메뉴 건너뛰기




Volumn 7, Issue 2-3, 2010, Pages 135-316

Biometric security from an information-theoretical perspective

Author keywords

[No Author keywords available]

Indexed keywords

AMOUNT OF INFORMATION; BIOMETRIC AUTHENTICATION SYSTEM; BIOMETRIC SECURITY; BIOMETRIC SYSTEMS; FUNDAMENTAL LIMITS; FUZZY COMMITMENT; REFERENCE DATA; SECRET KEY; THEORETICAL PERFORMANCE; THEORETICAL POINTS;

EID: 84858252162     PISSN: 15672190     EISSN: 15672328     Source Type: Journal    
DOI: 10.1561/0100000051     Document Type: Review
Times cited : (49)

References (93)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography -part I: Secret sharing," IEEE Transactions on Information Theory, vol. 39, pp. 1121-1132, July 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 2
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography-part ii: Cr capacity
    • PII S0018944898000777
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography -part II: CR capacity," IEEE Transactions on Information Theory, vol. 44, pp. 225-240, January 1998. (Pubitemid 128737891)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahlswede, R.1    Csiszar, I.2
  • 3
    • 26444448320 scopus 로고    scopus 로고
    • Cancelable key-based fingerprint templates
    • Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
    • R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable key-based fingerprint templates," in ACISP, pp. 242-252, 2005. (Pubitemid 41431785)
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 242-252
    • Ang, R.1    Safavi-Naini, R.2    McAven, L.3
  • 5
    • 0003307426 scopus 로고
    • Multiterminal source coding, the information theory approach to communications
    • (G. Longo, ed.), Springer-Verlag
    • T. Berger, "Multiterminal source coding, the information theory approach to communications," in CISM Courses and Lectures, vol. 229, (G. Longo, ed.), pp. 171-231, Springer-Verlag, 1978.
    • (1978) CISM Courses and Lectures , vol.229 , pp. 171-231
    • Berger, T.1
  • 6
    • 0016037985 scopus 로고
    • A simple converse for broadcast channels with additive white gaussian noise (corresp.)
    • March
    • P. Bergmans, "A simple converse for broadcast channels with additive white gaussian noise (corresp.)," IEEE Transactions on Information Theory, vol. 20, no. 2, pp. 279-280, March 1974.
    • (1974) IEEE Transactions on Information Theory , vol.20 , Issue.2 , pp. 279-280
    • Bergmans, P.1
  • 9
    • 84858187839 scopus 로고    scopus 로고
    • Controlling leakage of biometric information using dithering
    • I. Buhan, J. Doumen, and P. Hartel, "Controlling leakage of biometric information using dithering," in EUSIPCO, 2008.
    • (2008) EUSIPCO
    • Buhan, I.1    Doumen, J.2    Hartel, P.3
  • 10
    • 57049133508 scopus 로고    scopus 로고
    • Embedding renewable cryptographic keys into continuous noisy data
    • I. Buhan, J. Doumen, P. H. Hartel, Q. Tang, and R. N. J. Veldhuis, "Embedding renewable cryptographic keys into continuous noisy data," in ICICS, pp. 294-310, 2008.
    • (2008) ICICS , pp. 294-310
    • Buhan, I.1    Doumen, J.2    Hartel, P.H.3    Tang, Q.4    Veldhuis, R.N.J.5
  • 13
    • 84953586760 scopus 로고
    • Human identification in information systems: Management challenges and public policy issues
    • R. Clarke, "Human identification in information systems: Management challenges and public policy issues," Information Technology and People, vol. 7, no. 4, pp. 6-37, 1994.
    • (1994) Information Technology and People , vol.7 , Issue.4 , pp. 6-37
    • Clarke, R.1
  • 14
    • 0016486048 scopus 로고
    • A proof of the data compression theorem of Slepain and Wolf for ergodic sources
    • March
    • T. Cover, "A proof of the data compression theorem of Slepain and Wolf for ergodic sources," IEEE Transactions on Information Theory, vol. 22, pp. 226-228, March 1975.
    • (1975) IEEE Transactions on Information Theory , vol.22 , pp. 226-228
    • Cover, T.1
  • 17
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • DOI 10.1109/18.825796
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 344-366, 2000. (Pubitemid 30582727)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 18
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • December
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3047-3061, December 2004.
    • (2004) IEEE Transactions on Information Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 19
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • November
    • J. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148-1161, November 1993.
    • (1993) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.1
  • 23
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 24
    • 17744381820 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology -Eurocrypt, 2004.
    • (2004) Advances in Cryptology -Eurocrypt
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 27
    • 33747486011 scopus 로고
    • course notes (unpublished), Stanford University
    • G. D. Forney, "Information theory," 1972, course notes (unpublished), Stanford University.
    • (1972) Information Theory
    • Forney, G.D.1
  • 31
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • DOI 10.1109/TC.2006.138
    • F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, 2006. (Pubitemid 44263808)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 32
    • 70449470534 scopus 로고    scopus 로고
    • On the interplay between shannon's information measures and reliability criteria
    • Seoul, Korea, June 28-July 3
    • S.-W. Ho, "On the interplay between shannon's information measures and reliability criteria," in IEEE International Symposium on Information Theory (ISIT), pp. 154-158, Seoul, Korea, June 28-July 3 2009.
    • (2009) IEEE International Symposium on Information Theory (ISIT) , pp. 154-158
    • Ho, S.-W.1
  • 38
    • 77952661812 scopus 로고    scopus 로고
    • Secret-key and identification rates for biometric identification systems with protected templates
    • Rotterdam, The Netherlands, May 11-12
    • T. Ignatenko and F. Willems, "Secret-key and identification rates for biometric identification systems with protected templates," in Proceedings of Symposium on Information on Theory in the Benelux, pp. 337-348, Rotterdam, The Netherlands, May 11-12 2010.
    • (2010) Proceedings of Symposium on Information on Theory in the Benelux , pp. 337-348
    • Ignatenko, T.1    Willems, F.2
  • 47
    • 77649250983 scopus 로고    scopus 로고
    • Secure sketch for biometric templates
    • Shanghai, China, December
    • Q. Li, Y. Sutcu, and N. Memon, "Secure sketch for biometric templates," in Asiacrypt, LNCS, vol. 4284, Shanghai, China, December 2006.
    • (2006) Asiacrypt, LNCS , vol.4284
    • Li, Q.1    Sutcu, Y.2    Memon, N.3
  • 48
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • J.-P. M. G. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in AVBPA, pp. 393-402, 2003.
    • (2003) AVBPA , pp. 393-402
    • Linnartz, J.-P.M.G.1    Tuyls, P.2
  • 51
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , pp. 733-742
    • Maurer, U.1
  • 54
    • 37849009414 scopus 로고    scopus 로고
    • Hardening fingerprint fuzzy vault using password
    • K. Nandakumar, A. Nagar, and A. Jain, "Hardening fingerprint fuzzy vault using password," in ICB07, pp. 927-937, 2007.
    • (2007) ICB07 , pp. 927-937
    • Nandakumar, K.1    Nagar, A.2    Jain, A.3
  • 56
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Security and privacy concerns
    • March-April
    • S. Prabhakar, S. Pankanti, and A. Jain, "Biometric recognition: Security and privacy concerns," Security and Privacy, IEEE, vol. 1, no. 2, pp. 33-42, March-April 2003.
    • (2003) Security and Privacy, IEEE , vol.1 , Issue.2 , pp. 33-42
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.3
  • 60
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001. (Pubitemid 32933421)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 63
    • 4744340839 scopus 로고    scopus 로고
    • Performance prediction methodology for biometric systems using a large deviations approach
    • October
    • N. A. Schmid and J. A. O'Sullivan, "Performance prediction methodology for biometric systems using a large deviations approach," IEEE Transactions on Signal Processing, vol. 52, no. 10, pp. 3036-3045, October 2004.
    • (2004) IEEE Transactions on Signal Processing , vol.52 , Issue.10 , pp. 3036-3045
    • Schmid, N.A.1    O'Sullivan, J.A.2
  • 64
    • 85024264226 scopus 로고    scopus 로고
    • Inside risks: The uses and abuses of biometrics
    • B. Schneier, "Inside risks: The uses and abuses of biometrics," Communications of the ACM, vol. 42, no. 8, p. 136, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.8 , pp. 136
    • Schneier, B.1
  • 65
    • 0025519471 scopus 로고
    • A binary analog to the entropy-power inequality
    • November
    • S. Shamai and A. Wyner, "A binary analog to the entropy-power inequality," IEEE Transactions on Information Theory, vol. 36, no. 6, pp. 1428-1430, November 1990.
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.6 , pp. 1428-1430
    • Shamai, S.1    Wyner, A.2
  • 66
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 67
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon, "A mathematical theory of communication," The Bell System Technical Journal, vol. 27, pp. 623-656, 1948.
    • (1948) The Bell System Technical Journal , vol.27 , pp. 623-656
    • Shannon, C.E.1
  • 68
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," The Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
    • (1949) The Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 71
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • September
    • Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Transactions on Information Forensic and Security, vol. 2, no. 3, pp. 503-512, September 2007.
    • (2007) IEEE Transactions on Information Forensic and Security , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 73
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
    • A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892-1901, 2006.
    • (2006) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.1    Goh, A.2    Ngo, D.3
  • 75
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
    • P. Tuyls, A. Akkermans, T. Kevenaar, G.-J. Schrijen, B. A, and R. Veldhuis, "Practical biometric authentication with template protection," in International Conference on Audio-and Video-Based Personal Authentication (AVBPA), pp. 436-446, 2005. (Pubitemid 41423060)
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.H.M.2    Kevenaar, T.A.M.3    Schrijen, G.-J.4    Bazen, A.M.5    Veldhuis, R.N.J.6
  • 76
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in ECCV Workshop BioAW, pp. 158-170, 2004.
    • (2004) ECCV Workshop BioAW , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 78
    • 33646020998 scopus 로고    scopus 로고
    • A simple proof of the entropy power inequality
    • May
    • S. Verdu and D. Guo, "A simple proof of the entropy power inequality," IEEE Transactions on Information Theory, vol. 52, no. 5, pp. 2165-2166, May 2006.
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.5 , pp. 2165-2166
    • Verdu, S.1    Guo, D.2
  • 79
    • 0028461972 scopus 로고
    • A general formula for channel capacity
    • July
    • S. Verdu and T. S. Han, "A general formula for channel capacity," IEEE Transactions on Information Theory, vol. 40, no. 4, pp. 1147-1157, July 1994.
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.4 , pp. 1147-1157
    • Verdu, S.1    Han, T.S.2
  • 80
    • 0000478762 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," Journal of the IEEE, vol. 55, pp. 109-115, 1926.
    • (1926) Journal of the IEEE , vol.55 , pp. 109-115
    • Vernam, G.S.1
  • 82
    • 84935113569 scopus 로고
    • Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
    • April
    • A. J. Viterbi, "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm," IEEE Transactions on Information Theory, vol. 13, pp. 260-269, April 1967.
    • (1967) IEEE Transactions on Information Theory , vol.13 , pp. 260-269
    • Viterbi, A.J.1
  • 84
    • 70349281384 scopus 로고
    • Coding theorem for the AWGN channel in terms of jointly typical sequences
    • Houthalen, Belgium, May 25 & 26
    • F. Willems, "Coding theorem for the AWGN channel in terms of jointly typical sequences," in Symposium on Information Theory in the Benelux, pp. 13-18, Houthalen, Belgium, May 25 & 26 1989.
    • (1989) Symposium on Information Theory in the Benelux , pp. 13-18
    • Willems, F.1
  • 85
    • 84858191485 scopus 로고    scopus 로고
    • Fundamental limits for biometric identification with a database containing protected templates
    • Seattle, U.S.A., December 12-15
    • F. Willems and T. Ignatenko, "Fundamental limits for biometric identification with a database containing protected templates," in Proceedings of the IEEE Workshop on Information Forensics and Security, pp. 1185-1188, Seattle, U.S.A., December 12-15 2010.
    • (2010) Proceedings of the IEEE Workshop on Information Forensics and Security , pp. 1185-1188
    • Willems, F.1    Ignatenko, T.2
  • 86
    • 78149253455 scopus 로고    scopus 로고
    • Identification and secret-key generation in biometric systems with protected templates
    • Rome, Italy
    • F. Willems and T. Ignatenko, "Identification and secret-key generation in biometric systems with protected templates," in Proceedings of the ACM Workshop on Multimedia and Security, pp. 63-66, Rome, Italy, 2010.
    • (2010) Proceedings of the ACM Workshop on Multimedia and Security , pp. 63-66
    • Willems, F.1    Ignatenko, T.2
  • 90
    • 0015681689 scopus 로고
    • A theorem on the entropy of certain binary sequences and applications-I
    • November
    • A. Wyner and J. Ziv, "A theorem on the entropy of certain binary sequences and applications-I," IEEE Transactions on Information Theory, vol. 19, no. 6, pp. 769-772, November 1973.
    • (1973) IEEE Transactions on Information Theory , vol.19 , Issue.6 , pp. 769-772
    • Wyner, A.1    Ziv, J.2
  • 91
    • 0016882596 scopus 로고
    • The rate-distortion function for source coding with side information at the decoder
    • January
    • A. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Transactions on Information Theory, vol. 22, no. 1, pp. 1-10, January 1976.
    • (1976) IEEE Transactions on Information Theory , vol.22 , Issue.1 , pp. 1-10
    • Wyner, A.1    Ziv, J.2
  • 93
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly Gaussian random variables
    • DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from gaussian random variables," in IEEE International Symposium on Information Theory (ISIT), pp. 2593-2597, Seattle, USA, July 9-14 2006. (Pubitemid 351244572)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.