • Hiding secret points amidst chaff
    • EUROCRYPT, St. Petersburg, Russia, May
    • Ee-Chien Chang and Qiming Li. Hiding secret points amidst chaff. In EUROCRYPT, volume 4004 of LNCS, pages 59-72, St. Petersburg, Russia, May 2006.
    • (2006) LNCS , vol.4004 , pp. 59-72
    • Chang, E.-C.1    Li, Q.2
  • 2
    • 0035333687 scopus 로고    scopus 로고
    • Quantization Index Modulation methods: A class of provably good methods for digital watermarking and information embedding
    • B. Chen and G.W. Wornell. Quantization Index Modulation methods: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 49 (4): 1423-1443, 2001.
    • (2001) IEEE Trans. on Information Theory , vol.49 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 4
    • 33750901987 scopus 로고    scopus 로고
    • A formal security analysis of approximate message authentication codes
    • College Park, MD, April
    • G. Di Crescenzo, R. Graveman, G. Arce, and R. Ge. A formal security analysis of approximate message authentication codes. In CTA Communications and Networks, pages 217-221, College Park, MD, April 2003.
    • (2003) CTA Communications and Networks , pp. 217-221
    • Di Crescenzo, G.1    Graveman, R.2    Arce, G.3    Ge, R.4
  • 5
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Eurocypt, Interlaken, Switzerland, May
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Eurocypt, volume 3027 of LNCS, pages 125-132, Interlaken, Switzerland, May 2004.
    • (2004) LNCS , vol.3027 , pp. 125-132
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 6
    • 35248868841 scopus 로고    scopus 로고
    • Computation of cryptographic keys from face biometrics
    • IFIP Communications and Multimedia Security, Torino, Italy, October
    • A. Goh and D.C.L. Ngo. Computation of cryptographic keys from face biometrics. In IFIP Communications and Multimedia Security, volume 2828 of LNCS, pages 1-13, Torino, Italy, October 2003.
    • (2003) LNCS , vol.2828 , pp. 1-13
    • Goh, A.1    Ngo, D.C.L.2
  • 8
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • F. Hao and C.W. Chan. Private key generation from on-line handwritten signatures. Information Management and Computer Security, 10(4): 159-164, 2002.
    • (2002) Information Management and Computer Security , vol.10 , Issue.4 , pp. 159-164
    • Hao, F.1    Chan, C.W.2
  • 12
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • 4th International Conference on Audio and Video Based Biometric Person Authentication, June
    • J. P. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In 4th International Conference on Audio and Video Based Biometric Person Authentication, volume 2688 of LNCS, pages 125-132, June 2003.
    • (2003) LNCS , vol.2688 , pp. 125-132
    • Linnartz, J.P.1    Tuyls, P.2
  • 14
    • 33748076787 scopus 로고    scopus 로고
    • A secure biometric authentication scheme based on robust hashing
    • New York City, NY, August
    • Y. Sutcu, T. Sencar, and N. Memon. A secure biometric authentication scheme based on robust hashing. In A CM Multimedia Security Workshop, pages 111-116, New York City, NY, August 2005.
    • (2005) A CM Multimedia Security Workshop , pp. 111-116
    • Sutcu, Y.1    Sencar, T.2    Memon, N.3
  • 15
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • Prague, May
    • P. Tuyls and J. Goseling. Capacity and examples of template-protecting biometric authentication systems. In Biometric Authentication Workshop, pages 158-170, Prague, May 2004.
    • (2004) Biometric Authentication Workshop , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 16
    • 0035362493 scopus 로고    scopus 로고
    • Approximate image message authentication codes
    • L. Xie, G.R. Arce, and R.F. Graveman. Approximate image message authentication codes. IEEE Trans. on Multimedia, 3(2):242-252, 2001.
    • (2001) IEEE Trans. on Multimedia , vol.3 , Issue.2 , pp. 242-252
    • Xie, L.1    Arce, G.R.2    Graveman, R.F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.