메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Fuzzy extractors for asymmetric biometric representations

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC TEMPLATES; CRYPTOGRAPHIC PRIMITIVES; DATA-SETS; ERROR-TOLERANT; FEATURE REPRESENTATION; FUZZY EXTRACTORS; HIGH-QUALITY; INFORMATION LEAKAGES; SECRET KEYS;

EID: 51849101651     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CVPRW.2008.4563113     Document Type: Conference Paper
Times cited : (34)

References (27)
  • 4
    • 37849004136 scopus 로고    scopus 로고
    • Feeling is believing: A secure template exchange protocol
    • International Conference on Biometrics, of
    • I. Buhan. J. Doumen, P. Hartel, and R. Veldhuis. Feeling is believing: a secure template exchange protocol. In International Conference on Biometrics, volume 4642 of LNCS, pages 897-906, 2007.
    • (2007) LNCS , vol.4642 , pp. 897-906
    • Buhan, I.1    Doumen, J.2    Hartel, P.3    Veldhuis, R.4
  • 5
    • 33746049783 scopus 로고    scopus 로고
    • Hiding secret points amidst chaff
    • Eurocrypt, of, St. Petersburg, Russia, May, Springer Verlag
    • E.-C. Chang and Q. Li. Hiding secret points amidst chaff. In Eurocrypt, volume 4004 of LNCS, pages 59-72, St. Petersburg, Russia, May 2006. Springer Verlag.
    • (2006) LNCS , vol.4004 , pp. 59-72
    • Chang, E.-C.1    Li, Q.2
  • 8
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Eurocrypt, of, Springer-Verlag
    • Y. Dodis. L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Eurocrypt, volume 3027 of LNCS, pages 523-540. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 9
    • 33750918446 scopus 로고    scopus 로고
    • Combining cryptography with biometrics effectively
    • Technical Report UCAM-CL-TR-640. University of Cambridge
    • F. Hao, R. Anderson, and J. Daugman. Combining cryptography with biometrics effectively. Technical Report UCAM-CL-TR-640. University of Cambridge, 2005.
    • (2005)
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 13
    • 37849002150 scopus 로고    scopus 로고
    • 3D Face: Biometric template protection for 3D face recognition
    • International Conference on Biometrics, of
    • E. Kelkboom, B. Gökberk, T. Kevenaar, A. Akkermans, and M. van der Veen. "3D Face": Biometric template protection for 3D face recognition. In International Conference on Biometrics, volume 4642 of LNCS, pages 566-573, 2007.
    • (2007) LNCS , vol.4642 , pp. 566-573
    • Kelkboom, E.1    Gökberk, B.2    Kevenaar, T.3    Akkermans, A.4    van der Veen, M.5
  • 15
    • 34548057917 scopus 로고    scopus 로고
    • Secure sketch for biometric templates
    • Shanghai, China, December
    • Q. Li, Y. Sutcu, and N. Memon. Secure sketch for biometric templates. In Asiacrypt, Shanghai, China, December 2006.
    • (2006) Asiacrypt
    • Li, Q.1    Sutcu, Y.2    Memon, N.3
  • 16
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • J.-P. M. G. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA 2003, pages 393-402, 2003.
    • (2003) AVBPA 2003 , pp. 393-402
    • Linnartz, J.-P.M.G.1    Tuyls, P.2
  • 19
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614-634, 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.1    Connell, J.2    Bolle, R.3
  • 23
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
    • A. Teoh, A. Gho, and D. Ngo. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12):1892-1901. 2006.
    • (2006) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.1    Gho, A.2    Ngo, D.3
  • 26
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • P. Tuyls and J. Goseling. Capacity and examples of template-protecting biometric authentication systems. In ECCV Workshop BioAW, pages 158-170, 2004.
    • (2004) ECCV Workshop BioAW , pp. 158-170
    • Tuyls, P.1    Goseling, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.