메뉴 건너뛰기




Volumn 5558 LNCS, Issue , 2009, Pages 1060-1069

Robust biometric key extraction based on iris cryptosystem

Author keywords

Biometrics; Bit masking scheme; Concatenated coding scheme; Convolutional code; Cryptography; Iris code; Key binding; Reed Solomon code

Indexed keywords

CODING SCHEME; CONCATENATED CODING; CONCATENATED CODING SCHEME; CRYPTOGRAPHIC KEY MANAGEMENT; CRYPTOSYSTEMS; ERROR PATTERNS; INFORMATION SECURITY; IRIS CODE; IRIS DATA; KEY BINDING; MASKING SCHEMES; TEMPLATE PROTECTION;

EID: 69949142920     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01793-3_107     Document Type: Conference Paper
Times cited : (33)

References (14)
  • 6
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • Kanade, T., Jain, A., Ratha, N.K. (eds). Springer, Heidelberg
    • Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.3546, pp. 436-446. Springer, Heidelberg (2005)
    • (2005) AVBPA 2005. LNCS , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.H.M.2    Kevenaar, T.A.M.3    Schrijen, G.-J.4    Bazen, A.M.5    Veldhuis, R.N.J.6
  • 9
    • 26444525625 scopus 로고    scopus 로고
    • Fuzzy vault for fingerprints
    • Kanade, T., Jain, A., Ratha, N.K. (eds). Springer, Heidelberg
    • Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.3546, pp. 310-319. Springer, Heidelberg (2005)
    • (2005) AVBPA 2005. LNCS , vol.3546 , pp. 310-319
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 10
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Cachin, C., Camenisch, J.L. (eds). Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 12
    • 27644463544 scopus 로고    scopus 로고
    • Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures
    • Itakura, Y., Tsujii, S.: Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. International Journal of Information Security, 288-296 (2005)
    • (2005) International Journal of Information Security , pp. 288-296
    • Itakura, Y.1    Tsujii, S.2
  • 13
    • 69949139037 scopus 로고    scopus 로고
    • Security Considerations for the Implementation of Biometric Systems
    • Ratha, N., Bolle, R. (eds). Springer, Heidelberg
    • Soutar, C.: Security Considerations for the Implementation of Biometric Systems. In: Ratha, N., Bolle, R. (eds.) Automatic Fingerprint Recognition Systems, pp. 415-1131 Springer, Heidelberg (2004)
    • (2004) Automatic Fingerprint Recognition Systems , pp. 415-1131
    • Soutar, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.