메뉴 건너뛰기




Volumn 3, Issue 4, 2008, Pages 673-683

Theoretical and practical boundaries of binary secure sketches

Author keywords

Biometrics; Boundaries; Fingerprint; Iris; Min sum decoding; Secure sketches

Indexed keywords

BIOMETRICS; ERROR CORRECTION; SEMICONDUCTOR INSULATOR BOUNDARIES;

EID: 56749174787     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.2002937     Document Type: Article
Times cited : (83)

References (42)
  • 3
    • 33646034883 scopus 로고    scopus 로고
    • A fuzzy sketch with trapdoor
    • May
    • J. Bringer, H. Chabanne, and Q. D. Do, "A fuzzy sketch with trapdoor," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2266-2269, May 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.5 , pp. 2266-2269
    • Bringer, J.1    Chabanne, H.2    Do, Q.D.3
  • 4
    • 45449114377 scopus 로고    scopus 로고
    • J. Bringer and H. Chabanne, An authentication protocol with encrypted biometric data, in AFRICACRYPT, 2008, Lect. Notes Comput. Sci., pp. 109-124.
    • J. Bringer and H. Chabanne, "An authentication protocol with encrypted biometric data," in AFRICACRYPT, 2008, vol. Lect. Notes Comput. Sci., pp. 109-124.
  • 5
    • 38149070898 scopus 로고    scopus 로고
    • J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang, and S. Zimmer, An application of the Goldwasser-Micali cryptosystem to biometric authentication, in ACISP, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., 2007, 4586, pp. 96-106, ser. Lect. Notes Comput. Sci.
    • J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang, and S. Zimmer, "An application of the Goldwasser-Micali cryptosystem to biometric authentication," in ACISP, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., 2007, vol. 4586, pp. 96-106, ser. Lect. Notes Comput. Sci.
  • 6
    • 5044245853 scopus 로고    scopus 로고
    • Generalized coset schemes for the wire-tap channel: Application to biometrics
    • Chicago, IL
    • G. Cohen and G. Zémor, "Generalized coset schemes for the wire-tap channel: Application to biometrics," in Proc. IEEE Int. Symp. Information Theory, Chicago, IL, 2004, p. 46.
    • (2004) Proc. IEEE Int. Symp. Information Theory , pp. 46
    • Cohen, G.1    Zémor, G.2
  • 7
    • 33646061716 scopus 로고    scopus 로고
    • The wire-tap channel applied to biometrics
    • presented at the, Information Theory and Applications, Parma, Italy
    • G. Cohen and G. Zémor, "The wire-tap channel applied to biometrics," presented at the Int. Symp. Information Theory and Applications, Parma, Italy, 2004.
    • (2004) Int. Symp
    • Cohen, G.1    Zémor, G.2
  • 8
    • 48649107830 scopus 로고    scopus 로고
    • Syndrome-coding for the wiretap channel revisited
    • Chengdu, China
    • G. Cohen and G. Zémor, "Syndrome-coding for the wiretap channel revisited," in Proc. IEEE Information Theory Workshop, Chengdu, China, 2006, pp. 33-36.
    • (2006) Proc. IEEE Information Theory Workshop , pp. 33-36
    • Cohen, G.1    Zémor, G.2
  • 9
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • Proc. EUROCRYPT, R. Cramer, Ed, Notes Comput. Sci
    • X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, "Secure remote authentication using biometric data," in Proc. EUROCRYPT, R. Cramer, Ed., 2005, vol. 3494, pp. 147-163, ser. Lect. Notes Comput. Sci.
    • (2005) ser. Lect , vol.3494 , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 10
    • 54049123956 scopus 로고    scopus 로고
    • Perfectly secure authorization and passive identification for an error tolerant biometric system
    • Proc. IMA Int. Conf, M. Walker, Ed, Notes Comput. Sci
    • G. I. Davida and Y. Frankel, "Perfectly secure authorization and passive identification for an error tolerant biometric system," in Proc. IMA Int. Conf., M. Walker, Ed., 1999, vol. .1746, pp. 104-113, ser. Lect. Notes Comput. Sci.
    • (1999) ser. Lect , vol.1746 , pp. 104-113
    • Davida, G.I.1    Frankel, Y.2
  • 11
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Proc. EUROCRYPT, C. Cachin and J. Camenisch, Eds, Notes Comput. Sci
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. EUROCRYPT, C. Cachin and J. Camenisch, Eds., 2004, vol. 3027, pp. 523-540, ser. Lect. Notes Comput. Sci.
    • (2004) ser. Lect , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 12
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • Proc. ECCV Workshop BioAW, D. Maltoni and A. K. Jain, Eds, Notes Comput. Sci
    • P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in Proc. ECCV Workshop BioAW, D. Maltoni and A. K. Jain, Eds., 2004, vol. 3087, pp. 158-170, ser. Lect. Notes Comput. Sci.
    • (2004) ser. Lect , vol.3087 , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 13
    • 84892356135 scopus 로고    scopus 로고
    • Computationally secure authentication with noisy data
    • Berlin, Germany: Springer-Verlag
    • B. Schoenmakers and P. Tuyls, "Computationally secure authentication with noisy data," in Security With Noisy Data. Berlin, Germany: Springer-Verlag, 2007, pp. 141-152.
    • (2007) Security With Noisy Data , pp. 141-152
    • Schoenmakers, B.1    Tuyls, P.2
  • 14
    • 33750954911 scopus 로고    scopus 로고
    • T. A. M. Kevenaar, G. J. Schrijen, M. van der Veen, A. H. M. Akkermans, and F. Zuo, Face recognition with renewable and privacy preserving binary templates, in Proc. AutoID, Buffalo, NY, Oct. 17-18, 2005, pp. 21-26.
    • T. A. M. Kevenaar, G. J. Schrijen, M. van der Veen, A. H. M. Akkermans, and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. AutoID, Buffalo, NY, Oct. 17-18, 2005, pp. 21-26.
  • 15
    • 26444507172 scopus 로고    scopus 로고
    • P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, Practical biometric authentication with template protection, in Proc. Audio-and Video-Based Biometrie Person Authentication, T. Kanade, A. K. Jain, and N. K. Ratha, Eds., 2005, 3546, pp. 436-446.
    • P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical biometric authentication with template protection," in Proc. Audio-and Video-Based Biometrie Person Authentication, T. Kanade, A. K. Jain, and N. K. Ratha, Eds., 2005, vol. 3546, pp. 436-446.
  • 16
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • Sep
    • F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Comput., vol. 55, no. 9, pp. 1081-1088, Sep. 2006.
    • (2006) IEEE Trans. Comput , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 17
    • 0036487317 scopus 로고    scopus 로고
    • The importance of being random: Statistical principles of iris recognition
    • J. Daugman, "The importance of being random: Statistical principles of iris recognition," Pattern Recognit., vol. 36, no. 2, pp. 279-291, 2003.
    • (2003) Pattern Recognit , vol.36 , Issue.2 , pp. 279-291
    • Daugman, J.1
  • 21
    • 84940644968 scopus 로고    scopus 로고
    • C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J., 27, pp. 379-423, 1948, 623-656.
    • C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, 1948, 623-656.
  • 22
    • 33750963269 scopus 로고    scopus 로고
    • Iris recognition and verification experiments with improved segmentation method
    • Buffalo, NY, Oct. 17-18
    • X. Liu, K. W. Bowyer, and P. J. Flynn, "Iris recognition and verification experiments with improved segmentation method," in Proc. AutoID, Buffalo, NY, Oct. 17-18, 2005, pp. 118-123.
    • (2005) Proc. AutoID , pp. 118-123
    • Liu, X.1    Bowyer, K.W.2    Flynn, P.J.3
  • 24
    • 56749084112 scopus 로고    scopus 로고
    • CASIA, Chinese Academy of Science, Inst. Automation. [Online], Available: http://www.sinobiometrics.com/Database.htm.
    • CASIA, Chinese Academy of Science, Inst. Automation. [Online], Available: http://www.sinobiometrics.com/Database.htm.
  • 25
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • Nov
    • J. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Mach. Intell., vol. 15, no. 11, pp. 1148-1161, Nov. 1993.
    • (1993) IEEE Trans. Pattern Anal. Mach. Intell , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.1
  • 26
    • 0031236835 scopus 로고    scopus 로고
    • Automated iris recognition: An emerging biometric technology
    • Sep
    • R. Wildes, "Automated iris recognition: An emerging biometric technology," Proc. IEEE, vol. 85, no. 9, pp. 1348-1363, Sep. 1997.
    • (1997) Proc. IEEE , vol.85 , Issue.9 , pp. 1348-1363
    • Wildes, R.1
  • 29
    • 56749111051 scopus 로고    scopus 로고
    • Using distributed source coding to secure fingerprint biometrics
    • Mitsubishi Elect. Res. Labs, Tech. Rep. TR 2007-005, Jan
    • S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia, "Using distributed source coding to secure fingerprint biometrics," Mitsubishi Elect. Res. Labs, Tech. Rep. TR 2007-005, Jan. 2007.
    • (2007)
    • Draper, S.1    Khisti, A.2    Martinian, E.3    Vetro, A.4    Yedidia, J.S.5
  • 30
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Audio-and Video-Based Biometric Person Authentication, J. Kittler and M. S. Nixon, Eds, Notes Comput. Sci
    • J.-P. M. G. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in Audio-and Video-Based Biometric Person Authentication, J. Kittler and M. S. Nixon, Eds., 2003, vol. 2688, pp. 393-402, ser. Lect. Notes Comput. Sci.
    • (2003) ser. Lect , vol.2688 , pp. 393-402
    • Linnartz, J.-P.M.G.1    Tuyls, P.2
  • 31
    • 56749099116 scopus 로고    scopus 로고
    • The best of both worlds: Applying secure sketches to cancelable biometrics
    • presented at the, Luxembourg
    • J. Bringer, H. Chabanne, and B. Kindarji, "The best of both worlds: Applying secure sketches to cancelable biometrics," presented at the WISSec, Luxembourg City, Luxembourg, 2007.
    • (2007) WISSec, Luxembourg City
    • Bringer, J.1    Chabanne, H.2    Kindarji, B.3
  • 32
    • 26444519630 scopus 로고    scopus 로고
    • Detection of cores in fingerprints with improved dimension reduction
    • Hilvarenbeek, The Netherlands
    • A. M. Bazen and R. N. J. Veldhuis, "Detection of cores in fingerprints with improved dimension reduction," in Proc. 4th IEEE Benelux Signal Processing Symp., Hilvarenbeek, The Netherlands, 2004, pp. 41-44.
    • (2004) Proc. 4th IEEE Benelux Signal Processing Symp , pp. 41-44
    • Bazen, A.M.1    Veldhuis, R.N.J.2
  • 33
    • 0036647191 scopus 로고    scopus 로고
    • Systematic methods for the computation of the directional fields and singular points of fingerprints
    • Jul
    • A. M. Bazen and S. H. Gerez, "Systematic methods for the computation of the directional fields and singular points of fingerprints," IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 7, pp. 905-919, Jul. 2002.
    • (2002) IEEE Trans. Pattern Anal. Mach. Intell , vol.24 , Issue.7 , pp. 905-919
    • Bazen, A.M.1    Gerez, S.H.2
  • 36
    • 0034290919 scopus 로고    scopus 로고
    • The FERET evaluation methodology for face-recognition algorithms
    • Oct
    • P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, "The FERET evaluation methodology for face-recognition algorithms," IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 10, pp. 1090-1104, Oct. 2000.
    • (2000) IEEE Trans. Pattern Anal. Mach. Intell , vol.22 , Issue.10 , pp. 1090-1104
    • Phillips, P.J.1    Moon, H.2    Rizvi, S.A.3    Rauss, P.J.4
  • 37
    • 33846223680 scopus 로고    scopus 로고
    • Pasadena, CA, Online, Available:, Calif. Inst. Technol
    • M. Weber, "Frontal face dataset" Pasadena, CA, 1999 [Online]. Available: http://www.vision.caltech.edu/html-files/archive, Calif. Inst. Technol.
    • (1999) Frontal face dataset
    • Weber, M.1
  • 38
    • 0003846836 scopus 로고    scopus 로고
    • Codes and decoding on general graphs,
    • Ph.D. dissertation, Linkoping Univ, Linkoping, Sweden
    • N. Wiberg, "Codes and decoding on general graphs," Ph.D. dissertation, Linkoping Univ., Linkoping, Sweden, 1996.
    • (1996)
    • Wiberg, N.1
  • 39
    • 0019608335 scopus 로고
    • A recursive approach to low-complexity codes
    • Sep
    • R. M. Tanner, "A recursive approach to low-complexity codes," IEEE Trans. Inf. Theory, vol. IT-27, no. 5, pp. 533-547, Sep. 1981.
    • (1981) IEEE Trans. Inf. Theory , vol.IT-27 , Issue.5 , pp. 533-547
    • Tanner, R.M.1
  • 40
    • 0002669842 scopus 로고
    • Application of boolean algebra to switching circuit design and to error detection
    • D. E. Muller, "Application of boolean algebra to switching circuit design and to error detection," IEEE Trans. Electron. Comput., vol. 3, pp. 6-12, 1954.
    • (1954) IEEE Trans. Electron. Comput , vol.3 , pp. 6-12
    • Muller, D.E.1
  • 41
    • 9144245836 scopus 로고
    • A class of multiple-error-correcting codes and their decoding scheme
    • Sep
    • I. S. Reed, "A class of multiple-error-correcting codes and their decoding scheme," IEEE Trans. Inf. Theory, vol. 4, no. 4, pp. 38-42, Sep. 1954.
    • (1954) IEEE Trans. Inf. Theory , vol.4 , Issue.4 , pp. 38-42
    • Reed, I.S.1
  • 42
    • 35148835074 scopus 로고    scopus 로고
    • New methods in iris recognition
    • Oct
    • J. Daugman, "New methods in iris recognition," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 5, pp. 1167-1175, Oct. 2007.
    • (2007) IEEE Trans. Syst., Man, Cybern. B, Cybern , vol.37 , Issue.5 , pp. 1167-1175
    • Daugman, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.