메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Quantifying privacy and security of biometric fuzzy commitment

Author keywords

[No Author keywords available]

Indexed keywords

3D FACE RECOGNITION; BINARY FEATURES; BIOMETRIC FEATURES; COMPREHENSIVE ANALYSIS; EMPIRICAL EVALUATIONS; EVALUATION RESULTS; FUZZY COMMITMENT; PRIVACY AND SECURITY; PROTECTION SYSTEMS; SECURITY ANALYSIS; SECURITY AND PRIVACY; TEMPLATE PROTECTION;

EID: 84862943231     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IJCB.2011.6117543     Document Type: Conference Paper
Times cited : (30)

References (24)
  • 3
    • 60749108051 scopus 로고    scopus 로고
    • An analysis on invertibility of cancelable biometrics based on biohashing
    • K. H. Cheung, A. w.-K. Kong, J. You, and D. Zhang. An analysis on invertibility of cancelable biometrics based on biohashing. In CISST'2005, pages 40-45,2005.
    • (2005) CISST'2005 , pp. 40-45
    • Cheung, K.H.1    Kong, A.W.-K.2    You, J.3    Zhang, D.4
  • 4
    • 84933530882 scopus 로고
    • Approximating discrete probability distributions with dependence trees
    • C. Chow and C. Liu. Approximating discrete probability distributions with dependence trees. In IEEE Transactions on Information Theory, IT-14, pages 462-467, 1968.
    • (1968) IEEE Transactions on Information Theory, IT-14 , pp. 462-467
    • Chow, C.1    Liu, C.2
  • 5
    • 0036487317 scopus 로고    scopus 로고
    • The importance of being random: Statistical principles of iris recognition
    • J. Daugman. The importance of being random: Statistical principles of iris recognition. In Pattern Rec. 36, pages 279-291,2003.
    • (2003) Pattern Rec. , vol.36 , pp. 279-291
    • Daugman, J.1
  • 6
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SlAM Journal on Computing, 38, 2008.
    • (2008) SlAM Journal on Computing , vol.38
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 33750918446 scopus 로고    scopus 로고
    • Combining cryptography with biometrics effectively
    • Univesity of Cambridge, Computer Laboratory July
    • F. Hao, R. Anderson, and J. Daugman. Combining cryptography with biometrics effectively. Technical Report 640, Univesity of Cambridge, Computer Laboratory, July 2005.
    • (2005) Technical Report 640
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 14
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication system. IBM Systems Journal, 40(3):614-634, 2001. (Pubitemid 32933421)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 16
    • 70449640064 scopus 로고    scopus 로고
    • Privacy weaknesses in biometric sketches the 2009 IEEE symposium on security and privacy
    • K. Simoens, P. Tuyls, and B. Preneel. Privacy weaknesses in biometric sketches. In the 2009 IEEE Symposium on Security and Privacy, IEEE Computer Society, pages 188-203,2009.
    • (2009) IEEE Computer Society , pp. 188-203
    • Simoens, K.1    Tuyls, P.2    Preneel, B.3
  • 19
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template protecting biometric authentication systems
    • Prague
    • P. Tuyls and J. Goseling. Capacity and examples of template protecting biometric authentication systems. In LNCS, editor, Biometric authentication workshop (BioAW 2004), number 3087, pages 158-170, Prague, 2004.
    • (2004) LNCS, Editor, Biometric Authentication Workshop (BioAW 2004) , Issue.3087 , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 24
    • 70350228909 scopus 로고    scopus 로고
    • A security analysis of biometric template protection schemes
    • International Conference on Image Analysis and Recognition IC1AR 2009, 29-38
    • X. Zhou, S. D. Wolthusen, C. Busch, and A. Kuijper. A security analysis of biometric template protection schemes. In International Conference on Image Analysis and Recognition IC1AR 2009, pages 29-38. LNCS 5627, 2009.
    • (2009) LNCS , pp. 5627
    • Zhou, X.1    Wolthusen, S.D.2    Busch, C.3    Kuijper, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.