메뉴 건너뛰기




Volumn 195, Issue , 2012, Pages 91-102

A crypto-biometric scheme based on iris-templates with fuzzy extractors

Author keywords

Biometric; Cryptography; Fuzzy extractor; Iris template

Indexed keywords

BEHAVIORAL FEATURES; BIOMETRIC TEMPLATE; BIOMETRIC TRAITS; FUZZY EXTRACTORS; IRIS TEMPLATE;

EID: 84858449499     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2012.01.042     Document Type: Article
Times cited : (54)

References (42)
  • 1
    • 38049006519 scopus 로고    scopus 로고
    • Fuzzy extractors for minutiae-based fingerprint authentication
    • S.W. Lee, S.Z. Li, Lecture Notes in Computer Science Springer New York, NY
    • A. Arakala, J. Jeffers, and K.J. Horadam Fuzzy extractors for minutiae-based fingerprint authentication S.W. Lee, S.Z. Li, Proceedings of Advances in Biometrics Lecture Notes in Computer Science vol. 4642 2007 Springer New York, NY 760 769
    • (2007) Proceedings of Advances in Biometrics , vol.4642 , pp. 760-769
    • Arakala, A.1    Jeffers, J.2    Horadam, K.J.3
  • 2
    • 85013430736 scopus 로고    scopus 로고
    • BIT
    • BIT, Biometric Ideal Test, < http://biometrics.idealtest.org/ findTotalDbByMode.do?mode=Iris >.
    • Biometric Ideal Test
  • 3
    • 14844335721 scopus 로고    scopus 로고
    • Reusable cryptographic fuzzy extractors
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • X. Boyen Reusable cryptographic fuzzy extractors Proceedings of the 11th ACM Conference on Computer and Communications Security 2004 ACM New York, NY 82 91 (Pubitemid 40338192)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 82-91
    • Boyen, X.1
  • 4
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith Secure remote authentication using biometric data R. Cramer, Proceedings of Advances in Cryptology Lecture Notes in Computer Science vol. 3494 2005 Springer New York, NY 147 163 (Pubitemid 41313951)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 10
    • 84858440981 scopus 로고    scopus 로고
    • Sistema criptobiométrico basado en iris para esquemas Diffie-Hellman con curva elíptica (ECDH)
    • E. Díez Laiz, C. Sánchez Ávila, Sistema criptobiométrico basado en iris para esquemas Diffie-Hellman con curva elíptica (ECDH), in: Proc. Congreso de Métodos Numéricos en Ingeniería, 2009.
    • (2009) Proc. Congreso de Métodos Numéricos en Ingeniería
    • Díez Laiz, E.1
  • 12
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM Journal Computing 38 1 2008 97 139
    • (2008) SIAM Journal Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 13
    • 78449313002 scopus 로고    scopus 로고
    • Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    • H. Guo, Z. Li, Y. Muc, and X. Zhang Provably secure identity-based authenticated key agreement protocols with malicious private key generators Information Sciences 181 2011 628 647
    • (2011) Information Sciences , vol.181 , pp. 628-647
    • Guo, H.1    Li, Z.2    Muc, Y.3    Zhang, X.4
  • 14
    • 64549088954 scopus 로고    scopus 로고
    • Type-1 and type-2 fuzzy inference systems as integration methods in modular neural networks for multimodal biometry and its optimization with genetic algorithms
    • D. Hidalgo, O. Castillo, and P. Melin Type-1 and type-2 fuzzy inference systems as integration methods in modular neural networks for multimodal biometry and its optimization with genetic algorithms Information Sciences 179 2009 2123 2145
    • (2009) Information Sciences , vol.179 , pp. 2123-2145
    • Hidalgo, D.1    Castillo, O.2    Melin, P.3
  • 15
    • 84886049786 scopus 로고    scopus 로고
    • Security efficiency analysis of a biometric fuzzy extractor for iris templates
    • A. Herrero, P. Gastaldo, R. Zunino, E. Corchado (Eds.) Springer, New York, NY, Advances in Intelligent and Soft Computing
    • F. Hernández Álvarez, L. Hernández Encinas, Security efficiency analysis of a biometric fuzzy extractor for iris templates, in: A. Herrero, P. Gastaldo, R. Zunino, E. Corchado (Eds.), Proc. 2nd Int. Workshop Computational Intelligence in Security for Information Systems, Springer, New York, NY, Advances in Intelligent and Soft Computing 63, 2009, pp. 163-170.
    • (2009) Proc. 2nd Int. Workshop Computational Intelligence in Security for Information Systems , vol.63 , pp. 163-170
    • Hernández Álvarez, F.1
  • 16
    • 70350576593 scopus 로고    scopus 로고
    • Tongue shape classification by geometric features
    • B. Huang, J. Wu, D. Zhang, and N. Li Tongue shape classification by geometric features Information Sciences 180 2010 312 324
    • (2010) Information Sciences , vol.180 , pp. 312-324
    • Huang, B.1    Wu, J.2    Zhang, D.3    Li, N.4
  • 22
    • 77950031110 scopus 로고    scopus 로고
    • Time-selective convertible undeniable signatures with short conversion receipts
    • F. Laguillaumie, and D. Vergnaud Time-selective convertible undeniable signatures with short conversion receipts Information Sciences 180 2010 2458 2475
    • (2010) Information Sciences , vol.180 , pp. 2458-2475
    • Laguillaumie, F.1    Vergnaud, D.2
  • 23
    • 77958593747 scopus 로고    scopus 로고
    • Activity-oriented access control to ubiquitous hospital information and services
    • X.H. Le, S. Lee, Y.K. Lee, H. Lee, M. Khalid, and R. Sankar Activity-oriented access control to ubiquitous hospital information and services Information Sciences 180 2010 2979 2990
    • (2010) Information Sciences , vol.180 , pp. 2979-2990
    • Le, X.H.1    Lee, S.2    Lee, Y.K.3    Lee, H.4    Khalid, M.5    Sankar, R.6
  • 24
    • 37849013877 scopus 로고    scopus 로고
    • Biometric key binding: Fuzzy vault based on iris images
    • S.W. Lee, S.Z. Li, Lecture Notes in Computer Science Springer New York, NY
    • Y.J. Lee, K. Bae, S.J. Lee, K.R. Park, and J. Kim Biometric key binding: fuzzy vault based on iris images S.W. Lee, S.Z. Li, Proceedings of Advances in Biometrics Lecture Notes in Computer Science vol. 4642 2007 Springer New York, NY 800 808
    • (2007) Proceedings of Advances in Biometrics , vol.4642 , pp. 800-808
    • Lee, Y.J.1    Bae, K.2    Lee, S.J.3    Park, K.R.4    Kim, J.5
  • 25
    • 71149116162 scopus 로고    scopus 로고
    • Signcryption from randomness recoverable public key encryption
    • C.K. Li, and D.S. Wong Signcryption from randomness recoverable public key encryption Information Sciences 180 2010 549 559
    • (2010) Information Sciences , vol.180 , pp. 549-559
    • Li, C.K.1    Wong, D.S.2
  • 26
    • 77958152470 scopus 로고    scopus 로고
    • Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes
    • H. Li, J. Zhang, and Z. Zhang Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes Information Sciences 180 2010 3876 3893
    • (2010) Information Sciences , vol.180 , pp. 3876-3893
    • Li, H.1    Zhang, J.2    Zhang, Z.3
  • 29
    • 84858444245 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Advanced Encryption Standard (AES), Federal Information Processing Standard Publication 197, 2001
    • National Institute of Standards and Technology, Advanced Encryption Standard (AES), Federal Information Processing Standard Publication 197, 2001.
  • 31
    • 84858445730 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standard Publication 186-3, 2009
    • National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standard Publication 186-3, 2009.
  • 32
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N.K. Ratha, J.H. Connell, and R.M. Bolle Enhancing security and privacy in biometrics-based authentication systems IBM Systems Journal 40 2001 614 634 (Pubitemid 32933421)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 33
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R.L. Rivest, A. Shamir, and L.M. Adleman A method for obtaining digital signatures and public-key cryptosystems Communication of ACM 21 2 1978 120 126 (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 34
    • 6444240127 scopus 로고    scopus 로고
    • Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation
    • C. Sánchez Ávila, and R. Sánchez-Reillo Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation Pattern Recognition 38 2 2005 231 240
    • (2005) Pattern Recognition , vol.38 , Issue.2 , pp. 231-240
    • Sánchez Ávila, C.1    Sánchez-Reillo, R.2
  • 38
    • 37849038363 scopus 로고    scopus 로고
    • Biometric fuzzy extractors made practical: A proposal based on FingerCodes
    • S.W. Lee, S.Z. Li, Lecture Notes in Computer Science Springer New York, NY
    • V.V. Triem Tong, H. Sibert, J. Lecoeur, and M. Girault Biometric fuzzy extractors made practical: a proposal based on FingerCodes S.W. Lee, S.Z. Li, Proceedings of Advances in Biometrics Lecture Notes in Computer Science vol. 4642 2007 Springer New York, NY 604 613
    • (2007) Proceedings of Advances in Biometrics , vol.4642 , pp. 604-613
    • Triem Tong, V.V.1    Sibert, H.2    Lecoeur, J.3    Girault, M.4
  • 40
    • 78449305489 scopus 로고    scopus 로고
    • Forward-secure identity-based signature: Security notions and construction
    • J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen Forward-secure identity-based signature: security notions and construction Information Sciences 181 2011 648 660
    • (2011) Information Sciences , vol.181 , pp. 648-660
    • Yu, J.1    Hao, R.2    Kong, F.3    Cheng, X.4    Fan, J.5    Chen, Y.6
  • 42
    • 35649009040 scopus 로고    scopus 로고
    • Template protection and its implementation in 3D face recognition systems
    • X. Zhou, Template protection and its implementation in 3D face recognition systems, in: Proc. SPIE Conf. Biometric Technology for Human Identification IV, 2007, pp. 214-225.
    • (2007) Proc. SPIE Conf. Biometric Technology for Human Identification , vol.4 , pp. 214-225
    • Zhou, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.