-
1
-
-
64549127364
-
Privacy-security tradeoffs in biometric security systems
-
Monticello, IL, Sep. 23-26
-
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in biometric security systems," in Proc. 46th Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 23-26, 2008.
-
(2008)
Proc. 46th Annu. Allerton Conf. Communication, Control, and Computing
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
2
-
-
85043074494
-
An information theoretic framework for biometric security systems
-
Sassari, Italy, Jun.
-
L. Lai, S.-W. Ho, and H. V. Poor, "An information theoretic framework for biometric security systems," in Proc. Int. Conf. Biometrics, Sassari, Italy, Jun. 2009.
-
(2009)
Proc. Int. Conf. Biometrics
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
3
-
-
33947492044
-
From template to image: Reconstructing fingerprints from minutiae points
-
DOI 10.1109/TPAMI.2007.1018, Special issue on Biometrics: Progress and Directions
-
A. Ross, J. Shah, and A. K. Jain, "From template to image: Reconstructing fingerprints from minutiae points," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 544-560, Apr. 2007. (Pubitemid 46464396)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 544-560
-
-
Ross, A.1
Shah, J.2
Jain, A.K.3
-
4
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sep.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 503-512, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
5
-
-
77649250983
-
Secure sketch for biometric templates
-
Dec.
-
Q. Li, Y. Sutcu, and N. Memon, "Secure sketch for biometric templates," in Proc. Asiacrypt, Shanghai, China, Dec. 2006, pp. 99-113.
-
(2006)
Proc. Asiacrypt, Shanghai, China
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
6
-
-
35148846059
-
Secure biometric templates from fingerprint-face features
-
Minneapolis, MN, Jun.
-
Y. Sutcu, Q. Li, and N. Memon, "Secure biometric templates from fingerprint-face features," in Proc. IEEE Computer Society Workshop on Biometrics, Minneapolis, MN, Jun. 2007.
-
(2007)
Proc. IEEE Computer Society Workshop on Biometrics
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
7
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Honolulu, HI, Apr.
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. Yedidia, "Using distributed source coding to secure fingerprint biometrics," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Honolulu, HI, Apr. 2007, pp. 129-132.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 129-132
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.5
-
8
-
-
51849094958
-
Feature transformation of biometric templates for secure biometric systems based on error correcting codes
-
Anchorage, AK, June
-
Y. Sutcu, S. Rane, J. S. Yedidia, S. Draper, and A. Vetro, "Feature transformation of biometric templates for secure biometric systems based on error correcting codes," in Proc. IEEE Conf. Computer Vision and Pattern Recognition, Anchorage, AK, June 2008.
-
(2008)
Proc. IEEE Conf. Computer Vision and Pattern Recognition
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.S.3
Draper, S.4
Vetro, A.5
-
9
-
-
0031651014
-
On enabling secure applications through off-line biometric identifications
-
Oakland, CA, May
-
G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identifications," in Proc. IEEE Symp. Securityand Privacy, Oakland, CA, May 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Securityand Privacy
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
10
-
-
70449640064
-
Privacy weaknesses in biometric sketches
-
K. Simoens, P. Tuyls, and B. Preneel, "Privacy weaknesses in biometric sketches," in Proc. IEEE Int. Symp. Security and Privacy, May 2009, pp. 188-203.
-
(2009)
Proc. IEEE Int. Symp. Security and Privacy, May
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
11
-
-
56349139535
-
The best ofboth worlds: Applying secure sketches to cancelable biometrics
-
J. Bringer, H. Chabannea, and B. Kindarji, "The best ofboth worlds: Applying secure sketches to cancelable biometrics," Sci. Comput. Program., vol. 74, pp. 43-51, 2008.
-
(2008)
Sci. Comput. Program.
, vol.74
, pp. 43-51
-
-
Bringer, J.1
Chabannea, H.2
Kindarji, B.3
-
12
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. Ratha, S. Chikkerur, J. Connell, and R. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561-572, Apr. 2007. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
14
-
-
0036350106
-
A fuzzy vault scheme
-
Lausanne, Switzerland, Jun./Jul.
-
A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Inform. Theory, Lausanne, Switzerland, Jun./Jul. 2002, pp. 293-297.
-
(2002)
Proc. IEEE Int. Symp. Inform. Theory
, pp. 293-297
-
-
Juels, A.1
Sudan, M.2
-
15
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," Audio-and Video-Based Biometric Person Authentication, pp. 310-319, Jul. 2005. (Pubitemid 41423047)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
17
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
May
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Advances in Cryptology (EUROCRYPT), Interlaken, Switzerland, May 2004, pp. 523-540.
-
(2004)
Proc. Advances in Cryptology (EUROCRYPT), Interlaken, Switzerland
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
18
-
-
33646061716
-
The wire-tap channel applied to biometrics
-
G. Cohen and G. Zemor, "The wire-tap channel applied to biometrics," in Proc. IEEE Int. Symp. Inf. Theory and Its Applications, Parma, Italy, Oct. 2004.
-
(2004)
Proc. IEEE Int. Symp. Inf. Theory and Its Applications, Parma, Italy, Oct.
-
-
Cohen, G.1
Zemor, G.2
-
19
-
-
34547512629
-
On privacy in secure biometrics authentication systems
-
Honolulu, HI, Apr.
-
T. Ignatenko and F. M. J. Willems, "On privacy in secure biometrics authentication systems," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Honolulu, HI, Apr. 2007, pp. 121-124.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 121-124
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
20
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
Springer
-
P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in Biometric Authentication. Berlin, Germany: Springer, 2004, pp. 158-170.
-
(2004)
Biometric Authentication. Berlin, Germany
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
21
-
-
77951799602
-
Biometric template transformation: A security analysis
-
San Jose, Jan.
-
A. Nagar, K. Nandakumar, and A. K. Jain, "Biometric template transformation: A security analysis," in Proc. SPIE, Electronic Imaging, Media Forensics and Security, San Jose, Jan. 2010.
-
Proc. SPIE, Electronic Imaging, Media Forensics and Security
, vol.2010
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
22
-
-
85043062313
-
Efficient biometric verification in encrypted domain
-
M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, "Efficient biometric verification in encrypted domain," in Proc. Int. Conf. Biometrics, Sassari, Italy, 2009.
-
(2009)
Proc. Int. Conf. Biometrics, Sassari, Italy
-
-
Upmanyu, M.1
Namboodiri, A.M.2
Srinathan, K.3
Jawahar, C.V.4
-
24
-
-
43949116287
-
Biometric template security
-
Jan.
-
A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Advances Signal Process., pp. 1-17, Jan. 2008.
-
(2008)
EURASIP J. Advances Signal Process.
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
25
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
26
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
27
-
-
0031701886
-
Common randomness in information theory and cryptography-part II: CR capacity
-
PII S0018944898000777
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998. (Pubitemid 128737891)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahlswede, R.1
Csiszar, I.2
-
28
-
-
79951822559
-
Privacy-security trade-offs in biometric security systems\Part II: Multiple uses case
-
Mar.
-
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security trade-offs in biometric security systems\Part II: Multiple uses case," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, Mar. 2011.
-
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 2011
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
29
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
30
-
-
64549142823
-
Privacy leakage in biometric secrecy systems
-
Monticello, IL, Sep.
-
T. Ignatenko and F. M. J. Willems, "Privacy leakage in biometric secrecy systems," in Proc. Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 2008.
-
(2008)
Proc. Annu. Allerton Conf. Communication, Control, and Computing
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
31
-
-
70450232005
-
Biometric systems: Privacy and secrecy aspects
-
Dec.
-
T. Ignatenko and F. M. J. Willems, "Biometric systems: Privacy and secrecy aspects," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 956-973, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 956-973
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
32
-
-
52349098088
-
Feature extraction for a Slepian-Wolf biometric system using LDPC codes
-
Toronto, Canada, Jul.
-
Y. Sutcu, S. Rane, J. S. Yedidia, S. Draper, and A. Vetro, "Feature extraction for a Slepian-Wolf biometric system using LDPC codes," in Proc. IEEEInt. Symp. Inf. Theory, Toronto, Canada, Jul. 2008.
-
(2008)
Proc. IEEEInt. Symp. Inf. Theory
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.S.3
Draper, S.4
Vetro, A.5
-
33
-
-
77955623166
-
On the discontinuity of the
-
Shannon information measures Dec.
-
S.-W. Ho and R. W. Yeung, "On the discontinuity of the Shannon information measures," IEEE Trans. Inf. Theory, vol. 55, no. 12, pp. 5362-5374, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.12
, pp. 5362-5374
-
-
Ho, S.-W.1
Yeung, R.W.2
-
34
-
-
51849108374
-
Cracking fuzzy vaults and biometric encryption
-
Baltimore, MD, Sep.
-
W. J. Scheirer and T. E. Boult, "Cracking fuzzy vaults and biometric encryption," in Proc. IEEE Biometrics Symp., Baltimore, MD, Sep. 2007, pp. 1-6.
-
(2007)
Proc. IEEE Biometrics Symp.
, pp. 1-6
-
-
Scheirer, W.J.1
Boult, T.E.2
-
35
-
-
70449470534
-
On the interplay between shannon's information measures and reliability criteria
-
Seoul, South Keora, Jun./Jul.
-
S.-W. Ho, "On the interplay between shannon's information measures and reliability criteria," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, South Keora, Jun./Jul. 2009, pp. 154-158.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 154-158
-
-
Ho, S.-W.1
-
38
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
39
-
-
0006932810
-
Common information is far less than mutual information
-
P. Gács and J. Körner, "Common information is far less than mutual information,"Probl. Control Inf Theory, vol. 2,pp. 149-162, 1973.
-
(1973)
Probl. Control Inf Theory
, vol.2
, pp. 149-162
-
-
Gács, P.1
Körner, J.2
-
40
-
-
0016442512
-
On sequences of pairs of dependent random variables
-
Jan.
-
H. S. Witsenhausen, "On sequences of pairs of dependent random variables,"SIAMJ. Appl. Math., vol. 28, no. 1, pp. 100-113, Jan. 1975.
-
(1975)
SIAMJ. Appl. Math.
, vol.28
, Issue.1
, pp. 100-113
-
-
Witsenhausen, H.S.1
-
41
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages,"IEEETrans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEETrans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
42
-
-
51649122981
-
The interplay between entropy and variational distance
-
S.-W. Ho and R. W. Yeung, "The interplay between entropy and variational distance," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jul. 2007, pp. 491-495.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jul.
, pp. 491-495
-
-
Ho, S.-W.1
Yeung, R.W.2
|