메뉴 건너뛰기




Volumn , Issue , 2009, Pages 655-718

Biometric Encryption: The New Breed of Untraceable Biometrics

Author keywords

Biometric encryption new breed of untraceable biometrics (UB); Entropy concept biometric modality identification for biometric entropy (BE); UB technologies exploiting utility of biometric technologies without privacy invasive aspects

Indexed keywords


EID: 84889618817     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9780470522356.ch26     Document Type: Chapter
Times cited : (42)

References (163)
  • 1
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems, IBM Syst. J. 40(3):614-634, 2001.
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 2
    • 8844228915 scopus 로고    scopus 로고
    • Attacks on biometric systems: A case study in fingerprints
    • Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, CA, January 18-22
    • U. Uludag and A. K. Jain, Attacks on biometric systems: A case study in fingerprints, in Proceedings of SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, CA, January 18-22, Vol. 5306, pp. 622-633, 2004.
    • (2004) Proceedings of SPIE-EI 2004 , vol.5306 , pp. 622-633
    • Uludag, U.1    Jain, A.K.2
  • 3
    • 38149030200 scopus 로고    scopus 로고
    • Biometric encryption:Apositive-sum technology that achieves strong authentication
    • security and privacy, Available at
    • A. Cavoukian and A. Stoianov, Biometric encryption:Apositive-sum technology that achieves strong authentication, security and privacy, March 2007. Available at www.ipc.on.ca/images/Resources/up-1bio encryp.pdf;
    • (2007)
    • Cavoukian, A.1    Stoianov, A.2
  • 4
    • 80052249505 scopus 로고    scopus 로고
    • Biometric encryption: Technology for strong authentication, security and privacy
    • E. de Leeuw, S. Fischer-Hübner, J. Tseng, and J. Borking, editors, Policies and Research in Identity Management, Springer, Boston
    • A. Cavoukian, A. Stoianov, and F. Carter, Biometric encryption: Technology for strong authentication, security and privacy, in E. de Leeuw, S. Fischer-Hübner, J. Tseng, and J. Borking, editors, IFIP International Federation for Information Processing. Policies and Research in Identity Management, Vol. 261, Springer, Boston, 2008, pp. 57-77.
    • (2008) IFIP International Federation for Information Processing , vol.261 , pp. 57-77
    • Cavoukian, A.1    Stoianov, A.2    Carter, F.3
  • 5
    • 0141611465 scopus 로고    scopus 로고
    • Risk of masquerade arising from the storage of biometrics
    • B. S. thesis, Australian National University, Dr. Roger Clarke, supervisor
    • C. J. Hill, Risk of masquerade arising from the storage of biometrics, B. S. thesis, Australian National University, 2001 (Dr. Roger Clarke, supervisor), http://chris.fornax.net/biometrics.html.
    • (2001)
    • Hill, C.J.1
  • 7
    • 33947492044 scopus 로고    scopus 로고
    • From templates to images: Reconstructing fingerprints from minutiae points
    • A. Ross, J, Shah, and A. K. Jain, From templates to images: Reconstructing fingerprints from minutiae points, IEEE Trans. Pattern Anal. Mach. Intell. 29(4):544-560, 2007.
    • (2007) IEEE Trans. Pattern Anal. Mach. Intell. , vol.29 , Issue.4 , pp. 544-560
    • Ross, A.1    Shah, J.2    Jain, A.K.3
  • 9
    • 84889624377 scopus 로고    scopus 로고
    • Privacy and security issues related to match scores
    • IEEE Workshop on Privacy Research In Vision, CVPRW
    • P. Mohanty, S. Sarkar, and R. Kasturi, Privacy and security issues related to match scores, in IEEE Workshop on Privacy Research In Vision, CVPRW, 2006.
    • (2006)
    • Mohanty, P.1    Sarkar, S.2    Kasturi, R.3
  • 10
    • 84889614381 scopus 로고    scopus 로고
    • OECD Directorate for Science, Technology and Industry, Committee for Information, Computer and Communications Policy: Biometric-Based Technologies (June 2004) at
    • OECD Directorate for Science, Technology and Industry, Committee for Information, Computer and Communications Policy: Biometric-Based Technologies (June 2004) at http://appli1.oecd.org/olis/2003doc.nsf/linkto/dsti-iccp-reg(2003)2-fina l.
  • 11
    • 84889614841 scopus 로고    scopus 로고
    • www.bioprivacy.org/bioprivacy main.htm.
  • 12
    • 84889624028 scopus 로고    scopus 로고
    • See, for example, the 27th International Conference of Data Protection and Privacy Commissioners, Montreux (16 September 2005), Resolution on the use of biometrics in passports, identity cards and travel documents
    • See, for example, the 27th International Conference of Data Protection and Privacy Commissioners, Montreux (16 September 2005), Resolution on the use of biometrics in passports, identity cards and travel documents: www.privacyconference2005.org/fileadmin/PDF/biometrie resolution e.pdf
  • 13
    • 84889614314 scopus 로고    scopus 로고
    • See, for example, European Union Article 29 Working Party, Working document on biometrics (August 2003) at
    • See, for example, European Union Article 29 Working Party, Working document on biometrics (August 2003) at: http://ec.europa.eu/justice home/fsj/privacy/docs/wpdocs/2003/wp80 en.pdf
  • 14
    • 84889619597 scopus 로고    scopus 로고
    • See UK Information Commissioner, Data Protection Technical Guidance Note: Privacy enhancing technologies (November 2006) at
    • See UK Information Commissioner, Data Protection Technical Guidance Note: Privacy enhancing technologies (November 2006) at http://tinyurl.com/23b6kc;
  • 15
    • 84889630677 scopus 로고    scopus 로고
    • European Commission Supports PETs: Promoting Data Protection by Privacy Enhancing Technologies (2 May 2007) at
    • European Commission Supports PETs: Promoting Data Protection by Privacy Enhancing Technologies (2 May 2007) at: http://ec.europa.eu/informationsociety/newsroom/cf/itemlongdetail.cfm?it em id=3402;
  • 16
    • 84889623138 scopus 로고    scopus 로고
    • Information and Privacy Commissioner of Ontario & Dutch Registratierkamer, Privacy-Enhancing Technologies: The Path to Anonymity (Volume I, August 1995)
    • Information and Privacy Commissioner of Ontario & Dutch Registratierkamer, Privacy-Enhancing Technologies: The Path to Anonymity (Volume I, August 1995): www.ipc.on.ca/index.asp?layid=86&fid1=329.
  • 20
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an off line biometrics based identification scheme
    • Workshop on Coding and Cryptography
    • G. I. Davida,Y. Frankel, B. J. Matt, and R. Peralta, On the relation of error correction and cryptography to an off line biometrics based identification scheme, in Workshop on Coding and Cryptography, 1999, pp. 129-138.
    • (1999) , pp. 129-138
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3    Peralta, R.4
  • 21
    • 0033281372 scopus 로고    scopus 로고
    • Password hardening based on keystroke dynamics
    • Proceedings of Sixth ACM Conference on Computer and Communications Security (CCCS 1999)
    • F. Monrose, M. K. Reiter, and R. Wetzel, Password hardening based on keystroke dynamics, in Proceedings of Sixth ACM Conference on Computer and Communications Security (CCCS 1999), 1999, pp. 73-82.
    • (1999) , pp. 73-82
    • Monrose, F.1    Reiter, M.K.2    Wetzel, R.3
  • 22
    • 0034829626 scopus 로고    scopus 로고
    • Cryptographic key generation from voice (extended abstract)
    • Proceedings of the 2001 IEEE Symposium on Security and Privacy, May
    • F. Monrose, M. K. Reiter, Q. (Peter) Li, and S. Wetzel, Cryptographic key generation from voice (extended abstract), in Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001.
    • (2001)
    • Monrose, F.1    Reiter, M.K.2    Li, Q.3    Wetzel, S.4
  • 23
    • 0038628620 scopus 로고    scopus 로고
    • Password hardening based on keystroke dynamics
    • F. Monrose, M. K. Reiter, and S. Wetzel, Password hardening based on keystroke dynamics, Int. J. Inf. Secur. 1(2):69-83, 2002.
    • (2002) Int. J. Inf. Secur. , vol.1 , Issue.2 , pp. 69-83
    • Monrose, F.1    Reiter, M.K.2    Wetzel, S.3
  • 24
    • 85084163045 scopus 로고    scopus 로고
    • Toward speech-generated cryptographic keys on resource constrained devices
    • Proceedings of the 11th USENIX Security Symposium
    • F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih, Toward speech-generated cryptographic keys on resource constrained devices, in Proceedings of the 11th USENIX Security Symposium, 2002, pp. 283-296.
    • (2002) , pp. 283-296
    • Monrose, F.1    Reiter, M.K.2    Li, Q.3    Lopresti, D.P.4    Shih, C.5
  • 25
    • 33750799305 scopus 로고    scopus 로고
    • Robust distance measures for face recognition supporting revocable biometric tokens
    • April 10-12, 2006, IEEE Computer Society,Washington, DC
    • T. Boult, Robust distance measures for face recognition supporting revocable biometric tokens, in Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition (April 10-12, 2006), IEEE Computer Society,Washington, DC, 2006, pp. 560-566.
    • (2006) Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition , pp. 560-566
    • Boult, T.1
  • 26
    • 34948865766 scopus 로고    scopus 로고
    • Revocable fingerprint biotokens: Accuracy and security analysis
    • IEEE Conference on Computer Vision and Pattern Recognition, June
    • T. E. Boult, W. J. Scheirer, and R. Woodworth, Revocable fingerprint biotokens: Accuracy and security analysis, IEEE Conference on Computer Vision and Pattern Recognition, June 2007.
    • (2007)
    • Boult, T.E.1    Scheirer, W.J.2    Woodworth, R.3
  • 27
    • 27244453175 scopus 로고    scopus 로고
    • Symmetric hash functions for fingerprint minutiae
    • Springer, Berlin
    • S. Tulyakov, F. Farooq, and V. Govindaraju, Symmetric hash functions for fingerprint minutiae, in Lecture Notes in Computer Science, Vol. 3687, Springer, Berlin, 2005, pp. 30-38.
    • (2005) Lecture Notes in Computer Science , vol.3687 , pp. 30-38
    • Tulyakov, S.1    Farooq, F.2    Govindaraju, V.3
  • 28
    • 54049105192 scopus 로고    scopus 로고
    • Fingerprint controlled public key cryptographic system
    • U.S. Patent 5541994, July 30, Priority date: September 7, 1994
    • G. J. Tomko, C. Soutar, and G. J. Schmidt, Fingerprint controlled public key cryptographic system, U.S. Patent 5541994, July 30, 1996 (Priority date: September 7, 1994);
    • (1996)
    • Tomko, G.J.1    Soutar, C.2    Schmidt, G.J.3
  • 29
    • 77951619986 scopus 로고    scopus 로고
    • Biometric controlled key generation
    • U.S. Patent 5680460, October 21, Priority date: September 7, 1994
    • G. J. Tomko, C. Soutar, and G. J. Schmidt, Biometric controlled key generation, U.S. Patent 5680460, October 21, 1997 (Priority date: September 7, 1994).
    • (1997)
    • Tomko, G.J.1    Soutar, C.2    Schmidt, G.J.3
  • 30
    • 34547096126 scopus 로고    scopus 로고
    • System and method for distorting a biometric for transactions with enhanced security and privacy
    • US Patent 6,836,554, December 28, Priority date: June 16, 2000
    • R. M. Bolle, J. H. Connel, and N. K. Ratha, System and method for distorting a biometric for transactions with enhanced security and privacy, US Patent 6,836,554, December 28, 2004 (Priority date: June 16, 2000).
    • (2004)
    • Bolle, R.M.1    Connel, J.H.2    Ratha, N.K.3
  • 31
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, Biometric cryptosystems: Issues and challenges, Proc. IEEE 92(6):948-960, 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 33
    • 84892363436 scopus 로고    scopus 로고
    • Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
    • Springer-Verlag, London
    • P. Tuyls, B. Skoríc, and T. Kevenaar, editors, Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag, London, 2007.
    • (2007)
    • Tuyls, P.1    Skoríc, B.2    Kevenaar, T.3
  • 34
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Proceedings, Eurocrypt 2004
    • Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, in Proceedings, Eurocrypt 2004, 2004, pp. 523-540.
    • (2004) , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 35
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • See also: Technical report No. 640, University of Cambridge, Computer Laboratory, July 2005
    • F. Hao, R. Anderson, and J. Daugman, Combining crypto with biometrics effectively, IEEE Trans. Comput. 55(9): 1081-1088, 2006. (See also: Technical report No. 640, University of Cambridge, Computer Laboratory, July 2005, http://www.cl.cam.ac.uk/TechReports/).
    • (2006) IEEE Trans. Comput. , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 36
    • 0003476270 scopus 로고    scopus 로고
    • Control Coding: Fundamentals and Applications
    • 2nd edition, Prentice Hall, Englewood Cliffs, NJ
    • S. Lin and D. J. Costello, Jr., Error Control Coding: Fundamentals and Applications, 2nd edition, Prentice Hall, Englewood Cliffs, NJ, 2005.
    • (2005)
    • Lin, S.1    Costello Jr., D.J.2
  • 37
    • 0003393908 scopus 로고
    • Error Control Systems for Digital Communication and Storage
    • Prentice Hall, Englewood Cliffs, NJ
    • S. B. Wicker, Error Control Systems for Digital Communication and Storage, Prentice Hall, Englewood Cliffs, NJ, 1995.
    • (1995)
    • Wicker, S.B.1
  • 38
    • 0003855464 scopus 로고    scopus 로고
    • Applied Cryptography
    • 2nd edition, John Wiley & Sons, New York
    • B. Schneier, Applied Cryptography, 2nd edition, John Wiley & Sons, New York, 1996.
    • (1996)
    • Schneier, B.1
  • 40
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • J. G. Daugman, High confidence visual recognition of persons by a test of statistical independence, IEEE Trans. Pattern Anal. Mach. Intelli. 15 (11): 1148-1161, 1993.
    • (1993) IEEE Trans. Pattern Anal. Mach. Intelli. , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.G.1
  • 41
    • 0036487317 scopus 로고    scopus 로고
    • The importance of being random: Statistical principles of iris recognition
    • J. Daugman. The importance of being random: Statistical principles of iris recognition, Pattern Recognit. 36(2):279-291, 2003.
    • (2003) Pattern Recognit. , vol.36 , Issue.2 , pp. 279-291
    • Daugman, J.1
  • 42
    • 84889628183 scopus 로고    scopus 로고
    • Statistical significance as an aid to system performance evaluation
    • Springer, Berlin
    • P. Tu and R. Hartley, Statistical significance as an aid to system performance evaluation, in Lecture Notes in Computer Science, Vol. 1843/2000, Springer, Berlin, 2000, pp. 366-378.
    • (2000) Lecture Notes in Computer Science , vol.1843 , Issue.2000 , pp. 366-378
    • Tu, P.1    Hartley, R.2
  • 44
    • 34548067136 scopus 로고    scopus 로고
    • Statistical models for assessing the individuality of fingerprints
    • Y. Zhu, S. C. Dass, and A. K. Jain, Statistical models for assessing the individuality of fingerprints, IEEE Trans. Inf. Forens. Secur. 2(3, Part 1):391-401, 2007. also http://www.cse.msu.edu/cgiuser/web/tech/reports?Year=2006.
    • (2007) IEEE Trans. Inf. Forens. Secur. , vol.2 , Issue.3 PART 1 , pp. 391-401
    • Zhu, Y.1    Dass, S.C.2    Jain, A.K.3
  • 45
    • 84889619792 scopus 로고    scopus 로고
    • The cotton ball problem, in Biometric Consortium Conference
    • Crystal City, Arlington VA, 20-22 September, Available at
    • J. S. Wayman, The cotton ball problem, in Biometric Consortium Conference, Crystal City, Arlington VA, 20-22 September 2004. Available at http://www.biometrics.org/bc2004/program.htm.
    • (2004)
    • Wayman, J.S.1
  • 46
    • 84889616534 scopus 로고    scopus 로고
    • http://bias.csr.unibo.it/fvc2002/; http://bias.csr.unibo.it/fvc2004/.
  • 47
    • 84889621641 scopus 로고    scopus 로고
    • Information content of biometric features
    • Biometric Consortium Conference, September 19-21, Washington, DC. Available at
    • A. Adler, R.Youmaran, and S. Loyka, Information content of biometric features, in Biometric Consortium Conference 2005, September 19-21, Washington, DC. Available at http://www.sce.carleton.ca/faculty/adler/publications/2005/adler-2005-bi ometrics-conf-entropy.pdf.
    • (2005)
    • Adler, A.1    Youmaran, R.2    Loyka, S.3
  • 48
    • 39049165071 scopus 로고    scopus 로고
    • Towards a measure of biometric information, in Canadian Conference on Computer Electronics and Engineering (CCECE)
    • Ottawa, Canada, May 7-10, Available at, See also Chapter 23 by Youmaran and Adler in the present book
    • R. Youmaran, A. Adler, and S. Loyka, Towards a measure of biometric information, in Canadian Conference on Computer Electronics and Engineering (CCECE), Ottawa, Canada, May 7-10, 2006. Available at http://www.sce.carleton.ca/faculty/adler/publications/2006/youmaran-ccec e2006-biometric-entropy.pdf. See also Chapter 23 by Youmaran and Adler in the present book.
    • (2006)
    • Youmaran, R.1    Adler, A.2    Loyka, S.3
  • 49
    • 84889620873 scopus 로고    scopus 로고
    • NISTIR 7408
    • FRVT 2006 and ICE 2006 large-scale results, National Institute of Standards and Technology, Gaithersburg, MD 20899, March, Available at
    • FRVT 2006 and ICE 2006 large-scale results, in NISTIR 7408, National Institute of Standards and Technology, Gaithersburg, MD 20899, March 2007. Available at http://www.frvt.org/FRVT2006/docs/FRVT2006andICE2006LargeScaleReport.pdf .
    • (2007)
  • 50
    • 84889611326 scopus 로고    scopus 로고
    • On the requirements of biometric key generators, Technical Report TR-JHU-SPAR-BKMR-090707
    • John Hopkins University, September 7, Available at
    • L. Ballard, S. Kamara, F. Monrose, and M. Reiter, On the requirements of biometric key generators, Technical Report TR-JHU-SPAR-BKMR-090707, John Hopkins University, September 7, 2007. Available at http://www.cs.jhu.edu/seny/pubs/bkg-req.pdf.
    • (2007)
    • Ballard, L.1    Kamara, S.2    Monrose, F.3    Reiter, M.4
  • 51
    • 84889629582 scopus 로고    scopus 로고
    • Biometrics and cryptography-On biometric keys, their information content and proper use
    • Conference on Biometric Feature Identification and Analysis, Göttingen,7.9, Available at
    • R. Plaga, Biometrics and cryptography-On biometric keys, their information content and proper use, in Conference on Biometric Feature Identification and Analysis, Göttingen,7.9.2007. Available at http://www.stochastik.math.uni-goettingen.de/biometrics2007/talks/Plaga. pdf;
    • (2007)
    • Plaga, R.1
  • 52
    • 84863889929 scopus 로고    scopus 로고
    • Cryptographic Protection of Biometric Templates: Chance, Challenges and Applications
    • Darmstadt, Germany, July, Available at
    • U. Korte, R. Plaga, Cryptographic Protection of Biometric Templates: Chance, Challenges and Applications, in Proceedings of BIOSiG 2007, Darmstadt, Germany, July 2007, pp. 33-45. Available at http://gi.ioport. net/lni276658/GI-Proceedings108.pdf.
    • (2007) Proceedings of BIOSiG 2007 , pp. 33-45
    • Korte, U.1    Plaga, R.2
  • 55
    • 33750920115 scopus 로고    scopus 로고
    • Synthetic fingerprint-image generation, in Proceedings 15th International Conference on Pattern Recognition (ICPR2000), Barcelona
    • September, See also
    • R. Cappelli, A. Erol, D. Maio, and D. Maltoni, Synthetic fingerprint-image generation, in Proceedings 15th International Conference on Pattern Recognition (ICPR2000), Barcelona, Vol. 3, September 2000. pp. 475-478, See also http://biolab.csr.unibo.it/research.asp.
    • (2000) , vol.3 , pp. 475-478
    • Cappelli, R.1    Erol, A.2    Maio, D.3    Maltoni, D.4
  • 56
    • 33947506091 scopus 로고
    • Method for producing a digital signature with aid of a biometric feature
    • German patent DE 42 43 908 A1, June 30, Priority date: Dec. 23, 1992
    • A. Bodo, Method for producing a digital signature with aid of a biometric feature, German patent DE 42 43 908 A1, June 30, 1994 (Priority date: Dec. 23, 1992).
    • (1994)
    • Bodo, A.1
  • 57
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Proceedings of the 4th International Conference on Audio and Video Based Biometric Person Authentication, Guildford, UK
    • J.-P. Linnartz and P. Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates, in Proceedings of the 4th International Conference on Audio and Video Based Biometric Person Authentication, Guildford, UK, 2003, pp. 393-402.
    • (2003) , pp. 393-402
    • Linnartz, J.-P.1    Tuyls, P.2
  • 58
    • 44049084315 scopus 로고    scopus 로고
    • Template-free biometric-key generation by means of fuzzy genetic clustering
    • W. Sheng, G. Howells, M. Fairhurst, and F. Deravi, Template-free biometric-key generation by means of fuzzy genetic clustering, IEEE Trans. Inf. Forens. Secur. 3(2):183-191, 2008.
    • (2008) IEEE Trans. Inf. Forens. Secur. , vol.3 , Issue.2 , pp. 183-191
    • Sheng, W.1    Howells, G.2    Fairhurst, M.3    Deravi, F.4
  • 59
  • 60
    • 77957936325 scopus 로고    scopus 로고
    • Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
    • U.S. Patent 5712912, January 27, Priority date: July 28, 1995
    • G. J. Tomko and A. Stoianov, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques, U.S. Patent 5712912, January 27, 1998 (Priority date: July 28, 1995).
    • (1998)
    • Tomko, G.J.1    Stoianov, A.2
  • 61
    • 77957957939 scopus 로고    scopus 로고
    • Method for secure key management using a biometric
    • U.S. Patent 6219794, April 17, Priority date: April 21, 1997
    • C. Soutar, D. Roberge, A. V. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar, Method for secure key management using a biometric, U.S. Patent 6219794, April 17, 2001 (Priority date: April 21, 1997).
    • (2001)
    • Soutar, C.1    Roberge, D.2    Stoianov, A.V.3    Gilroy, R.4    Vijaya Kumar, B.V.K.5
  • 62
    • 84932603213 scopus 로고    scopus 로고
    • Biometric encryption for secure key generation, presentation at the 1998 RSA Data Security Conference
    • San Francisco, January
    • C. Soutar, Biometric encryption for secure key generation, presentation at the 1998 RSA Data Security Conference, San Francisco, January 1998.
    • (1998)
    • Soutar, C.1
  • 65
    • 0033281339 scopus 로고    scopus 로고
    • A fuzzy commitment scheme, in Sixth ACM Conference on Computer and Communications Security
    • ACM Press, New York
    • A. Juels and M. Wattenberg, A fuzzy commitment scheme, in Sixth ACM Conference on Computer and Communications Security, ACM Press, New York, 1999, pp. 28-36.
    • (1999) , pp. 28-36
    • Juels, A.1    Wattenberg, M.2
  • 67
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template protecting biometric authentication systems
    • May
    • P. Tuyls and J. Goseling, Capacity and examples of template protecting biometric authentication systems, in Biometric Authentication Workshop, Prague (ECCV2004), May 2004, pp. 158-170.
    • (2004) Biometric Authentication Workshop, Prague (ECCV2004) , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 68
    • 84979943964 scopus 로고    scopus 로고
    • Privacy protecting biometric authentication systems: an overview
    • XII European Signal Processing Conference (EUSIPCO 2004, Vienna, Austria)
    • P. Tuyls, E. Verbitskiy, J. Goseling, and D. Denteneer, Privacy protecting biometric authentication systems: an overview, in XII European Signal Processing Conference (EUSIPCO 2004, Vienna, Austria), 2004, pp. 1397-1400.
    • (2004) , pp. 1397-1400
    • Tuyls, P.1    Verbitskiy, E.2    Goseling, J.3    Denteneer, D.4
  • 69
    • 44849118766 scopus 로고    scopus 로고
    • Privacy protection of biometric templates: Cryptography on noisy data
    • H. F. Revue editors, No. 3
    • P.Tuyls, Privacy protection of biometric templates: Cryptography on noisy data, in H. F. Revue editors, No. 3, 2004, pp. 55-64.
    • (2004) , pp. 55-64
    • Tuyls, P.1
  • 71
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • F. Hao, C. W. Chan, Private key generation from on-line handwritten signatures, Inf. Management Comput. Secur. 10(2):159-164, 2002.
    • (2002) Inf. Management Comput. Secur. , vol.10 , Issue.2 , pp. 159-164
    • Hao, F.1    Chan, C.W.2
  • 73
    • 14844335721 scopus 로고    scopus 로고
    • Reusable cryptographic fuzzy extractors
    • Washington, DC, October, Available at
    • X. Boyen, Reusable cryptographic fuzzy extractors, in 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington, DC, October 2004, pp. 82-91. Available at http://crypto.stanford.edu/xb//ccs04/fuzzysecure.pdf.
    • (2004) 11th ACM Conference on Computer and Communications Security (CCS 2004) , pp. 82-91
    • Boyen, X.1
  • 75
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • AVBPA 2005, Hilton Rye Town, NY, July 20-22, 2005, Lecture Notes in Computer Science, Springer, Berlin
    • P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G.-J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, Practical biometric authentication with template protection, in 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, July 20-22, 2005, Lecture Notes in Computer Science, Vol. 3546, Springer, Berlin, 2005, pp. 436-446.
    • (2005) 5th International Conference , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.H.M.2    Kevenaar, T.A.M.3    Schrijen, G.-J.4    Bazen, A.M.5    Veldhuis, R.N.J.6
  • 76
    • 33645656961 scopus 로고    scopus 로고
    • Face biometrics with renewable templates
    • Security, Steganography, andWatermarking of Multimedia Contents VIII
    • M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and Fei Zuo, Face biometrics with renewable templates, in Proceedings of SPIE, Vol. 6072: Security, Steganography, andWatermarking of Multimedia Contents VIII, 2006.
    • (2006) Proceedings of SPIE , vol.6072
    • Van Der Veen, M.1    Kevenaar, T.2    Schrijen, G.-J.3    Akkermans, T.H.4    Zuo, F.5
  • 77
    • 84873884975 scopus 로고    scopus 로고
    • Privacy enhancing technology for a 3D-face recognition system
    • Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 12-13, July 2007, Darmstadt, Germany, Available at
    • X. Zhou, T. A. M.Kevenaar, E.Kelkboom, C. Busch, M. van derVeen, and A. Nouak, Privacy enhancing technology for a 3D-face recognition system, in BIOSIG 2007: Biometrics and Electronic Signatures, Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 12-13, July 2007, Darmstadt, Germany, 2007, pp. 3-14. Available at http://www.3dface.org/files/papers/zhou-CAST2007-TemplateProtection.pdf.
    • (2007) BIOSIG 2007: Biometrics and Electronic Signatures , pp. 3-14
    • Zhou, X.1    Kevenaar, T.A.M.2    Kelkboom, E.3    Busch, C.4    Van DerVeen, M.5    Nouak, A.6
  • 78
    • 35649009040 scopus 로고    scopus 로고
    • Template protection and its implementation in 3D face recognition systems
    • Biometric Technology for Human Identification IV, April, Available at
    • X. Zhou, Template protection and its implementation in 3D face recognition systems, in Proceedings of SPIE, Biometric Technology for Human Identification IV, Vol. 6539, April 2007. Available at http://www.3dface.org/files/papers/zhou-SPIE2007-template-protection.pdf .
    • (2007) Proceedings of SPIE , vol.6539
    • Zhou, X.1
  • 80
    • 48649088535 scopus 로고    scopus 로고
    • Multi-bits biometric string generation based on the likelihood ratio
    • Applications and Systems, September 27-29th, Washington DC
    • C. Chen, R. Veldhuis, T. Kevenaar, and T. Akkermans, Multi-bits biometric string generation based on the likelihood ratio, in IEEE Conference on Biometrics: Theory, Applications and Systems, September 27-29th, 2007, Washington DC.
    • (2007) IEEE Conference on Biometrics: Theory
    • Chen, C.1    Veldhuis, R.2    Kevenaar, T.3    Akkermans, T.4
  • 82
    • 84889617056 scopus 로고    scopus 로고
    • Biometrics-based cryptographic key generation system and method
    • US Patent Application 20060083372, Filing Date: 03/11/2005
    • Y. J. Chang, T. Chen, and W. Zhang, Biometrics-based cryptographic key generation system and method, US Patent Application 20060083372, Filing Date: 03/11/2005.
    • Chang, Y.J.1    Chen, T.2    Zhang, W.3
  • 84
    • 84889621473 scopus 로고    scopus 로고
    • www.3Dface.org.
  • 86
    • 84866781836 scopus 로고    scopus 로고
    • System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
    • US Patent Application 2006/0198514 A1, September 7, Priority date: October 1, 2001
    • J. Lyseggen, R. A. Lauritzsen, and K. G. S. Oyhus, System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys, US Patent Application 2006/0198514 A1, September 7, 2006 (Priority date: October 1, 2001).
    • Lyseggen, J.1    Lauritzsen, R.A.2    Oyhus, K.G.S.3
  • 87
    • 84867698856 scopus 로고    scopus 로고
    • Data processing apparatus and method
    • PCT Patent Application PCT/GB02/00626 (WO02/098053), December 5, Priority date: May 31, 2001
    • G. D. Duffy and W. A. Jones, Data processing apparatus and method, PCT Patent Application PCT/GB02/00626 (WO02/098053), December 5, 2002 (Priority date: May 31, 2001).
    • (2002)
    • Duffy, G.D.1    Jones, W.A.2
  • 88
    • 70449614664 scopus 로고    scopus 로고
    • Constructing practical fuzzy extractors using QIM
    • Technical Report TR-CTIT-07-52 Centre for Telematics and Information Technology, University of Twente, Enschede, Available at
    • I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. J. Veldhuis, Constructing practical fuzzy extractors using QIM, Technical Report TR-CTIT-07-52 Centre for Telematics and Information Technology, University of Twente, Enschede, 2007. Available at http://eprints.eemcs.utwente.nl/10785/01/quantizers.pdf.
    • (2007)
    • Buhan, I.R.1    Doumen, J.M.2    Hartel, P.H.3    Veldhuis, R.N.J.4
  • 89
    • 0036350106 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • 2002 IEEE International Symposium on Information Theory, Piscataway, NJ
    • A. Juels and M. Sudan, A fuzzy vault scheme, in Proceedings, 2002 IEEE International Symposium on Information Theory, Piscataway, NJ, 2002, p. 408.
    • (2002) Proceedings , pp. 408
    • Juels, A.1    Sudan, M.2
  • 90
    • 84937704662 scopus 로고    scopus 로고
    • Secure smartcard-based fingerprint authentication
    • Biometrics Methods and Applications Workshop (WBMA'03), Berkeley, CA, November
    • T. C. Clancy, N. Kiyavash, and D. J. Lin, Secure smartcard-based fingerprint authentication, in Proceedings, ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop (WBMA'03), Berkeley, CA, November 2003, pp. 45-52.
    • (2003) Proceedings, ACMSIGMM 2003 Multimedia , pp. 45-52
    • Clancy, T.C.1    Kiyavash, N.2    Lin, D.J.3
  • 92
    • 21644442033 scopus 로고    scopus 로고
    • Secure fuzzy vault based fingerprint verification system
    • Systems, and Computers (2004)
    • S. Yang and I. Verbauwhede, Secure fuzzy vault based fingerprint verification system. in Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers (2004), Vol. 1, 2004, pp. 577-581.
    • (2004) Thirty-Eighth Asilomar Conference on Signals , vol.1 , pp. 577-581
    • Yang, S.1    Verbauwhede, I.2
  • 93
    • 50249122051 scopus 로고    scopus 로고
    • Fingerprint alignment for a minutiae-based fuzzy vault
    • Baltimore, September
    • J. Jeffers and A. Arakala, Fingerprint alignment for a minutiae-based fuzzy vault, in Biometric Consortium Conference, Baltimore, September 2007.
    • (2007) Biometric Consortium Conference
    • Jeffers, J.1    Arakala, A.2
  • 94
    • 36348986198 scopus 로고    scopus 로고
    • Fingerprint-based fuzzy vault: Implementation and performance
    • Available at
    • K. Nandakumar, A. K. Jain, and S. C. Pankanti, Fingerprint-based fuzzy vault: Implementation and performance, IEEE Trans. Inf. Forens. Secur. 2(4):744-757, 2007. Available at http://biometrics.cse.msu.edu/Publications/SecureBiometrics/NandakumarJa inPankanti FpFuzzyVault TIFS07.pdf.
    • (2007) IEEE Trans. Inf. Forens. Secur. , vol.2 , Issue.4 , pp. 744-757
    • Nandakumar, K.1    Jain, A.K.2    Pankanti, S.C.3
  • 95
    • 37849009414 scopus 로고    scopus 로고
    • Hardening fingerprint fuzzy vault using password
    • Seoul, Korea, August 27-29, Lecture Notes in Computer Science, 4642/2007, Springer, 2007, Available at
    • K. Nandakumar, A. Nagar, and A. K. Jain, Hardening fingerprint fuzzy vault using password, in Proceedings of ICB 2007, Seoul, Korea, August 27-29, 2007, Lecture Notes in Computer Science, 4642/2007, Springer, 2007, pp. 927-937. Available at http://biometrics.cse.msu.edu/Publications/SecureBiometrics/NandakumarNa garJain FpFuzzyVaultHardening ICB2007.pdf.
    • (2007) Proceedings of ICB 2007 , pp. 927-937
    • Nandakumar, K.1    Nagar, A.2    Jain, A.K.3
  • 99
    • 50249133245 scopus 로고    scopus 로고
    • Fuzzy vault for face based cryptographic key generation
    • Baltimore, September
    • Y. Wang and K. N. Plataniotis, Fuzzy vault for face based cryptographic key generation, in Biometric Consortium Conference, Baltimore, September 2007.
    • (2007) Biometric Consortium Conference
    • Wang, Y.1    Plataniotis, K.N.2
  • 101
    • 35248868841 scopus 로고    scopus 로고
    • Computation of cryptographic keys from face biometrics
    • Lecture Notes in Computer Science (LNCS), Vol. 2828, Springer, Berlin
    • A. Goh and D. C. L. Ngo, Computation of cryptographic keys from face biometrics, in International Federation for Information Processing 2003. Lecture Notes in Computer Science (LNCS), Vol. 2828, Springer, Berlin, 2003, pp. 1-13.
    • (2003) International Federation for Information Processing 2003 , pp. 1-13
    • Goh, A.1    Ngo, D.C.L.2
  • 102
    • 8344273612 scopus 로고    scopus 로고
    • Personalised cryptographic key generation based on FaceHashing
    • A. B. J. Teoh, D. C. L. Ngo,, and A. Goh, Personalised cryptographic key generation based on FaceHashing, Comput. Secur. 23:606-614, 2004.
    • (2004) Comput. Secur. , vol.23 , pp. 606-614
    • Teoh, A.B.J.1    Ngo, D.C.L.2    Goh, A.3
  • 103
    • 43949117579 scopus 로고    scopus 로고
    • Application-specific key release scheme from biometrics
    • O. T. Song, A. Teoh, and D. C. L. Ngo, Application-specific key release scheme from biometrics, Int. J. Network Secur. 6(2):127-133, 2008;
    • (2008) Int. J. Network Secur. , vol.6 , Issue.2 , pp. 127-133
    • Song, O.T.1    Teoh, A.2    Ngo, D.C.L.3
  • 105
    • 84962074661 scopus 로고    scopus 로고
    • Secure biometrics via syndromes
    • Control and Computing. Monticello, IL, September, Available at
    • E. Martinian, S. Yekhanin, and J. S. Yedidia, Secure biometrics via syndromes, in Allerton Conference on Communications, Control and Computing. Monticello, IL, September 2005. Available at http://www.merl.com/reports/docs/TR2005-112.pdf.
    • (2005) Allerton Conference on Communications
    • Martinian, E.1    Yekhanin, S.2    Yedidia, J.S.3
  • 106
    • 52349091161 scopus 로고    scopus 로고
    • Secure storage of fingerprint biometrics using Slepian-Wolf codes
    • Work, UCSD, San Diego, CA, Jan., Available at
    • S. C. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia, Secure storage of fingerprint biometrics using Slepian-Wolf codes, in Inform. Theory and Apps. Work, UCSD, San Diego, CA, Jan. 2007. Available at http://www.merl.com/reports/docs/TR2007-006.pdf.
    • (2007) Inform. Theory and Apps.
    • Draper, S.C.1    Khisti, A.2    Martinian, E.3    Vetro, A.4    Yedidia, J.S.5
  • 107
    • 34547512147 scopus 로고    scopus 로고
    • Using distributed source coding to secure fingerprint biometrics
    • Speech and Signal Processing (ICASSP), April, Available at
    • S. C. Draper, A. Khisti, E. Martinian, A. Vetro and J. S. Yedidia, Using distributed source coding to secure fingerprint biometrics, in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vol. 2, April 2007, pp. 129-132. Available at http://www.merl.com/reports/docs/TR2007-005.pdf.
    • (2007) Proc. of IEEE International Conference on Acoustics , vol.2 , pp. 129-132
    • Draper, S.C.1    Khisti, A.2    Martinian, E.3    Vetro, A.4    Yedidia, J.S.5
  • 108
    • 77957960870 scopus 로고    scopus 로고
    • Cryptographic key generation using biometric data
    • U.S. Patent 6035398, March 7, Priority date: November 14, 1997
    • V. Bjorn, Cryptographic key generation using biometric data, U.S. Patent 6035398, March 7, 2000 (Priority date: November 14, 1997).
    • Bjorn, V.1
  • 112
    • 78549296163 scopus 로고    scopus 로고
    • A novel biometric key scheme
    • Available at
    • Q. Li, X. Niu, and S. Sun, A novel biometric key scheme, Chinese J. Electron. 2005. Available at http://www.paper.edu.cn.
    • (2005) Chinese J. Electron.
    • Li, Q.1    Niu, X.2    Sun, S.3
  • 114
    • 69949122147 scopus 로고    scopus 로고
    • Design and analysis of fuzzy extractors for faces
    • 73061X-12
    • Y. Sutcu, Q. Li, and N. Memon, Design and analysis of fuzzy extractors for faces, in Proc. of SPIE, 7306: 73061X-1-73061X-12, 2009.
    • (2009) Proc. of SPIE , vol.7306
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 116
    • 77951574489 scopus 로고    scopus 로고
    • Coding solutions for the secure biometric storage problem
    • Technical report
    • D. Schipani and J. Rosenthal, Coding solutions for the secure biometric storage problem, Technical report, 2007, http://arxiv.org/PScache/cs/pdf/0701/0701102v1.pdf.
    • (2007)
    • Schipani, D.1    Rosenthal, J.2
  • 117
    • 84889611556 scopus 로고    scopus 로고
    • Method of biometric authentication
    • US Patent 7272245 September 18, Priority date: 05/13/2004
    • W. J. Layton, Method of biometric authentication, US Patent 7272245 September 18, 2007 (Priority date: 05/13/2004).
    • (2007)
    • Layton, W.J.1
  • 118
    • 1642298729 scopus 로고    scopus 로고
    • Best practices in testing and reporting performance of biometric devices
    • NPL Report CMSC 14/02, August
    • A. J. Mansfield and J. L. Wayman, Best practices in testing and reporting performance of biometric devices, NPL Report CMSC 14/02, August 2002. http://www.cesg.gov.uk/site/ast/biometrics/media/BestPractice.pdf.
    • (2002)
    • Mansfield, A.J.1    Wayman, J.L.2
  • 123
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • A. Teoh, D. Ngo,, and A. Goh, Biohashing: Two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognit. 37:2245-2255, 2004.
    • (2004) Pattern Recognit. , vol.37 , pp. 2245-2255
    • Teoh, A.1    Ngo, D.2    Goh, A.3
  • 124
    • 9944223229 scopus 로고    scopus 로고
    • PalmHashing: A novel approach for cancelable biometrics
    • T. Connie, A. Teoh, M. Goh,, and D. Ngo, PalmHashing: A novel approach for cancelable biometrics, Inf. Processing Lett. 93:1-5, 2005.
    • (2005) Inf. Processing Lett. , vol.93 , pp. 1-5
    • Connie, T.1    Teoh, A.2    Goh, M.3    Ngo, D.4
  • 126
    • 33644662906 scopus 로고    scopus 로고
    • Recognition using robust bit extraction
    • 043016-11
    • D. C. L. Ngo, A. Goh, and A. B. J. Teoh, Recognition using robust bit extraction, J. Electron. Imaging 14(4):043016-1-043016-11, 2005.
    • (2005) J. Electron. Imaging , vol.14 , Issue.4 , pp. 043016-1
    • Ngo, D.C.L.1    Goh, A.2    Teoh, A.B.J.3
  • 127
    • 33947411232 scopus 로고    scopus 로고
    • Replaceable and securely hashed keys from online signatures
    • W. K. Yip, A. B. J. Teoh, and D. C. L. Ngo, Replaceable and securely hashed keys from online signatures. IEICE Electronics Express 3(18):410-416, 2006.
    • (2006) IEICE Electronics Express , vol.3 , Issue.18 , pp. 410-416
    • Yip, W.K.1    Teoh, A.B.J.2    Ngo, D.C.L.3
  • 128
    • 33846224825 scopus 로고    scopus 로고
    • Secure hashing of dynamic hand signatures using wavelet-Fourier compression with BioPhasor mixing and 2N discretization
    • Article ID 59125
    • W. K. Yip, A. B. J. Teoh, and D. C. L. Ngo, Secure hashing of dynamic hand signatures using wavelet-Fourier compression with BioPhasor mixing and 2N discretization, EURASIP J. Adv. Signal Processing, Vol. 2007, Article ID 59125, 8 pages, 2007.
    • (2007) EURASIP J. Adv. Signal Processing , vol.2007 , pp. 8
    • Yip, W.K.1    Teoh, A.B.J.2    Ngo, D.C.L.3
  • 129
    • 35148885090 scopus 로고    scopus 로고
    • Cancelable biometrics realization with multispace random projections
    • A. B. J. Teoh and C. T. Yuang, Cancelable biometrics realization with multispace random projections, IEEE Trans. Syst. Man. Cybern. Part B: Cybernetics 37(5):1096-1106, 2007.
    • (2007) IEEE Trans. Syst. Man. Cybern. Part B: Cybernetics , vol.37 , Issue.5 , pp. 1096-1106
    • Teoh, A.B.J.1    Yuang, C.T.2
  • 130
    • 33744964477 scopus 로고    scopus 로고
    • Revealing the secret of FaceHashing
    • Lecture Notes in Computer Science, Springer, Berlin, Available at
    • K. H. Cheung, B. Kong, D. Zhang, M. Kamel, and J. You, Revealing the secret of FaceHashing, in Proceedings of International Conference on Biometrics (ICB 2006), Lecture Notes in Computer Science, Vol. 3832, Springer, Berlin, 2006, pp. 106-112. Available at http://staffx.webstore.ntu.edu.sg/personal/adamskong/Shared%20Documents/ publication/FaceHashingICBA2006.pdf.
    • (2006) Proceedings of International Conference on Biometrics (ICB 2006) , vol.3832 , pp. 106-112
    • Cheung, K.H.1    Kong, B.2    Zhang, D.3    Kamel, M.4    You, J.5
  • 131
    • 33750533142 scopus 로고    scopus 로고
    • An improved BioHashing for human authentication
    • Available at
    • A. Lumini and L. Nanni, An improved BioHashing for human authentication, Pattern Recognit. 40(3): 1057-1065, 2006. Available at http://bias.csr.unibo.it/gpubs/docs/2006 BioH.zip.
    • (2006) Pattern Recognit. , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 132
    • 33745212257 scopus 로고    scopus 로고
    • An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers
    • August, Available at
    • A. Lumini and L. Nanni, An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers, NeuroComputing 69(13):1706-1710, August 2006. Available at http://bias.csr.unibo.it/gpubs/docs/2006AMM NeuroC.zip.
    • (2006) NeuroComputing , vol.69 , Issue.13 , pp. 1706-1710
    • Lumini, A.1    Nanni, L.2
  • 133
    • 50249156015 scopus 로고    scopus 로고
    • Face based biometric authentication with changeable and privacy preservable templates
    • Baltimore, September
    • Y. Wang and K. N. Plataniotis, Face based biometric authentication with changeable and privacy preservable templates, in Biometric Consortium Conference, Baltimore, September 2007.
    • (2007) Biometric Consortium Conference
    • Wang, Y.1    Plataniotis, K.N.2
  • 135
    • 84874156152 scopus 로고    scopus 로고
    • A method and a system for biometric identification or verification
    • Swedish Patent 0202147-5. Priority date: July 9, 2002. PCT Patent Application WO 2004/006495, PCT/SE2003/001181. US Patent Application US2005/0210269 A1, September 22
    • M. Tiberg, A method and a system for biometric identification or verification, Swedish Patent 0202147-5. Priority date: July 9, 2002. PCT Patent Application WO 2004/006495, PCT/SE2003/001181. US Patent Application US2005/0210269 A1, September 22, 2005.
    • (2005)
    • Tiberg, M.1
  • 137
    • 27244453175 scopus 로고    scopus 로고
    • Symmetric hash functions for fingerprint minutiae
    • Springer, Berlin
    • S. Tulyakov, F. Farooq, and V. Govindaraju, Symmetric hash functions for fingerprint minutiae, in Lecture Notes in Computer Science, Vol. 3687, Springer, Berlin, 2005, pp. 30-38.
    • (2005) Lecture Notes in Computer Science , vol.3687 , pp. 30-38
    • Tulyakov, S.1    Farooq, F.2    Govindaraju, V.3
  • 138
    • 38149109053 scopus 로고    scopus 로고
    • Fingerprint hardening with randomly selected chaff minutiae
    • Lecture Notes in Computer Science, Springer, Berlin
    • A. Kanak and I. Sogukpinar, Fingerprint hardening with randomly selected chaff minutiae, in Computer Analysis of Images and Patterns (CAIP 2007), Lecture Notes in Computer Science, Vol. 4673, Springer, Berlin, 2007, pp. 383-390.
    • (2007) Computer Analysis of Images and Patterns (CAIP 2007 , vol.4673 , pp. 383-390
    • Kanak, A.1    Sogukpinar, I.2
  • 139
    • 84872865003 scopus 로고    scopus 로고
    • Secure short-key cryptosystems: Forty bits is enough
    • NEC Research Institute Technical Report, Available at
    • S. Buss and P. N. Yianilos, Secure short-key cryptosystems: Forty bits is enough, NEC Research Institute Technical Report, 1999. Available at http://www.intermemory.org/pny/papers/sk/sk.pdf.
    • (1999)
    • Buss, S.1    Yianilos, P.N.2
  • 141
    • 26444554928 scopus 로고    scopus 로고
    • Vulnerabilities in biometric encryption systems
    • Tarrytown, NY. Lecture Notes in Computer Science, Springer, Berlin, Available at
    • A. Adler, Vulnerabilities in biometric encryption systems, in Audio-and Video-Based Biometric Person Authentication (AVBPA2005), Tarrytown, NY. Lecture Notes in Computer Science, Vol. 3546, Springer, Berlin, 2005, pp. 1100-1109. Available at http://www.sce.carleton.ca/faculty/adler/publications/2005/adler-2005-AV BPA-biometric-encryption.pdf.
    • (2005) Audio-and Video-Based Biometric Person Authentication (AVBPA2005) , vol.3546 , pp. 1100-1109
    • Adler, A.1
  • 143
    • 50249107013 scopus 로고    scopus 로고
    • Cracking fuzzy vaults and biometric encryption
    • Baltimore, September, Available at
    • W. J. Scheirer and T. E. Boult, Cracking fuzzy vaults and biometric encryption, in Biometric Consortium Conference, Baltimore, September 2007. Available at http://vast.uccs.edu/tboult/PAPERS/Scheirer-Boult-BCC07-Crack-Fuzzy-Vaul t.pdf.
    • (2007) Biometric Consortium Conference
    • Scheirer, W.J.1    Boult, T.E.2
  • 144
    • 60749108051 scopus 로고    scopus 로고
    • An analysis on invertibility of cancelable biometrics based on biohashing
    • Systems, and Technology, Available at
    • K.-H. Cheung, A. Kong, J. You, and D. Zhang, An analysis on invertibility of cancelable biometrics based on biohashing, in Proceedings of the 2005 International Conference on Imaging Science, Systems, and Technology, 2005, pp. 40-45. Available at http://staffx.webstore.ntu.edu.sg/personal/adamskong/Shared%20Documents/ publication/IMCSE2005paperCIS3056.pdf.
    • (2005) Proceedings of the 2005 International Conference on Imaging Science , pp. 40-45
    • Cheung, K.-H.1    Kong, A.2    You, J.3    Zhang, D.4
  • 145
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • K. Liu, H. Kargupta, and J. Ryan, Random projection-based multiplicative data perturbation for privacy preserving distributed data mining, IEEE Trans. Knowledge and Data Eng. 18(1):92-106, 2006.
    • (2006) IEEE Trans. Knowledge and Data Eng. , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 146
    • 56349139535 scopus 로고    scopus 로고
    • The best of both worlds: applying secure sketches to cancelable biometrics
    • Luxembourg, September 20-21, 2007. Science of Computer Programming
    • J. Bringer, H. Chabanne, and B. Kindarji, The best of both worlds: applying secure sketches to cancelable biometrics, in 2nd Benelux Workshop on Information and System Security (WISSec'07), Luxembourg, September 20-21, 2007. Science of Computer Programming, 74(1-2):43-51, 2008.
    • (2008) 2nd Benelux Workshop on Information and System Security (WISSec'07) , vol.74 , Issue.1-2 , pp. 43-51
    • Bringer, J.1    Chabanne, H.2    Kindarji, B.3
  • 147
    • 70350248997 scopus 로고    scopus 로고
    • Implications of Biometric Encryption on wide spread use of biometrics
    • Presentation at the EBF Biometric Encryption Seminar, Amsterdam, NL, 24 June
    • F. Carter and A. Stoianov, Implications of Biometric Encryption on wide spread use of biometrics. Presentation at the EBF Biometric Encryption Seminar, Amsterdam, NL, 24 June 2008. http://www.eubiometricsforum.com/pdfs/be/BE-Carter Stoianov.pdf.
    • (2008)
    • Carter, F.1    Stoianov, A.2
  • 148
    • 84889614524 scopus 로고    scopus 로고
    • The concept of anonymous database using BE was proposed by Tomko: Method and apparatus for securely handling data in a database of biometrics and associated data. U.S. Patent 5790668 to G. J. Tomko, August 4, 1998 (Priority date: December 19, 1995)
    • The concept of anonymous database using BE was proposed by Tomko: Method and apparatus for securely handling data in a database of biometrics and associated data. U.S. Patent 5790668 to G. J. Tomko, August 4, 1998 (Priority date: December 19, 1995).
  • 149
    • 45449114377 scopus 로고    scopus 로고
    • An authentication protocol with encrypted biometric data
    • June 11-14, 2008, Lecture Notes in Computer Science, Springer, Berlin
    • J. Bringer and H. Chabanne, An authentication protocol with encrypted biometric data, in AFRICACRYPT, Casablanca, Morocco, June 11-14, 2008, Lecture Notes in Computer Science, Vol. 5023, Springer, Berlin, 2008, pp. 109-124.
    • (2008) AFRICACRYPT, Casablanca, Morocco , vol.5023 , pp. 109-124
    • Bringer, J.1    Chabanne, H.2
  • 150
    • 84892356135 scopus 로고    scopus 로고
    • Computationally secure authentication with noisy data
    • P. Tuyls, B. Skoríc, and T. Kevenaar, editors, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag, London
    • B. Schoenmakers and P Tuyls, Computationally secure authentication with noisy data, in P. Tuyls, B. Skoríc, and T. Kevenaar, editors, Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag, London, 2007, pp. 141-149.
    • (2007) Security with Noisy Data: Private Biometrics , pp. 141-149
    • Schoenmakers, B.1    Tuyls, P.2
  • 151
    • 84889613867 scopus 로고    scopus 로고
    • http://www.turbine-project.org/.
  • 152
    • 84889623580 scopus 로고    scopus 로고
    • TURBINE: background and status-ISO standardization initiative
    • Amsterdam, June 24
    • C. Busch, TURBINE: background and status-ISO standardization initiative, in EBF Biometric Encryption Seminar, Amsterdam, June 24, 2008. http://www.eubiometricsforum.com/pdfs/be/BEBusch.pdf.
    • (2008) EBF Biometric Encryption Seminar
    • Busch, C.1
  • 154
    • 84889613165 scopus 로고    scopus 로고
    • http://genkey.no/file.php?n=12&id=1.
  • 155
    • 0035394513 scopus 로고    scopus 로고
    • Improved fingerprint matching by distortion removal
    • A. Senior and R. Bolle, Improved fingerprint matching by distortion removal, IEICE Trans. Inf. Syst. E84-D(7):825-831, 2001.
    • (2001) IEICE Trans. Inf. Syst. , vol.E84-D , Issue.7 , pp. 825-831
    • Senior, A.1    Bolle, R.2
  • 159
    • 56749107067 scopus 로고    scopus 로고
    • Practical considerations for secure minutiae based templates
    • September, Tampa, FL
    • A. Arakala, K. J. Horadam, and S. Boztas, Practical considerations for secure minutiae based templates, in Biometrics Symposium (BSYM), September, 2008, Tampa, FL.
    • (2008) Biometrics Symposium (BSYM)
    • Arakala, A.1    Horadam, K.J.2    Boztas, S.3
  • 160
    • 77952703061 scopus 로고    scopus 로고
    • Security Issues of Biometric Encryption
    • Biometric Security and Business Continuity, September, Toronto, Canada
    • A. Stoianov, T. Kevenaar, and M. van derVeen, Security Issues of Biometric Encryption, in IEEE TICSTH Symposium on Information Assurance, Biometric Security and Business Continuity, September, 2009, Toronto, Canada.
    • (2009) IEEE TICSTH Symposium on Information Assurance
    • Stoianov, A.1    Kevenaar, T.2    Van DerVeen, M.3
  • 161
    • 42949167255 scopus 로고    scopus 로고
    • Realization of correlation attack against fuzzy vault scheme
    • 68190O-7
    • A. Kholmatov and B. Yanikoglu, Realization of correlation attack against fuzzy vault scheme, in Proc. of SPIE, Vol. 6819, 2008. pp. 68190O-1-68190O-7.
    • (2008) Proc. of SPIE , vol.6819
    • Kholmatov, A.1    Yanikoglu, B.2
  • 163
    • 67549107384 scopus 로고    scopus 로고
    • Multibiometric Template Security Using Fuzzy Vault
    • on Biometrics: Theory, Applications and Systems, Washington DC, Sept
    • K. Nandakumar and A. K. Jain, Multibiometric Template Security Using Fuzzy Vault, in Proc. of IEEE Second Int. Conf. on Biometrics: Theory, Applications and Systems, Washington DC, Sept. 2008.
    • (2008) Proc. of IEEE Second Int. Conf.
    • Nandakumar, K.1    Jain, A.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.