메뉴 건너뛰기




Volumn 5308 LNCS, Issue , 2008, Pages 294-310

Embedding renewable cryptographic keys into continuous noisy data

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 57049133508     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88625-9_20     Document Type: Conference Paper
Times cited : (11)

References (21)
  • 1
    • 0037854454 scopus 로고    scopus 로고
    • The duality between information embedding and source coding with side information and some applications
    • Barron, R.J., Chen, B., Wornell, G.W.: The duality between information embedding and source coding with side information and some applications. IEEE Transactions on Information Theory 49(5), 1159-1180 (2003)
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.5 , pp. 1159-1180
    • Barron, R.J.1    Chen, B.2    Wornell, G.W.3
  • 2
    • 14844335721 scopus 로고    scopus 로고
    • Reusable cryptographic fuzzy extractors
    • Atluri, V, Pfitzmann, B, McDaniel, P.D, eds, ACM, New York
    • Boyen, X.: Reusable cryptographic fuzzy extractors. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) ACM Conference on Computer and Communications Security, pp. 82-91. ACM, New York (2004)
    • (2004) ACM Conference on Computer and Communications Security , pp. 82-91
    • Boyen, X.1
  • 5
    • 0035251780 scopus 로고    scopus 로고
    • Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia
    • Chen, B., Wornell, G.W.: Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia. The Journal of VLSI Signal Processing 27(1), 7-33 (2001)
    • (2001) The Journal of VLSI Signal Processing , vol.27 , Issue.1 , pp. 7-33
    • Chen, B.1    Wornell, G.W.2
  • 6
    • 0033601681 scopus 로고    scopus 로고
    • Dither modulation: A new approach to digital watermarking and information embedding
    • Chen, B., Wornell, G.W.: Dither modulation: a new approach to digital watermarking and information embedding. In: Proceedings of SPIE, vol. 3657, p. 342 (2003)
    • (2003) Proceedings of SPIE , vol.3657 , pp. 342
    • Chen, B.1    Wornell, G.W.2
  • 8
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 10
    • 0018491303 scopus 로고
    • Asymptotically optimal block quantization
    • Gersho, A.: Asymptotically optimal block quantization. IEEE Transactions on Information Theory 25(4), 373-380 (1979)
    • (1979) IEEE Transactions on Information Theory , vol.25 , Issue.4 , pp. 373-380
    • Gersho, A.1
  • 12
    • 77649250983 scopus 로고    scopus 로고
    • Secure sketch for biometric templates
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Li, Q., Sutcu, Y., Memon, N.: Secure sketch for biometric templates. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 99-113. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 99-113
    • Li, Q.1    Sutcu, Y.2    Memon, N.3
  • 13
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Kittler, J, Nixon, M.S, eds, AVBPA 2003, Springer, Heidelberg
    • Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2688 , pp. 393-402
    • Linnartz, J.P.1    Tuyls, P.2
  • 14
  • 15
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion
    • Maurer, U.: Secret key agreement by public discussion. IEEE Transaction on Information Theory 39(3), 733-742 (1993)
    • (1993) IEEE Transaction on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 17
    • 26444544536 scopus 로고    scopus 로고
    • Skoric, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 401-422. Springer, Heidelberg (2005)
    • Skoric, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 401-422. Springer, Heidelberg (2005)
  • 18
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • Kanadì, T, Jain, A, Ratha, N.K, eds, AVBPA 2005, Springer, Heidelberg
    • Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A., Veldhuis, R.: Practical biometric authentication with template protection. In: Kanadì, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436-446. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.2    Kevenaar, T.3    Schrijen, G.4    Bazen, A.5    Veldhuis, R.6
  • 19
    • 33845435077 scopus 로고    scopus 로고
    • Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, 3087, pp. 158-170. Springer, Heidelberg (2004)
    • Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158-170. Springer, Heidelberg (2004)
  • 21
    • 0028515296 scopus 로고
    • Number of nearest neighbors in a euclidean code
    • Zeger, K., Gersho, A.: Number of nearest neighbors in a euclidean code. IEEE Transactions on Information Theory 40(5), 1647-1649 (1994)
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.5 , pp. 1647-1649
    • Zeger, K.1    Gersho, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.