-
1
-
-
0037854454
-
The duality between information embedding and source coding with side information and some applications
-
Barron, R.J., Chen, B., Wornell, G.W.: The duality between information embedding and source coding with side information and some applications. IEEE Transactions on Information Theory 49(5), 1159-1180 (2003)
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.5
, pp. 1159-1180
-
-
Barron, R.J.1
Chen, B.2
Wornell, G.W.3
-
2
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
Atluri, V, Pfitzmann, B, McDaniel, P.D, eds, ACM, New York
-
Boyen, X.: Reusable cryptographic fuzzy extractors. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) ACM Conference on Computer and Communications Security, pp. 82-91. ACM, New York (2004)
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 82-91
-
-
Boyen, X.1
-
3
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
Deng, R, Samarati, P, eds, ACM, New York
-
Buhan, I., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. In: Deng, R., Samarati, P. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 353-355. ACM, New York (2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 353-355
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
4
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
IEEE, Los Alamitos
-
Chang, Y.J., Zhang, W., Chen, T.: Biometrics-based cryptographic key generation. In: International Conference on Multimedia and Expo (ICME), pp. 2203-2206. IEEE, Los Alamitos (2004)
-
(2004)
International Conference on Multimedia and Expo (ICME)
, pp. 2203-2206
-
-
Chang, Y.J.1
Zhang, W.2
Chen, T.3
-
5
-
-
0035251780
-
Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia
-
Chen, B., Wornell, G.W.: Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia. The Journal of VLSI Signal Processing 27(1), 7-33 (2001)
-
(2001)
The Journal of VLSI Signal Processing
, vol.27
, Issue.1
, pp. 7-33
-
-
Chen, B.1
Wornell, G.W.2
-
6
-
-
0033601681
-
Dither modulation: A new approach to digital watermarking and information embedding
-
Chen, B., Wornell, G.W.: Dither modulation: a new approach to digital watermarking and information embedding. In: Proceedings of SPIE, vol. 3657, p. 342 (2003)
-
(2003)
Proceedings of SPIE
, vol.3657
, pp. 342
-
-
Chen, B.1
Wornell, G.W.2
-
7
-
-
48649088535
-
Multi-bits biometric string generation based on the likelyhood ratio
-
IEEE, Los Alamitos
-
Chen, C., Veldhuis, R.N.J., Kevenaar, T.A.M., Akkermans, A.H.M.: Multi-bits biometric string generation based on the likelyhood ratio. In: IEEE conference on Biometrics: Theory, Applications and Systems, pp. 1-6. IEEE, Los Alamitos (2007)
-
(2007)
IEEE conference on Biometrics: Theory, Applications and Systems
, pp. 1-6
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
8
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
10
-
-
0018491303
-
Asymptotically optimal block quantization
-
Gersho, A.: Asymptotically optimal block quantization. IEEE Transactions on Information Theory 25(4), 373-380 (1979)
-
(1979)
IEEE Transactions on Information Theory
, vol.25
, Issue.4
, pp. 373-380
-
-
Gersho, A.1
-
12
-
-
77649250983
-
Secure sketch for biometric templates
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Li, Q., Sutcu, Y., Memon, N.: Secure sketch for biometric templates. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 99-113. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
13
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Kittler, J, Nixon, M.S, eds, AVBPA 2003, Springer, Heidelberg
-
Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2688
, pp. 393-402
-
-
Linnartz, J.P.1
Tuyls, P.2
-
14
-
-
77952402063
-
Perfect cryptographic security from partially independent channels
-
ACM Press, New York
-
Maurer, U.: Perfect cryptographic security from partially independent channels. In: Proceedings of the 23rd ACM Symposium on Theory of Computing (STOC), pp. 561-572. ACM Press, New York (1991)
-
(1991)
Proceedings of the 23rd ACM Symposium on Theory of Computing (STOC)
, pp. 561-572
-
-
Maurer, U.1
-
15
-
-
0027599802
-
Secret key agreement by public discussion
-
Maurer, U.: Secret key agreement by public discussion. IEEE Transaction on Information Theory 39(3), 733-742 (1993)
-
(1993)
IEEE Transaction on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
17
-
-
26444544536
-
-
Skoric, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 401-422. Springer, Heidelberg (2005)
-
Skoric, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 401-422. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
26444507172
-
Practical biometric authentication with template protection
-
Kanadì, T, Jain, A, Ratha, N.K, eds, AVBPA 2005, Springer, Heidelberg
-
Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A., Veldhuis, R.: Practical biometric authentication with template protection. In: Kanadì, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436-446. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.4
Bazen, A.5
Veldhuis, R.6
-
19
-
-
33845435077
-
-
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, 3087, pp. 158-170. Springer, Heidelberg (2004)
-
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158-170. Springer, Heidelberg (2004)
-
-
-
-
20
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE 92(6), 948-960 (2004)
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
|