메뉴 건너뛰기




Volumn , Issue , 2009, Pages 34-39

Security issues of biometric encryption

Author keywords

Erasures; Fingerprints; Fuzzy extractor; Hill climbing; Iris; Soft decoding

Indexed keywords

BIOMETRIC ENCRYPTION; ERROR CORRECTING CODE; FUZZY EXTRACTORS; HILL CLIMBING; NON-RANDOMNESS; SECURITY ISSUES; SOFT DECODING;

EID: 77952703061     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TIC-STH.2009.5444478     Document Type: Conference Paper
Times cited : (54)

References (23)
  • 3
    • 84889618817 scopus 로고    scopus 로고
    • Biometric Encryption: The New Breed of Untraceable Biometrics
    • Chapter 26 in Boulgouris, N. V., Plataniotis, K. N., Micheli-Tzanakou, E., eds.: Wiley, London, in press
    • A. Cavoukian and A. Stoianov, "Biometric Encryption: The New Breed of Untraceable Biometrics." Chapter 26 in Boulgouris, N. V., Plataniotis, K. N., Micheli-Tzanakou, E., eds.: Biometrics: fundamentals, theory, and systems. Wiley, London, 2009, in press.
    • (2009) Biometrics: Fundamentals, Theory, and Systems
    • Cavoukian, A.1    Stoianov, A.2
  • 4
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle. "Enhancing security and privacy in biometrics-based authentication systems". IBM Syst. J., v. 40, No. 3, pp. 614-634, 2001.
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 5
    • 26444554928 scopus 로고    scopus 로고
    • Vulnerabilities in Biometric Encryption Systems
    • Springer
    • A. Adler, "Vulnerabilities in Biometric Encryption Systems". LNCS, Springer, v..3546, pp. 1100-1109, 2005.
    • (2005) LNCS , vol.3546 , pp. 1100-1109
    • Adler, A.1
  • 6
  • 10
    • 42949167255 scopus 로고    scopus 로고
    • Realization of correlation attack against fuzzy vault scheme
    • A. Kholmatov and B. Yanikoglu, "Realization of correlation attack against fuzzy vault scheme." Proc. of SPIE, Vol. 6819, 2008.
    • (2008) Proc. of SPIE , vol.6819
    • Kholmatov, A.1    Yanikoglu, B.2
  • 12
    • 45449114377 scopus 로고    scopus 로고
    • An authentication protocol with encrypted biometric data
    • Springer
    • J. Bringer and H. Chabanne, "An authentication protocol with encrypted biometric data". LNCS, Springer, v. 5023, pp. 109-124, 2008.
    • (2008) LNCS , vol.5023 , pp. 109-124
    • Bringer, J.1    Chabanne, H.2
  • 14
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Y. Dodis, L. Reyzin, and A. Smith. "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data". Proc. Eurocrypt 2004, pp. 523-540, 2004.
    • (2004) Proc. Eurocrypt 2004 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 15
    • 33747624401 scopus 로고    scopus 로고
    • Combining Crypto with Biometrics Effectively
    • F. Hao, R. Anderson, and J. Daugman. "Combining Crypto with Biometrics Effectively". IEEE Trans. Comp., v. 55, pp. 1081-1088, 2006.
    • (2006) IEEE Trans. Comp. , vol.55 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 20
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identification
    • Oakland, Ca.
    • G.I. Davida, Y. Frankel, and B.J. Matt, "On enabling secure applications through off-line biometric identification." Proc. IEEE 1998 Symp. on Security and Privacy, pp. 148-157, Oakland, Ca., 1998.
    • (1998) Proc. IEEE 1998 Symp. on Security and Privacy , pp. 148-157
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.