메뉴 건너뛰기




Volumn 6, Issue 1, 2011, Pages 122-139

Privacy–Security Trade-Offs in Biometric Security Systems—Part I: Single Use Case

Author keywords

Biometric; information theoretic security; perfect privacy; privacysecurity trade off; side information

Indexed keywords

BIOMETRICS; INFORMATION THEORY; SECURITY SYSTEMS;

EID: 79951830125     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2098872     Document Type: Article
Times cited : (103)

References (42)
  • 2
    • 85043074494 scopus 로고    scopus 로고
    • An information theoretic framework for biometric security systems
    • Sassari, Italy, Jun.
    • L. Lai, S.-W. Ho, and H. V. Poor, "An information theoretic framework for biometric security systems," in Proc. Int. Conf. Biometrics, Sassari, Italy, Jun. 2009.
    • (2009) Proc. Int. Conf. Biometrics
    • Lai, L.1    Ho, S.-W.2    Poor, H.V.3
  • 3
    • 33947492044 scopus 로고    scopus 로고
    • From template to image: Reconstructing fingerprints from minutiae points
    • DOI 10.1109/TPAMI.2007.1018, Special issue on Biometrics: Progress and Directions
    • A. Ross, J. Shah, and A. K. Jain, "From template to image: Reconstructing fingerprints from minutiae points," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 544-560, Apr. 2007. (Pubitemid 46464396)
    • (2007) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.29 , Issue.4 , pp. 544-560
    • Ross, A.1    Shah, J.2    Jain, A.K.3
  • 4
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Sep.
    • Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 503-512, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 9
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identifications
    • Oakland, CA, May
    • G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identifications," in Proc. IEEE Symp. Securityand Privacy, Oakland, CA, May 1998, pp. 148-157.
    • (1998) Proc. IEEE Symp. Securityand Privacy , pp. 148-157
    • Davida, G.1    Frankel, Y.2    Matt, B.3
  • 11
    • 56349139535 scopus 로고    scopus 로고
    • The best ofboth worlds: Applying secure sketches to cancelable biometrics
    • J. Bringer, H. Chabannea, and B. Kindarji, "The best ofboth worlds: Applying secure sketches to cancelable biometrics," Sci. Comput. Program., vol. 74, pp. 43-51, 2008.
    • (2008) Sci. Comput. Program. , vol.74 , pp. 43-51
    • Bringer, J.1    Chabannea, H.2    Kindarji, B.3
  • 14
    • 0036350106 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • Lausanne, Switzerland, Jun./Jul.
    • A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Inform. Theory, Lausanne, Switzerland, Jun./Jul. 2002, pp. 293-297.
    • (2002) Proc. IEEE Int. Symp. Inform. Theory , pp. 293-297
    • Juels, A.1    Sudan, M.2
  • 15
    • 26444525625 scopus 로고    scopus 로고
    • Fuzzy vault for fingerprints
    • Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
    • U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," Audio-and Video-Based Biometric Person Authentication, pp. 310-319, Jul. 2005. (Pubitemid 41423047)
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 310-319
    • Uludag, U.1    Pankanti, S.2    Jain, A.K.3
  • 20
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • Springer
    • P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in Biometric Authentication. Berlin, Germany: Springer, 2004, pp. 158-170.
    • (2004) Biometric Authentication. Berlin, Germany , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 25
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 26
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, Part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 27
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography-part II: CR capacity
    • PII S0018944898000777
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998. (Pubitemid 128737891)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahlswede, R.1    Csiszar, I.2
  • 28
    • 79951822559 scopus 로고    scopus 로고
    • Privacy-security trade-offs in biometric security systems\Part II: Multiple uses case
    • Mar.
    • L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security trade-offs in biometric security systems\Part II: Multiple uses case," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, Mar. 2011.
    • IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 2011
    • Lai, L.1    Ho, S.-W.2    Poor, H.V.3
  • 29
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • DOI 10.1109/18.825796
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 31
    • 70450232005 scopus 로고    scopus 로고
    • Biometric systems: Privacy and secrecy aspects
    • Dec.
    • T. Ignatenko and F. M. J. Willems, "Biometric systems: Privacy and secrecy aspects," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 956-973, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 956-973
    • Ignatenko, T.1    Willems, F.M.J.2
  • 33
    • 77955623166 scopus 로고    scopus 로고
    • On the discontinuity of the
    • Shannon information measures Dec.
    • S.-W. Ho and R. W. Yeung, "On the discontinuity of the Shannon information measures," IEEE Trans. Inf. Theory, vol. 55, no. 12, pp. 5362-5374, Dec. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.12 , pp. 5362-5374
    • Ho, S.-W.1    Yeung, R.W.2
  • 34
    • 51849108374 scopus 로고    scopus 로고
    • Cracking fuzzy vaults and biometric encryption
    • Baltimore, MD, Sep.
    • W. J. Scheirer and T. E. Boult, "Cracking fuzzy vaults and biometric encryption," in Proc. IEEE Biometrics Symp., Baltimore, MD, Sep. 2007, pp. 1-6.
    • (2007) Proc. IEEE Biometrics Symp. , pp. 1-6
    • Scheirer, W.J.1    Boult, T.E.2
  • 35
    • 70449470534 scopus 로고    scopus 로고
    • On the interplay between shannon's information measures and reliability criteria
    • Seoul, South Keora, Jun./Jul.
    • S.-W. Ho, "On the interplay between shannon's information measures and reliability criteria," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, South Keora, Jun./Jul. 2009, pp. 154-158.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory , pp. 154-158
    • Ho, S.-W.1
  • 38
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 39
    • 0006932810 scopus 로고
    • Common information is far less than mutual information
    • P. Gács and J. Körner, "Common information is far less than mutual information,"Probl. Control Inf Theory, vol. 2,pp. 149-162, 1973.
    • (1973) Probl. Control Inf Theory , vol.2 , pp. 149-162
    • Gács, P.1    Körner, J.2
  • 40
    • 0016442512 scopus 로고
    • On sequences of pairs of dependent random variables
    • Jan.
    • H. S. Witsenhausen, "On sequences of pairs of dependent random variables,"SIAMJ. Appl. Math., vol. 28, no. 1, pp. 100-113, Jan. 1975.
    • (1975) SIAMJ. Appl. Math. , vol.28 , Issue.1 , pp. 100-113
    • Witsenhausen, H.S.1
  • 41
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages,"IEEETrans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEETrans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.