-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography -part I: Secret sharing," IEEE Transactions on Information Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0031701886
-
Common randomness in information theory and cryptography-part ii: Cr capacity
-
PII S0018944898000777
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography -part II: CR capacity," IEEE Transactions on Information Theory, vol. 44, pp. 225-240, January 1998. (Pubitemid 128737891)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahlswede, R.1
Csiszar, I.2
-
3
-
-
26444448320
-
Cancelable key-based fingerprint templates
-
Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
-
R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable key-based fingerprint templates," in ACISP, pp. 242-252, 2005. (Pubitemid 41431785)
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 242-252
-
-
Ang, R.1
Safavi-Naini, R.2
McAven, L.3
-
4
-
-
0028695608
-
Generalized privacy amplification
-
Trondeheim, Norway
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," in IEEE International Symposium on Information Theory, Trondeheim, Norway, 1994.
-
(1994)
IEEE International Symposium on Information Theory
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
5
-
-
0003307426
-
Multiterminal source coding, the information theory approach to communications
-
(G. Longo, ed.), Springer-Verlag
-
T. Berger, "Multiterminal source coding, the information theory approach to communications," in CISM Courses and Lectures, vol. 229, (G. Longo, ed.), pp. 171-231, Springer-Verlag, 1978.
-
(1978)
CISM Courses and Lectures
, vol.229
, pp. 171-231
-
-
Berger, T.1
-
6
-
-
0016037985
-
A simple converse for broadcast channels with additive white gaussian noise (corresp.)
-
March
-
P. Bergmans, "A simple converse for broadcast channels with additive white gaussian noise (corresp.)," IEEE Transactions on Information Theory, vol. 20, no. 2, pp. 279-280, March 1974.
-
(1974)
IEEE Transactions on Information Theory
, vol.20
, Issue.2
, pp. 279-280
-
-
Bergmans, P.1
-
7
-
-
0027297425
-
-
May
-
C. Berrou, A. Glavieux, and P. Thitimajshima, "Near Shannon limit error-correcting coding and decoding: Turbo-codes," vol. 2, pp. 1064-1070, May 1993.
-
(1993)
Near Shannon Limit Error-Correcting Coding and Decoding: Turbo-Codes
, vol.2
, pp. 1064-1070
-
-
Berrou, C.1
Glavieux, A.2
Thitimajshima, P.3
-
9
-
-
84858187839
-
Controlling leakage of biometric information using dithering
-
I. Buhan, J. Doumen, and P. Hartel, "Controlling leakage of biometric information using dithering," in EUSIPCO, 2008.
-
(2008)
EUSIPCO
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
-
10
-
-
57049133508
-
Embedding renewable cryptographic keys into continuous noisy data
-
I. Buhan, J. Doumen, P. H. Hartel, Q. Tang, and R. N. J. Veldhuis, "Embedding renewable cryptographic keys into continuous noisy data," in ICICS, pp. 294-310, 2008.
-
(2008)
ICICS
, pp. 294-310
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.H.3
Tang, Q.4
Veldhuis, R.N.J.5
-
11
-
-
34548214636
-
Adaptive and distributed cryptography for signature biometrics protection
-
San Jose, CA
-
P. Campisi, E. Maiorana, M. Prats, and A. Neri, "Adaptive and distributed cryptography for signature biometrics protection," in SPIE Conference on Security, Steganography and Water-Making of Multimedia Contents IX, vol. 6505, San Jose, CA, 2007.
-
(2007)
SPIE Conference on Security, Steganography and Water-Making of Multimedia Contents IX
, vol.6505
-
-
Campisi, P.1
Maiorana, E.2
Prats, M.3
Neri, A.4
-
12
-
-
48649088535
-
Multi-bits biometric string generation based on the likelihood ratio
-
Anchorage, Alaska, US, June 24-28
-
C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans, "Multi-bits biometric string generation based on the likelihood ratio," in IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, pp. 1-7, Anchorage, Alaska, US, June 24-28 2008.
-
(2008)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics
, pp. 1-7
-
-
Chen, C.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, A.4
-
13
-
-
84953586760
-
Human identification in information systems: Management challenges and public policy issues
-
R. Clarke, "Human identification in information systems: Management challenges and public policy issues," Information Technology and People, vol. 7, no. 4, pp. 6-37, 1994.
-
(1994)
Information Technology and People
, vol.7
, Issue.4
, pp. 6-37
-
-
Clarke, R.1
-
14
-
-
0016486048
-
A proof of the data compression theorem of Slepain and Wolf for ergodic sources
-
March
-
T. Cover, "A proof of the data compression theorem of Slepain and Wolf for ergodic sources," IEEE Transactions on Information Theory, vol. 22, pp. 226-228, March 1975.
-
(1975)
IEEE Transactions on Information Theory
, vol.22
, pp. 226-228
-
-
Cover, T.1
-
17
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 344-366, 2000. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
18
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
December
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3047-3061, December 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
19
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
November
-
J. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148-1161, November 1993.
-
(1993)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
21
-
-
8844234621
-
On the relation of error correction and cryptography to an off-line biometric based identification scheme
-
G. Davida, Y. Frankel, and B. Matt, "On the relation of error correction and cryptography to an off-line biometric based identification scheme," in Proceedings of WCC99, Workshop on Coding and Cryptography, 1999.
-
(1999)
Proceedings of WCC99, Workshop on Coding and Cryptography
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
22
-
-
70450282200
-
Reliable (robust) biometric authentication with privacy protection
-
Veldhoven, The Netherlands
-
D. Denteneer, J. Linnartz, P. Tuyls, and E. Verbitskiy, "Reliable (robust) biometric authentication with privacy protection," in Proceedings of IEEE Benelux Symposium on Information Theory, Veldhoven, The Netherlands, 2003.
-
(2003)
Proceedings of IEEE Benelux Symposium on Information Theory
-
-
Denteneer, D.1
Linnartz, J.2
Tuyls, P.3
Verbitskiy, E.4
-
23
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
24
-
-
17744381820
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology -Eurocrypt, 2004.
-
(2004)
Advances in Cryptology -Eurocrypt
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
25
-
-
27344439221
-
-
European Parliament Committee on Citizens Freedoms and Rights, Justice and Home Affairs (LIBE) Technical Report
-
B. Dorizzi, "Biometrics at the frontiers, assessing the impact on society, technical impact of biometrics," European Parliament Committee on Citizens Freedoms and Rights, Justice and Home Affairs (LIBE), Technical Report, 2005.
-
(2005)
Biometrics at the Frontiers, Assessing the Impact on Society, Technical Impact of Biometrics
-
-
Dorizzi, B.1
-
26
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
S. C. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia, "Using distributed source coding to secure fingerprint biometrics," in IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. 129-132, 2007.
-
(2007)
IEEE International Conference on Acoustics, Speech and Signal Processing
, vol.2
, pp. 129-132
-
-
Draper, S.C.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
27
-
-
33747486011
-
-
course notes (unpublished), Stanford University
-
G. D. Forney, "Information theory," 1972, course notes (unpublished), Stanford University.
-
(1972)
Information Theory
-
-
Forney, G.D.1
-
30
-
-
51849113731
-
Secure lossless compression with side information
-
Porto, Portugal
-
D. Gündüz, E. Erkip, and H. V. Poor, "Secure lossless compression with side information," in Proceedings of the IEEE Information on Theory Workshop, Porto, Portugal, 2008.
-
(2008)
Proceedings of the IEEE Information on Theory Workshop
-
-
Gündüz, D.1
Erkip, E.2
Poor, H.V.3
-
31
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI 10.1109/TC.2006.138
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, 2006. (Pubitemid 44263808)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
32
-
-
70449470534
-
On the interplay between shannon's information measures and reliability criteria
-
Seoul, Korea, June 28-July 3
-
S.-W. Ho, "On the interplay between shannon's information measures and reliability criteria," in IEEE International Symposium on Information Theory (ISIT), pp. 154-158, Seoul, Korea, June 28-July 3 2009.
-
(2009)
IEEE International Symposium on Information Theory (ISIT)
, pp. 154-158
-
-
Ho, S.-W.1
-
35
-
-
73649142027
-
Achieving secure fuzzy commitment scheme for optical PUFs
-
T. Ignatenko and F. Willems, "Achieving secure fuzzy commitment scheme for optical PUFs," in Proceedings of the International Conference on Intelligent Information on Hiding and Multimedia Signal Processing, September 12-14, 2009, Kyoto, Japan, pp. 1185-1188, 2009.
-
(2009)
Proceedings of the International Conference on Intelligent Information on Hiding and Multimedia Signal Processing, September 12-14, 2009, Kyoto, Japan
, pp. 1185-1188
-
-
Ignatenko, T.1
Willems, F.2
-
38
-
-
77952661812
-
Secret-key and identification rates for biometric identification systems with protected templates
-
Rotterdam, The Netherlands, May 11-12
-
T. Ignatenko and F. Willems, "Secret-key and identification rates for biometric identification systems with protected templates," in Proceedings of Symposium on Information on Theory in the Benelux, pp. 337-348, Rotterdam, The Netherlands, May 11-12 2010.
-
(2010)
Proceedings of Symposium on Information on Theory in the Benelux
, pp. 337-348
-
-
Ignatenko, T.1
Willems, F.2
-
44
-
-
67549112684
-
Binary biomterics: An analytic framework to estimate the bit error probability under gaussian assumption
-
September-October
-
E. Kelkboom, G. G. Molina, T. Kevenaar, R. Veldhuis, and W. Jonker, "Binary biomterics: An analytic framework to estimate the bit error probability under gaussian assumption," in IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp. 1-6, September-October 2008.
-
(2008)
IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS)
, pp. 1-6
-
-
Kelkboom, E.1
Molina, G.G.2
Kevenaar, T.3
Veldhuis, R.4
Jonker, W.5
-
45
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
DOI 10.1109/AUTOID.2005.24, 1544395, Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
-
T. A. M. Kevenaar, G. J. Schrijen, M. van der Veen, A. H. M. Akkermans, and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in AutoID, pp. 21-26, 2005. (Pubitemid 44733944)
-
(2005)
Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
, vol.2005
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.J.2
Van Der Veen, M.3
Akkermans, A.H.M.4
Zuo, F.5
-
46
-
-
78049361648
-
Privacy-security tradeoffs in reusable biometric security system
-
Dallas, TX, March
-
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in reusable biometric security system," in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Dallas, TX, March 2010.
-
(2010)
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
47
-
-
77649250983
-
Secure sketch for biometric templates
-
Shanghai, China, December
-
Q. Li, Y. Sutcu, and N. Memon, "Secure sketch for biometric templates," in Asiacrypt, LNCS, vol. 4284, Shanghai, China, December 2006.
-
(2006)
Asiacrypt, LNCS
, vol.4284
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
48
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J.-P. M. G. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in AVBPA, pp. 393-402, 2003.
-
(2003)
AVBPA
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
49
-
-
51849116466
-
Template protection for HMM-based on-line signature authentication
-
June
-
E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia, and A. Neri, "Template protection for HMM-based on-line signature authentication," in Computer Vision and Pattern Recognition Works, IEEE Computer Society Conference, pp. 1-6, June 2008.
-
(2008)
Computer Vision and Pattern Recognition Works, IEEE Computer Society Conference
, pp. 1-6
-
-
Maiorana, E.1
Martinez-Diaz, M.2
Campisi, P.3
Ortega-Garcia, J.4
Neri, A.5
-
51
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.1
-
52
-
-
0034829626
-
Cryptographic key generation from voice
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice," in IEEE Symposium on Security and Privacy, pp. 202-213, 2001. (Pubitemid 32882637)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
54
-
-
37849009414
-
Hardening fingerprint fuzzy vault using password
-
K. Nandakumar, A. Nagar, and A. Jain, "Hardening fingerprint fuzzy vault using password," in ICB07, pp. 927-937, 2007.
-
(2007)
ICB07
, pp. 927-937
-
-
Nandakumar, K.1
Nagar, A.2
Jain, A.3
-
55
-
-
4744361352
-
Large deviations performance analysis for biometrics recognition
-
Allerton House Monticello, IL, USA, October 2-4
-
J. A. O'Sullivan and N. A. Schmid, "Large deviations performance analysis for biometrics recognition," in Proceedings of Annual Allerton Conference on Communication, Control, and Computing, Allerton House Monticello, IL, USA, October 2-4 2002.
-
(2002)
Proceedings of Annual Allerton Conference on Communication, Control, and Computing
-
-
O'Sullivan, J.A.1
Schmid, N.A.2
-
56
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
March-April
-
S. Prabhakar, S. Pankanti, and A. Jain, "Biometric recognition: Security and privacy concerns," Security and Privacy, IEEE, vol. 1, no. 2, pp. 33-42, March-April 2003.
-
(2003)
Security and Privacy, IEEE
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.3
-
59
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. Ratha, S. Chikkerur, J. Connell, and R. Bolle, "Generating cancelable fingerprint templates," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, April 2007. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
60
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001. (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
63
-
-
4744340839
-
Performance prediction methodology for biometric systems using a large deviations approach
-
October
-
N. A. Schmid and J. A. O'Sullivan, "Performance prediction methodology for biometric systems using a large deviations approach," IEEE Transactions on Signal Processing, vol. 52, no. 10, pp. 3036-3045, October 2004.
-
(2004)
IEEE Transactions on Signal Processing
, vol.52
, Issue.10
, pp. 3036-3045
-
-
Schmid, N.A.1
O'Sullivan, J.A.2
-
64
-
-
85024264226
-
Inside risks: The uses and abuses of biometrics
-
B. Schneier, "Inside risks: The uses and abuses of biometrics," Communications of the ACM, vol. 42, no. 8, p. 136, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.8
, pp. 136
-
-
Schneier, B.1
-
65
-
-
0025519471
-
A binary analog to the entropy-power inequality
-
November
-
S. Shamai and A. Wyner, "A binary analog to the entropy-power inequality," IEEE Transactions on Information Theory, vol. 36, no. 6, pp. 1428-1430, November 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.6
, pp. 1428-1430
-
-
Shamai, S.1
Wyner, A.2
-
66
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
67
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon, "A mathematical theory of communication," The Bell System Technical Journal, vol. 27, pp. 623-656, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 623-656
-
-
Shannon, C.E.1
-
68
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," The Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
The Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
70
-
-
34548292447
-
How to protect biometric templates
-
Y. Sutcu, Q. Li, and N. Memon, "How to protect biometric templates," in SPIE Conference on Security, Steganography and Water-making of Multimedia Contents IX, vol. 6505, 2007.
-
(2007)
SPIE Conference on Security, Steganography and Water-making of Multimedia Contents IX
, vol.6505
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
71
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
September
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Transactions on Information Forensic and Security, vol. 2, no. 3, pp. 503-512, September 2007.
-
(2007)
IEEE Transactions on Information Forensic and Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
72
-
-
52349098088
-
Feature extraction for a slepian-wolf biometric system using ldpc codes
-
Toronto, Canada, July 6-11
-
Y. Sutcu, S. Rane, J. Yedidia, S. Draper, and A. Vetro, "Feature extraction for a slepian-wolf biometric system using ldpc codes," in IEEE International Symposium on Information Theory (ISIT), pp. 2297-2301, Toronto, Canada, July 6-11 2008.
-
(2008)
IEEE International Symposium on Information Theory (ISIT)
, pp. 2297-2301
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.3
Draper, S.4
Vetro, A.5
-
73
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892-1901, 2006.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Goh, A.2
Ngo, D.3
-
75
-
-
26444507172
-
Practical biometric authentication with template protection
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
P. Tuyls, A. Akkermans, T. Kevenaar, G.-J. Schrijen, B. A, and R. Veldhuis, "Practical biometric authentication with template protection," in International Conference on Audio-and Video-Based Personal Authentication (AVBPA), pp. 436-446, 2005. (Pubitemid 41423060)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
76
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in ECCV Workshop BioAW, pp. 158-170, 2004.
-
(2004)
ECCV Workshop BioAW
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
77
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
78
-
-
33646020998
-
A simple proof of the entropy power inequality
-
May
-
S. Verdu and D. Guo, "A simple proof of the entropy power inequality," IEEE Transactions on Information Theory, vol. 52, no. 5, pp. 2165-2166, May 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.5
, pp. 2165-2166
-
-
Verdu, S.1
Guo, D.2
-
79
-
-
0028461972
-
A general formula for channel capacity
-
July
-
S. Verdu and T. S. Han, "A general formula for channel capacity," IEEE Transactions on Information Theory, vol. 40, no. 4, pp. 1147-1157, July 1994.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.4
, pp. 1147-1157
-
-
Verdu, S.1
Han, T.S.2
-
80
-
-
0000478762
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," Journal of the IEEE, vol. 55, pp. 109-115, 1926.
-
(1926)
Journal of the IEEE
, vol.55
, pp. 109-115
-
-
Vernam, G.S.1
-
81
-
-
85032750974
-
Signal processing for biometric systems
-
DOI 10.1109/MSP.2007.905886
-
A. Vetro, (moderator), contributors: A. K. Jain, R. Chellappa, S. C. Draper, N. Memon, and P. J. Phillips, "Forum on signal processing for biometric systems," IEEE Signal Processing Magazine, vol. 24, no. 6, pp. 146-152, November 2007. (Pubitemid 350201609)
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.6
, pp. 146-152
-
-
Jain, A.K.1
Chellappa, R.2
Draper, S.C.3
Memon, N.4
Phillips, P.J.5
Vetro, A.6
-
82
-
-
84935113569
-
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
-
April
-
A. J. Viterbi, "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm," IEEE Transactions on Information Theory, vol. 13, pp. 260-269, April 1967.
-
(1967)
IEEE Transactions on Information Theory
, vol.13
, pp. 260-269
-
-
Viterbi, A.J.1
-
83
-
-
26444578644
-
-
London: Springer-Verlag
-
J. Wayman, A. Jain, and D. Maltoni, eds., Biometric Systems: Technology, Design and Performance Evaluation. London: Springer-Verlag, 2005.
-
(2005)
Biometric Systems: Technology, Design and Performance Evaluation
-
-
Wayman, J.1
Jain, A.2
Maltoni, D.3
-
84
-
-
70349281384
-
Coding theorem for the AWGN channel in terms of jointly typical sequences
-
Houthalen, Belgium, May 25 & 26
-
F. Willems, "Coding theorem for the AWGN channel in terms of jointly typical sequences," in Symposium on Information Theory in the Benelux, pp. 13-18, Houthalen, Belgium, May 25 & 26 1989.
-
(1989)
Symposium on Information Theory in the Benelux
, pp. 13-18
-
-
Willems, F.1
-
85
-
-
84858191485
-
Fundamental limits for biometric identification with a database containing protected templates
-
Seattle, U.S.A., December 12-15
-
F. Willems and T. Ignatenko, "Fundamental limits for biometric identification with a database containing protected templates," in Proceedings of the IEEE Workshop on Information Forensics and Security, pp. 1185-1188, Seattle, U.S.A., December 12-15 2010.
-
(2010)
Proceedings of the IEEE Workshop on Information Forensics and Security
, pp. 1185-1188
-
-
Willems, F.1
Ignatenko, T.2
-
86
-
-
78149253455
-
Identification and secret-key generation in biometric systems with protected templates
-
Rome, Italy
-
F. Willems and T. Ignatenko, "Identification and secret-key generation in biometric systems with protected templates," in Proceedings of the ACM Workshop on Multimedia and Security, pp. 63-66, Rome, Italy, 2010.
-
(2010)
Proceedings of the ACM Workshop on Multimedia and Security
, pp. 63-66
-
-
Willems, F.1
Ignatenko, T.2
-
87
-
-
0142008485
-
On the capacity of a biometrical identification system
-
F. Willems, T. Kalker, J. Goseling, and J.-P. Linnartz, "On the capacity of a biometrical identification system," in Proceedings of 2003 IEEE International Symposium on Information Theory, 2003.
-
Proceedings of 2003 IEEE International Symposium on Information Theory
, vol.2003
-
-
Willems, F.1
Kalker, T.2
Goseling, J.3
Linnartz, J.-P.4
-
88
-
-
70349266556
-
Quantization effects in biometric systems
-
San Diego, CA, USA
-
F. M. J. Willems and T. Ignatenko, "Quantization effects in biometric systems," in Proceedings of Workshop ITA (Information Theory and its Applications), 8-13 February 2009, San Diego, CA, USA, 2009.
-
(2009)
Proceedings of Workshop ITA (Information Theory and its Applications), 8-13 February, 2009
-
-
Willems, F.M.J.1
Ignatenko, T.2
-
90
-
-
0015681689
-
A theorem on the entropy of certain binary sequences and applications-I
-
November
-
A. Wyner and J. Ziv, "A theorem on the entropy of certain binary sequences and applications-I," IEEE Transactions on Information Theory, vol. 19, no. 6, pp. 769-772, November 1973.
-
(1973)
IEEE Transactions on Information Theory
, vol.19
, Issue.6
, pp. 769-772
-
-
Wyner, A.1
Ziv, J.2
-
91
-
-
0016882596
-
The rate-distortion function for source coding with side information at the decoder
-
January
-
A. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Transactions on Information Theory, vol. 22, no. 1, pp. 1-10, January 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.1
, pp. 1-10
-
-
Wyner, A.1
Ziv, J.2
-
92
-
-
34547506049
-
Secure iris verification
-
S. Yang and I. Verbauwhede, "Secure iris verification," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol. 2, pp. 133-136, 2007.
-
(2007)
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, vol.2
, pp. 133-136
-
-
Yang, S.1
Verbauwhede, I.2
-
93
-
-
39049156464
-
Extracting secrecy from jointly Gaussian random variables
-
DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from gaussian random variables," in IEEE International Symposium on Information Theory (ISIT), pp. 2593-2597, Seattle, USA, July 9-14 2006. (Pubitemid 351244572)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
|