메뉴 건너뛰기




Volumn 4284 LNCS, Issue , 2006, Pages 99-113

Secure sketch for biometric templates

Author keywords

Biometric template; Continuous domain; Secure sketch

Indexed keywords

BIOMETRIC DATA; BIOMETRIC TEMPLATE; CONTINUOUS DOMAIN; CRYPTOGRAPHIC KEY; DISCRETE DOMAINS; DISCRETIZATIONS; ENTROPY LOSS; GENERAL APPROACH; NOISY DATA; OPTIMAL PARAMETER; QUANTIZERS; RELATIVE ENTROPY; RIGOROUS ANALYSIS; SECURE SKETCH; WORST CASE;

EID: 77649250983     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935230_7     Document Type: Conference Paper
Times cited : (71)

References (20)
  • 2
    • 14844335721 scopus 로고    scopus 로고
    • Reusable cryptographic fuzzy extractors
    • Washington DC, USA, ACM Press
    • Xavier Boyen. Reusable cryptographic fuzzy extractors. In ACM CCS, pages 82-91, Washington DC, USA, 2004. ACM Press.
    • (2004) ACM CCS , pp. 82-91
    • Boyen, X.1
  • 3
    • 77649253271 scopus 로고    scopus 로고
    • Secure sketch for multi-set difference. Cryptology ePrint Archive
    • Report 2006/090
    • Ee-Chien Chang, Vadym Fedyukovych, and Qiming Li. Secure sketch for multi-set difference. Cryptology ePrint Archive, Report 2006/090, 2006. http://eprint.iacr.org/.
    • (2006)
    • Chang, E.-C.1    Fedyukovych, V.2    Li, Q.3
  • 4
    • 34247393528 scopus 로고    scopus 로고
    • Small secure sketch for point-set difference. Cryptology ePrint Archive
    • Report 2005/145
    • Ee-Chien Chang and Qiming Li. Small secure sketch for point-set difference. Cryptology ePrint Archive, Report 2005/145, 2005. http://eprint.iacr.org/.
    • (2005)
    • Chang, E.-C.1    Li, Q.2
  • 5
    • 33746049783 scopus 로고    scopus 로고
    • Hiding secret points amidst chaff
    • Eurocrypt, of
    • Ee-Chien Chang and Qiming Li. Hiding secret points amidst chaff. In Eurocrypt, volume 4004 of LNCS, pages 59-72, 2006.
    • (2006) LNCS , vol.4004 , pp. 59-72
    • Chang, E.-C.1    Li, Q.2
  • 6
    • 0026746934 scopus 로고
    • Human face recognition method based on the statistical model of small sample size
    • Yong-Qing Cheng. Human face recognition method based on the statistical model of small sample size. In SPIE Proc. Intell. Robot and Compu. Vision, pages 85-95, 1991.
    • (1991) SPIE Proc. Intell. Robot and Compu. Vision , pp. 85-95
    • Cheng, Y.-Q.1
  • 7
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Eurocrypt, of, Springer-Verlag
    • Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Eurocrypt, volume 3027 of LNCS, pages 523-540. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 9
    • 33750918446 scopus 로고    scopus 로고
    • Combining cryptography with biometrics effectively
    • Technical Report UCAM-CL-TR-640, University of Cambridge
    • Feng Hao, Ross Anderson, and John Daugman. Combining cryptography with biometrics effectively. Technical Report UCAM-CL-TR-640, University of Cambridge, 2005.
    • (2005)
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 10
    • 0025794601 scopus 로고
    • Algebraic feature extraction of image for recognition
    • Z. Hong. Algebraic feature extraction of image for recognition. Pattern Recognition, 24:211-219, 1991.
    • (1991) Pattern Recognition , vol.24 , pp. 211-219
    • Hong, Z.1
  • 12
    • 0033281339 scopus 로고    scopus 로고
    • A fuzzy commitment scheme
    • Ari Juels and Martin Wattenberg. A fuzzy commitment scheme. In ACM CCS, pages 28-36, 1999.
    • (1999) ACM CCS , pp. 28-36
    • Juels, A.1    Wattenberg, M.2
  • 13
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • J.-P. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA, pages 393-402, 2003.
    • (2003) AVBPA , pp. 393-402
    • Linnartz, J.-P.1    Tuyls, P.2
  • 14
    • 0009801824 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Ueli Maurer and Stefan Wolf. Information-theoretic key agreement: From weak to strong secrecy for free. In Eurocrypt, 2000.
    • (2000) Eurocrypt
    • Maurer, U.1    Wolf, S.2
  • 17
    • 33748076787 scopus 로고    scopus 로고
    • A secure biometric authentication scheme based on robust hashing
    • Y. Sutcu, T. Sencar, and N. Memon. A secure biometric authentication scheme based on robust hashing. In ACM MM-SEC Workshop, 2005.
    • (2005) ACM MM-SEC Workshop
    • Sutcu, Y.1    Sencar, T.2    Memon, N.3
  • 19
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • P. Tuyls and J. Goseling. Capacity and examples of template-protecting biometric authentication systems. In ECCV Workshop BioAW, pages 158-170, 2004.
    • (2004) ECCV Workshop BioAW , pp. 158-170
    • Tuyls, P.1    Goseling, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.