메뉴 건너뛰기




Volumn , Issue , 2009, Pages 372-379

Quantization effects in biometric systems

Author keywords

[No Author keywords available]

Indexed keywords

BINARY QUANTIZATION; BIOMETRIC SYSTEMS; CORRELATION COEFFICIENT; GAUSSIANS; KEY GENERATION; LEAKAGE RATES; QUANTIZATION EFFECTS; SQUARED CORRELATION COEFFICIENTS;

EID: 70349266556     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITA.2009.5044973     Document Type: Conference Paper
Times cited : (15)

References (31)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing, " IEEE Trans. Inform. Theory, vol.IT-39, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.IT-39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 2
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography - Part II: CR capacity
    • January
    • R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography - Part II: CR Capacity, " IEEE Trans. Inform. Theory, vol.IT-44, pp. 225 - 240, January 1998.
    • (1998) IEEE Trans. Inform. Theory , vol.IT-44 , pp. 225-240
    • Ahlswede, R.1    Csiszar, I.2
  • 3
    • 0016037985 scopus 로고
    • A simple converse for broadcast channels with additive white gaussian noise
    • March
    • P. Bergmans, "A Simple Converse for Broadcast Channels with Additive White Gaussian Noise, " IEEE Trans. Inform. Th., Vol.IT - 20, No.2, pp. 279 - 280, March 1974.
    • (1974) IEEE Trans. Inform. Th. , vol.IT-20 , Issue.2 , pp. 279-280
    • Bergmans, P.1
  • 5
    • 0016486048 scopus 로고
    • A proof of the data compression theorem of slepain and wolf for ergodic sources
    • March
    • T.M. Cover, "A Proof of the Data Compression Theorem of Slepain and Wolf for Ergodic Sources, " IEEE Trans. Inform. Theory, vol.IT-22, pp. 226 - 228, March 1975.
    • (1975) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 226-228
    • Cover, T.M.1
  • 6
    • 0033891095 scopus 로고    scopus 로고
    • Common randomnness and secret key generation with a helper
    • March
    • I. Csiszar and P. Narayan, "Common Randomnness and Secret Key Generation with a Helper, " IEEE Trans. Inform. Theory, vol.IT-46, pp. 344 - 366, March 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.IT-46 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 8
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • B. Chen and G.W Wornell, "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding, " IEEE Trans. Inform. Theory, Vol.47, pp. 1423 -1443, May 2001. (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 10
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • Nov.
    • J.G. Daugman, "High Confidence Visual Recognition of Persons by a Test of Statistical Independence, " IEEE Trans, on Pattern Anal. Mach. Intell., vol.15, No.11, pp. 1148 - 1161, Nov. 1993.
    • (1993) IEEE Trans, on Pattern Anal. Mach. Intell. , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.G.1
  • 11
    • 34547531639 scopus 로고    scopus 로고
    • On the security of the XOR-method in biometric authentication systems
    • Noordwijk, The Netherlands, June 8-9
    • T. Ignatenko and F. Willems, "On the Security of the XOR-Method in Biometric Authentication Systems, " Proc. 27th Symp. Inform. Theory in the Benelux, Noordwijk, The Netherlands, June 8-9, 2006, pp. 197 -204.
    • (2006) Proc. 27th Symp. Inform. Theory in the Benelux , pp. 197-204
    • Ignatenko, T.1    Willems, F.2
  • 17
    • 77649250983 scopus 로고    scopus 로고
    • Secure sketch for biometric templates
    • volume 4284 of LNCS, Shanghai, China, December
    • Q. Li, Y. Sutcu, and N. Memon, "Secure Sketch for Biometric Templates, " Asiacrypt, volume 4284 of LNCS, Shanghai, China, December 2006.
    • (2006) Asiacrypt
    • Li, Q.1    Sutcu, Y.2    Memon, N.3
  • 19
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer, "Secret Key Agreement by Public Discussion from Common Information, " IEEE Trans. Inform. Theory, IT-39, pp. 733-742, 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.IT-39 , pp. 733-742
    • Maurer, U.1
  • 22
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 623 - 656 (Part II), July/Oct.
    • C.E. Shannon, "A Mathematical Theory of Communication, " Bell Syst. Tech. J., vol.27, pp. 379 - 423 (Part I), 623 - 656 (Part II), July/Oct. 1948.
    • (1948) Bell Syst. Tech. J. , vol.27 , Issue.PART I , pp. 379-423
    • Shannon, C.E.1
  • 24
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Set.
    • Y. Sutcu, Q. Li, and N. Memon, "Protecting Biometric Templates With Sketch: Theory and Practice, " IEEE Trans. on Inform. Forens. and Security, Vol.2, No.3. Set. 2007, pp. 503 - 512.
    • (2007) IEEE Trans. on Inform. Forens. and Security , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 25
  • 26
    • 1442337635 scopus 로고    scopus 로고
    • Reconcilliation of a quantum-distributed Gaussian key
    • Feb.
    • G. Van Assche, J. Cardinal, a nd N.J. Cerf, "Reconcilliation of a Quantum-Distributed Gaussian Key, " IEEE Trans. Inform. Th., Vol.IT - 50, No.2, pp. 394 - 400, Feb. 2004.
    • (2004) IEEE Trans. Inform. Th. , vol.IT-50 , Issue.2 , pp. 394-400
    • Van Assche, G.1    Cardinal, J.2    Cerf, N.J.3
  • 27
    • 0031647696 scopus 로고    scopus 로고
    • The common randomness capacity of a pair of independent discrete memoryless channels
    • January
    • S. Venkatesan and V. Anantharam, "The Common Randomness Capacity of a Pair of Independent Discrete Memoryless Channels, " IEEE Trans. Inform. Theory, vol.IT-44, pp. 215 - 224, January 1998.
    • (1998) IEEE Trans. Inform. Theory , vol.IT-44 , pp. 215-224
    • Venkatesan, S.1    Anantharam, V.2
  • 28
    • 33646020998 scopus 로고    scopus 로고
    • A simple proof of the entropy power inequality
    • May
    • S. Verdu and D. Guo, "A Simple Proof of the Entropy Power Inequality, " IEEE Trans. Inform. Th., Vol.IT - 52, No.5, pp. 2165 - 2166, May 2006.
    • (2006) IEEE Trans. Inform. Th. , vol.IT-52 , Issue.5 , pp. 2165-2166
    • Verdu, S.1    Guo, D.2
  • 29
    • 70349281384 scopus 로고
    • Coding theorem for the AWGN channel in terms of jointly typical sequences
    • Houthalen, Belgium, May 25 & 26
    • F.M.J. Willems, "Coding Theorem for the AWGN Channel in Terms of Jointly Typical Sequences, " Proc. 10th Symp. on Inform. Th. in the Benelux, Houthalen, Belgium, May 25 & 26, 1989, pp. 13 - 18.
    • (1989) Proc. 10th Symp. on Inform. Th. in the Benelux , pp. 13-18
    • Willems, F.M.J.1
  • 30
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from gaussian random variables
    • Seattle, USA, July 9 - 14
    • C. Ye, A. Reznik, and Y. Shah, "Extracting Secrecy from Gaussian Random Variables, " IEEE Int. Symp. Inform. Theory, Seattle, USA, July 9 - 14, 2006, pp. 2593 - 2597.
    • (2006) IEEE Int. Symp. Inform. Theory , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 31
    • 33749443558 scopus 로고    scopus 로고
    • Secret and private key constructions for simple multiterminal source models
    • Adelaide, Australia, Sept. 4 - 9
    • Chunxuan Ye and P. Narayan, "Secret and Private Key Constructions for Simple Multiterminal Source Models, " Proc. IEEE Int. Symp. Inform. Theory, Adelaide, Australia, Sept. 4 - 9, 2005, pp. 2138 - 2141.
    • (2005) Proc. IEEE Int. Symp. Inform. Theory , pp. 2138-2141
    • Ye, C.1    Narayan, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.