메뉴 건너뛰기




Volumn 6819, Issue , 2008, Pages

Realization of correlation attack against the Fuzzy Vault scheme

Author keywords

Biometrics; Fuzzy vault; Privacy; Template protection

Indexed keywords

BIOMETRICS; COMPUTER CRIME; CORRELATION METHODS; FEATURE EXTRACTION; FUZZY LOGIC;

EID: 42949167255     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.766861     Document Type: Conference Paper
Times cited : (102)

References (21)
  • 1
    • 42949154119 scopus 로고    scopus 로고
    • G. Tomko, Biometrics as a privacy-enhancing technology: Friend or foe of privacy?, In Privacy Laws & Business 9th Privacy Commissioners/Data Protection Authorities Workshop, 1998.
    • G. Tomko, "Biometrics as a privacy-enhancing technology: Friend or foe of privacy?," In Privacy Laws & Business 9th Privacy Commissioners/Data Protection Authorities Workshop, 1998.
  • 2
    • 42949175022 scopus 로고    scopus 로고
    • Biometrics and privacy: The end of the world as we know it or the white knight of privacy?
    • M. Crompton, "Biometrics and privacy: The end of the world as we know it or the white knight of privacy?," in First Biometrics Institute Conference, 2003.
    • (2003) First Biometrics Institute Conference
    • Crompton, M.1
  • 3
    • 0037278262 scopus 로고    scopus 로고
    • Genetic disorders of palm skin and nail
    • W. H. I. McLean, "Genetic disorders of palm skin and nail," Journal of Anatomy 202(1), pp. 133-141, 2003.
    • (2003) Journal of Anatomy , vol.202 , Issue.1 , pp. 133-141
    • McLean, W.H.I.1
  • 4
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J. 40(3), pp. 614-634, 2001.
    • (2001) IBM Syst. J , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 10
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • A. Teoh Beng Jin, D. Ngo Chek Ling, and A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognition 37(11), pp. 2245-2255, 2004.
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Teoh Beng Jin, A.1    Ngo Chek Ling, D.2    Goh, A.3
  • 12
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Proceeding of International Conference on Audio and Video Based Biometric Person Authentication
    • J. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," Proceeding of International Conference on Audio and Video Based Biometric Person Authentication (LNCS 2688), pp. 393-402, 2003.
    • (2003) LNCS , vol.2688 , pp. 393-402
    • Linnartz, J.1    Tuyls, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.