메뉴 건너뛰기




Volumn 6, Issue 1, 2011, Pages 140-151

Privacy–Security Trade-Offs in Biometric Security Systems—Part II: Multiple Use Case

Author keywords

Biometric security; incremental design; joint design; privacysecurity trade off; reusable biometrics

Indexed keywords

BIOMETRICS; INFORMATION THEORY; SECURITY SYSTEMS;

EID: 79951822559     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2098873     Document Type: Article
Times cited : (43)

References (36)
  • 2
    • 33947492044 scopus 로고    scopus 로고
    • From template to image: Reconstructing fingerprints from minutiae points
    • DOI 10.1109/TPAMI.2007.1018, Special issue on Biometrics: Progress and Directions
    • A. Ross, J. Shah, and A. K. Jain, "From template to image: Reconstructing fingerprints from minutiae points," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 544-560, Apr. 2007. (Pubitemid 46464396)
    • (2007) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.29 , Issue.4 , pp. 544-560
    • Ross, A.1    Shah, J.2    Jain, A.K.3
  • 3
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Sep.
    • Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 503-512, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 4
    • 77649250983 scopus 로고    scopus 로고
    • Secure sketch for biometric templates
    • Shanghai, China, Dec.
    • Q. Li, Y. Sutcu, and N. Memon, "Secure sketch for biometric templates," in Proc. Asiacrypt, Shanghai, China, Dec. 2006, pp. 99-113.
    • (2006) Proc. Asiacrypt , pp. 99-113
    • Li, Q.1    Sutcu, Y.2    Memon, N.3
  • 9
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identifications
    • Oakland, CA, May
    • G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identifications," in Proc. IEEE Symp. Securityand Privacy, Oakland, CA, May 1998, pp. 148-157.
    • (1998) Proc. IEEE Symp. Securityand Privacy , pp. 148-157
    • Davida, G.1    Frankel, Y.2    Matt, B.3
  • 10
    • 56349139535 scopus 로고    scopus 로고
    • The best of both worlds: Applying secure sketches to cancelable biometrics
    • J. Bringer, H. Chabannea, and B. Kindarji, "The best of both worlds: Applying secure sketches to cancelable biometrics," Sci. Comput. Program., vol. 74, pp. 43-51, 2008.
    • (2008) Sci. Comput. Program. , vol.74 , pp. 43-51
    • Bringer, J.1    Chabannea, H.2    Kindarji, B.3
  • 14
    • 0036350106 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • Lausanne, Switzerland, Jun./Jul.
    • A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Inf. Theory, Lausanne, Switzerland, Jun./Jul. 2002, pp. 293-297.
    • (2002) Proc. IEEE Int. Symp. Inf. Theory , pp. 293-297
    • Juels, A.1    Sudan, M.2
  • 15
    • 26444525625 scopus 로고    scopus 로고
    • Fuzzy vault for fingerprints
    • Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
    • U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," Audio-and Video-Based Biometric Person Authentication, pp. 310-319, Jul. 2005. (Pubitemid 41423047)
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 310-319
    • Uludag, U.1    Pankanti, S.2    Jain, A.K.3
  • 17
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Interlaken, Switzerland, May
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Advances in Cryptology (EUROCRYPT), Interlaken, Switzerland, May 2004, pp. 523-540.
    • (2004) Proc. Advances in Cryptology (EUROCRYPT) , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 20
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • Berlin, Germany: Springer
    • P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in Biometric Authentication. Berlin, Germany: Springer, 2004, pp. 158-170.
    • (2004) Biometric Authentication , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 25
    • 79951830125 scopus 로고    scopus 로고
    • Privacy-security tradeoffs in biometric security systems\Part I: Single use case
    • Mar.
    • L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in biometric security systems\Part I: Single use case," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, Mar. 2011.
    • IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 2011
    • Lai, L.1    Ho, S.-W.2    Poor, H.V.3
  • 27
    • 70450232005 scopus 로고    scopus 로고
    • Biometric systems: Privacy and secrecy aspects
    • Dec.
    • T. Ignatenko and F. M. J. Willems, "Biometric systems: Privacy and secrecy aspects," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 956-973, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 956-973
    • Ignatenko, T.1    Willems, F.M.J.2
  • 29
    • 85043074494 scopus 로고    scopus 로고
    • An information theoretic framework for biometric security systems
    • Sassari, Italy, Jun.
    • L. Lai, S.-W. Ho, and H. V. Poor, "An information theoretic framework for biometric security systems," in Proc. Int. Conf. Biometrics, Sassari, Italy, Jun. 2009.
    • (2009) Proc. Int. Conf. Biometrics
    • Lai, L.1    Ho, S.-W.2    Poor, H.V.3
  • 31
    • 0032651629 scopus 로고    scopus 로고
    • Distributed source coding using syndromes (DISCUS): Design and construction
    • Snowbird, UT, Mar.
    • S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," in Proc. IEEE Conf. Data Compression, Snowbird, UT, Mar. 1999.
    • (1999) Proc. IEEE Conf. Data Compression
    • Pradhan, S.1    Ramchandran, K.2
  • 33
    • 0016576623 scopus 로고
    • Source coding with side information and a converse for the degraded broadcast channel
    • Nov.
    • R. Ahlswede and I. Csiszár, "Source coding with side information and a converse for the degraded broadcast channel," IEEE Trans. Inf. Theory, vol. 21, no. 6, pp. 629-637, Nov. 1975.
    • (1975) IEEE Trans. Inf. Theory , vol.21 , Issue.6 , pp. 629-637
    • Ahlswede, R.1    Csiszár, I.2
  • 34
    • 0015681689 scopus 로고
    • A theorem on the entropy of certain binary sequences and applications: Part i
    • Nov.
    • A. D. Wyner and J. Ziv, "A theorem on the entropy of certain binary sequences and applications: Part I," IEEE Trans. Inf. Theory, vol. 19, no. 6, pp. 769-777, Nov. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.19 , Issue.6 , pp. 769-777
    • Wyner, A.D.1    Ziv, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.