메뉴 건너뛰기




Volumn 54, Issue 5, 2008, Pages 2026-2040

Entropy analysis and new constructions of biometric key generation systems

Author keywords

Biometric authentication; Biometric key; Covering radius; Euclidean metric; Face biometrics; Hamming metric; Key revocation; Perfect codes; Reed Solomon codes; Shannon entropy; Template protection

Indexed keywords

AUTHENTICATION; FACE RECOGNITION; HAMMING DISTANCE; REED-SOLOMON CODES; SECURITY OF DATA; SIGNAL PROCESSING; TEMPLATE MATCHING;

EID: 43749087125     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.920211     Document Type: Article
Times cited : (28)

References (26)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 2
    • 33646728406 scopus 로고    scopus 로고
    • Face authentication using one-class support vector machines
    • Advances in Biometric Person Authentication, International Workshop on Biometric Recognition Systems IWBRS '05, Berlin, Germany: Springer-Verlag
    • M. Bicego, E. Grosso, and M. Tistarelli, "Face authentication using one-class support vector machines," in Advances in Biometric Person Authentication - International Workshop on Biometric Recognition Systems IWBRS '05, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2005, vol. 3781, pp. 15-22.
    • (2005) ser. Lecture Notes in Computer Science , vol.3781 , pp. 15-22
    • Bicego, M.1    Grosso, E.2    Tistarelli, M.3
  • 4
    • 33746049783 scopus 로고    scopus 로고
    • Hiding secret points amidst chaff
    • Advances in Cryptology, EUROCRYPT '06, Berlin, Germany: Springer-Verlag
    • E.-C. Chang and Q. Li, "Hiding secret points amidst chaff," in Advances in Cryptology - EUROCRYPT '06, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2006, vol. 4004, pp. 59-72.
    • (2006) ser. Lecture Notes in Computer Science , vol.4004 , pp. 59-72
    • Chang, E.-C.1    Li, Q.2
  • 5
    • 38149087056 scopus 로고
    • Secret sharing over infinite domains
    • Advances in Cryptology, CRYPTO '89, Berlin, Germany: Springer-Verlag
    • B. Chor and E. Kushilevitz, "Secret sharing over infinite domains," in Advances in Cryptology - CRYPTO '89, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1990, vol. 434, pp. 299-306.
    • (1990) ser. Lecture Notes in Computer Science , vol.434 , pp. 299-306
    • Chor, B.1    Kushilevitz, E.2
  • 6
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identification
    • G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Security Privacy, 1998, pp. 148-157.
    • (1998) Proc. IEEE Symp. Security Privacy , pp. 148-157
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3
  • 7
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Advances in Cryptology, EUROCRYPT '04, Berlin, Germany: Springer-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology - EUROCRYPT '04, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2004, vol. 3027, pp. 523-540.
    • (2004) ser. Lecture Notes in Computer Science , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 9
    • 0023417913 scopus 로고
    • On the relationship between the information measures and the Bayes probability of error
    • Sep
    • J. Dj. Golić, "On the relationship between the information measures and the Bayes probability of error," IEEE Trans. Inf. Theory, vol. IT-33, no. 5, pp. 681-693, Sep. 1987.
    • (1987) IEEE Trans. Inf. Theory , vol.IT-33 , Issue.5 , pp. 681-693
    • Golić, J.D.1
  • 10
    • 43749107395 scopus 로고    scopus 로고
    • F. Hao, R. Anderson, and J. Daugman, Combining cryptography with biometrics effectively, Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-640, 2005.
    • F. Hao, R. Anderson, and J. Daugman, "Combining cryptography with biometrics effectively," Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-640, 2005.
  • 11
    • 0345253860 scopus 로고    scopus 로고
    • Construction of pseudorandom number generator from any one-way function
    • J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby, "Construction of pseudorandom number generator from any one-way function," SIAM J. Comput., vol. 28, pp. 1364-1396, 1999.
    • (1999) SIAM J. Comput , vol.28 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 14
    • 38149140493 scopus 로고    scopus 로고
    • A fuzzy commitment scheme,
    • PCT Appl. WO 00/51244 A1, Aug. 2000
    • A. Juels and M. Wattenberg, "A fuzzy commitment scheme," PCT Appl. WO 00/51244 A1, Aug. 2000.
    • Juels, A.1    Wattenberg, M.2
  • 16
    • 33646095185 scopus 로고    scopus 로고
    • An analysis of BioHashing and its variants
    • A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of BioHashing and its variants," Pattern Recognit., vol. 39, no. 7, pp. 1359-1368, 2006.
    • (2006) Pattern Recognit , vol.39 , Issue.7 , pp. 1359-1368
    • Kong, A.1    Cheung, K.-H.2    Zhang, D.3    Kamel, M.4    You, J.5
  • 17
    • 77649250983 scopus 로고    scopus 로고
    • Secure sketch for biometric templates
    • Advances in Cryptology, ASIACRYPT '06, Berlin, Germany: Springer-Verlag
    • Q. Li, Y. Sutcu, and N. Memon, "Secure sketch for biometric templates," in Advances in Cryptology - ASIACRYPT '06, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2006, vol. 4284, pp. 99-113.
    • (2006) ser. Lecture Notes in Computer Science , vol.4284 , pp. 99-113
    • Li, Q.1    Sutcu, Y.2    Memon, N.3
  • 19
    • 0002956996 scopus 로고    scopus 로고
    • Bounds for dispersers, extractors, and depth-two superconcentrators
    • J. Radhakrishnan and A. Ta-Shma, "Bounds for dispersers, extractors, and depth-two superconcentrators," SIAM J. Discrete Math., vol. 13, pp. 2-24, 2000.
    • (2000) SIAM J. Discrete Math , vol.13 , pp. 2-24
    • Radhakrishnan, J.1    Ta-Shma, A.2
  • 20
    • 33846089260 scopus 로고    scopus 로고
    • Guessing under source uncertainty
    • Jan
    • R. Sundaresan, "Guessing under source uncertainty," IEEE Trans. Inf. Theory, vol. 53, no. 1, pp. 269-287, Jan. 2007.
    • (2007) IEEE Trans. Inf. Theory , vol.53 , Issue.1 , pp. 269-287
    • Sundaresan, R.1
  • 21
    • 0035358438 scopus 로고    scopus 로고
    • Convexity-based visual camouflage breaking
    • A. Tankus and Y. Yeshurun, "Convexity-based visual camouflage breaking," Comput. Vis. Image Understand., vol. 82, no. 3, pp. 208-237, 2001.
    • (2001) Comput. Vis. Image Understand , vol.82 , Issue.3 , pp. 208-237
    • Tankus, A.1    Yeshurun, Y.2
  • 22
    • 8344273612 scopus 로고    scopus 로고
    • Personalized cryptographic key generation based on FaceHashing
    • Oct
    • A. B. J. Teoh, D. C. L. Ngo, and A. Goh, "Personalized cryptographic key generation based on FaceHashing," Comput. Security, vol. 23, no. 7, pp. 606-614, Oct. 2004.
    • (2004) Comput. Security , vol.23 , Issue.7 , pp. 606-614
    • Teoh, A.B.J.1    Ngo, D.C.L.2    Goh, A.3
  • 23
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • ECCW Workshop BioAW, Berlin, Germany: Springer-Verlag
    • P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in ECCW Workshop BioAW, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2004, vol. 3087, pp. 158-170.
    • (2004) ser. Lecture Notes in Computer Science , vol.3087 , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 24
    • 33750726983 scopus 로고    scopus 로고
    • Read-proof hardware from protective coatings
    • Cryptographic Hardware and Embedded Systems, CHES '06, Berlin, Germany: Springer-Verlag
    • P. Tuyls, G.-J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, and R. Wolters, "Read-proof hardware from protective coatings," in Cryptographic Hardware and Embedded Systems - CHES '06, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2006, vol. 4249. pp. 369-383.
    • (2006) ser. Lecture Notes in Computer Science , vol.4249 , pp. 369-383
    • Tuyls, P.1    Schrijen, G.-J.2    Skoric, B.3    van Geloven, J.4    Verhaegh, N.5    Wolters, R.6
  • 26
    • 38149047062 scopus 로고    scopus 로고
    • Method of using biometric information for secret generation,
    • PCT Appl. WO 02/078249 A1, Mar. 2001
    • Y. D. Wu, "Method of using biometric information for secret generation," PCT Appl. WO 02/078249 A1, Mar. 2001.
    • Wu, Y.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.