메뉴 건너뛰기




Volumn , Issue , 2012, Pages 498-505

Criteria towards metrics for benchmarking template protection algorithms

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC TEMPLATE; HOLISTIC APPROACH; ISO/IEC; PERFORMANCE ASPECTS; PERFORMANCE EVALUATION; REFERENCE ARCHITECTURE; TEMPLATE PROTECTION;

EID: 84866776956     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICB.2012.6199799     Document Type: Conference Paper
Times cited : (62)

References (38)
  • 4
    • 84922512713 scopus 로고    scopus 로고
    • The practical subtleties of biometric key generation
    • L. Ballard, S. Kamara, and M. K. Reiter. The practical subtleties of biometric key generation. In USENIX Security '08, pages 61-74, 2008.
    • (2008) USENIX Security '08 , pp. 61-74
    • Ballard, L.1    Kamara, S.2    Reiter, M.K.3
  • 5
    • 34948865766 scopus 로고    scopus 로고
    • Revocable fingerprint biotokens: Accuracy and security analysis
    • IEEE, june
    • T. Boult, W. Schdrer, and R. Woodworth. Revocable fingerprint biotokens: Accuracy and security analysis. In CVPR '07, pages 1-8. IEEE, june 2007.
    • (2007) CVPR '07 , pp. 1-8
    • Boult, T.1    Schdrer, W.2    Woodworth, R.3
  • 6
    • 38349176849 scopus 로고    scopus 로고
    • Extended private information retrieval and its application in biometrics authentications
    • volume 4856 of LNCS, Springer
    • J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang. Extended private information retrieval and its application in biometrics authentications. In CANS 2007, volume 4856 of LNCS, pages 175-193. Springer, 2007.
    • (2007) CANS 2007 , pp. 175-193
    • Bringer, J.1    Chabanne, H.2    Pointcheval, D.3    Tang, Q.4
  • 7
    • 58049132058 scopus 로고    scopus 로고
    • An application of the Boneh and Shacham group signature scheme to biometric authentication
    • volume 5312 of LNCS. Springer
    • J. Bringer, H. Chabanne, D. Pointcheval, and S. Zimmer. An application of the Boneh and Shacham group signature scheme to biometric authentication. In IWSEC 2008, volume 5312 of LNCS. Springer, 2008.
    • (2008) IWSEC 2008
    • Bringer, J.1    Chabanne, H.2    Pointcheval, D.3    Zimmer, S.4
  • 8
    • 84866778390 scopus 로고    scopus 로고
    • A quantitative analysis of cross-matching resilience for a continuous-domain biometric encryption technique
    • I. Buhan, J. Breebaart, J. Guajardo, K. de Groot, E. Kelkboom, and T. Akkermans. A quantitative analysis of cross-matching resilience for a continuous-domain biometric encryption technique. In SPEED 2009, 2009.
    • (2009) SPEED 2009
    • Buhan, I.1    Breebaart, J.2    Guajardo, J.3    De Groot, K.4    Kelkboom, E.5    Akkermans, T.6
  • 10
  • 13
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Springer
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In EUROCRYPT 2004, pages 523-540. Springer, 2004.
    • (2004) EUROCRYPT 2004 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 14
    • 84866781836 scopus 로고    scopus 로고
    • System portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
    • GenKey, US Patent 2006/0198514A1
    • GenKey. System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys - US Patent 2006/0198514A1, 2006.
    • (2006)
  • 15
  • 17
    • 0036350106 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • IEEE
    • A. Juels and M. Sudan. A fuzzy vault scheme. In ISIT 2002, page 408. IEEE, 2002.
    • (2002) ISIT 2002 , pp. 408
    • Juels, A.1    Sudan, M.2
  • 18
    • 0033281339 scopus 로고    scopus 로고
    • A fuzzy commitment scheme
    • ACM
    • A. Juels and M. Wattenberg. A fuzzy commitment scheme. In CCS '99, pages 28-36. ACM, 1999.
    • (1999) CCS '99 , pp. 28-36
    • Juels, A.1    Wattenberg, M.2
  • 19
    • 79951844995 scopus 로고    scopus 로고
    • Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
    • march
    • E. Kelkboom, J. Breebaart, T. Kevenaar, I. Buhan, and R. Veldhuis. Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Tr. on Inf. For. and Sec., 6(1):107-121, march 2011.
    • (2011) IEEE Tr. on Inf. For. and Sec. , vol.6 , Issue.1 , pp. 107-121
    • Kelkboom, E.1    Breebaart, J.2    Kevenaar, T.3    Buhan, I.4    Veldhuis, R.5
  • 20
    • 77649250983 scopus 로고    scopus 로고
    • Secure sketch for biometric templates
    • volume 4284 of LNCS, Springer
    • Q. Li, Y. Sutcu, and N. Memon. Secure sketch for biometric templates. In ASIACRYPT 2006, volume 4284 of LNCS, pages 99-113. Springer, 2006.
    • (2006) ASIACRYPT 2006 , pp. 99-113
    • Li, Q.1    Sutcu, Y.2    Memon, N.3
  • 21
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • volume 2688 of LNCS, Springer
    • J.-P. M. G. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA 2003, volume 2688 of LNCS, pages 393-402. Springer, 2003.
    • (2003) AVBPA 2003 , pp. 393-402
    • Linnartz, J.-P.M.G.1    Tuyls, P.2
  • 22
    • 77949786186 scopus 로고    scopus 로고
    • On the security of non-invertible fingerprint template transforms
    • IEEE
    • A. Nagar and A. Jain. On the security of non-invertible fingerprint template transforms. In WIFS 2009, pages 81-85. IEEE, 2009.
    • (2009) WIFS 2009 , pp. 81-85
    • Nagar, A.1    Jain, A.2
  • 23
    • 77951799602 scopus 로고    scopus 로고
    • Biometric template transformation: A security analysis
    • A. Nagar, K. Nandakumar, and A. K. Jain. Biometric template transformation: a security analysis. In SPIE 7541, 2010.
    • (2010) SPIE , vol.7541
    • Nagar, A.1    Nandakumar, K.2    Jain, A.K.3
  • 24
    • 36348986198 scopus 로고    scopus 로고
    • Fingerprint-based fuzzy vault: Implementation and performance
    • K. Nandakumar, A. Jain, and S. Pankanti. Fingerprint-based fuzzy vault: Implementation and performance. IEEE Tr. on Inf. For. and Sec., 2(4):744-757, 2007.
    • (2007) IEEE Tr. on Inf. For. and Sec. , vol.2 , Issue.4 , pp. 744-757
    • Nandakumar, K.1    Jain, A.2    Pankanti, S.3
  • 25
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Security and privacy concerns
    • S. Prabhakar, S. Pankanti, and A. K. Jain. Biometric recognition: Security and privacy concerns. IEEE Security and Privacy, 1(2):33-42, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.2 , pp. 33-42
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.K.3
  • 27
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems J., 40(3):614-634, 2001.
    • (2001) IBM Systems J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 28
    • 84879085385 scopus 로고    scopus 로고
    • A survey on biometric cryptosystems and cancelable biometrics
    • 2011
    • C. Rathgeb and A. Uhl. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. on Information Security, 2011(3), 2011.
    • (2011) EURASIP J. on Information Security , Issue.3
    • Rathgeb, C.1    Uhl, A.2
  • 29
    • 50249107013 scopus 로고    scopus 로고
    • Cracking fuzzy vaults and biometric encryption
    • W. Scheirer and T. Boult. Cracking fuzzy vaults and biometric encryption. In Biometrics Symposium, pages 1-6, 2007.
    • (2007) Biometrics Symposium , pp. 1-6
    • Scheirer, W.1    Boult, T.2
  • 30
    • 70449640064 scopus 로고    scopus 로고
    • Privacy weaknesses in biometric sketches
    • IEEE
    • K. Simoens, P. Tuyls, and B. Preneel. Privacy weaknesses in biometric sketches. In S&P 2009, pages 188-203. IEEE, 2009.
    • (2009) S&P 2009 , pp. 188-203
    • Simoens, K.1    Tuyls, P.2    Preneel, B.3
  • 33
    • 33748076787 scopus 로고    scopus 로고
    • A secure biometric authentication scheme based on robust hashing
    • ACM
    • Y. Sutcu, H. T. Sencar, and N. Memon. A secure biometric authentication scheme based on robust hashing. In MM&Sec '05, pages 111-116. ACM, 2005.
    • (2005) MM&Sec '05 , pp. 111-116
    • Sutcu, Y.1    Sencar, H.T.2    Memon, N.3
  • 34
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
    • A. Teoh, A. Goh, and D. Ngo. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal.Mach. Intell., 28(12):1892-1901, 2006.
    • (2006) IEEE Trans. Pattern Anal.Mach. Intell. , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.1    Goh, A.2    Ngo, D.3
  • 35
    • 35148885090 scopus 로고    scopus 로고
    • Cancelable biometrics realization with multispace random projections
    • A. Teoh and C. T. Yuang. Cancelable biometrics realization with multispace random projections. IEEE Trans. Syst., Man, Cybern. B, Cybern., 37(5):1096-1106, 2007.
    • (2007) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.37 , Issue.5 , pp. 1096-1106
    • Teoh, A.1    Yuang, C.T.2
  • 38
    • 78650371034 scopus 로고    scopus 로고
    • Dynamic random projection for biometric template protection
    • IEEE
    • B. Yang, D. Hartung, K. Simoens, and C. Busch. Dynamic random projection for biometric template protection. In BTAS 2010, pages 1-7. IEEE, 2010.
    • (2010) BTAS 2010 , pp. 1-7
    • Yang, B.1    Hartung, D.2    Simoens, K.3    Busch, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.