메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1-23

Security and privacy in biometrics: Towards a holistic approach

Author keywords

[No Author keywords available]

Indexed keywords

OPTIMIZATION;

EID: 84930583063     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4471-5230-9_1     Document Type: Chapter
Times cited : (22)

References (86)
  • 2
    • 84956648682 scopus 로고    scopus 로고
    • The law and use of biometrics
    • Flynn P, Ross AA, Springer, New York
    • Woodward JJD (2008) The law and use of biometrics. In: Jain AK, Flynn P, Ross AA (eds) Handbook of Biometrics. Springer, New York
    • (2008) Jain AK
    • Woodward, J.1
  • 3
    • 84956641872 scopus 로고    scopus 로고
    • Tech rep, 1980accessed in December
    • Guidelines on the protection of privacy and transborder flows of personal data. OECD (Organisation for Economic Co-operation and Development), Paris, France. Tech rep, 1980 (accessed in December 2012). [Online]. Available: www.oecd.org/document/18/0,2340, en_2649_34255_1815186_1_1_1_1,00.html
    • (2012) OECD (Organisation for Economic Co-Operation and Development), Paris, France
  • 4
    • 38049172388 scopus 로고    scopus 로고
    • Tech rep, August, accessed in December 2012
    • Privacy technology implementation guide. Homeland security. Tech rep, 16 August 2007 (accessed in December 2012). [Online]. Available: http://www.dhs.gov/xlibrary/assets/privacy/privacy/guide/ptig.pdf
    • (2007) Homeland Security , vol.16
  • 6
    • 54049091377 scopus 로고    scopus 로고
    • Biometrics, human body and medicine: A controversial history
    • Duquenoy P, George C, Kimppa K, Idea Group Inc, Hershey
    • Mordini E (2008) Biometrics, human body and medicine: a controversial history. In: Duquenoy P, George C, Kimppa K (eds) Ethical, Legal and Social Issues in Medical Informatics. Idea Group Inc, Hershey
    • (2008) Ethical, Legal and Social Issues in Medical Informatics
    • Mordini, E.1
  • 7
    • 84956614008 scopus 로고    scopus 로고
    • Tech rep, September
    • Biometric security concerns. UK biometric working group. Tech rep, September 2003
    • (2003) UK Biometric Working Group
  • 8
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3):614-634
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.1    Connell, J.2    Bolle, R.3
  • 11
    • 33846817469 scopus 로고    scopus 로고
    • Biometric attack vectors and defences
    • Roberts C (2006) Biometric attack vectors and defences.Computers & Security 26(1)
    • (2006) Computers & Security , vol.26 , Issue.1
    • Roberts, C.1
  • 15
    • 38149030200 scopus 로고    scopus 로고
    • Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy, Toronto, Canada
    • December
    • Cavoukian BA, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication, security and privacy, Toronto, Canada. Tech rep, 2007 (accessed in December 2012). [Online]. Available: www.ipc.on.ca
    • (2007) Tech Rep2007
    • Cavoukian, B.A.1    Stoianov, A.2
  • 18
    • 71749106685 scopus 로고    scopus 로고
    • A reference architecture for biometric template protection based on pseudo identities
    • Germany, September
    • Breebaart J, Busch C, Grave J, Kindt E (2008) A reference architecture for biometric template protection based on pseudo identities. In: BIOSIG, Darmstadt, Germany, September 2008
    • (2008) BIOSIG, Darmstadt , pp. 2008
    • Breebaart, J.1    Busch, C.2    Grave, J.3    Kindt, E.4
  • 29
    • 35248868841 scopus 로고    scopus 로고
    • Computation of cryptographic keys from face biometrics
    • Lecture Notes on Computer Science, vol
    • Goh A, Ngo D (2003) Computation of cryptographic keys from face biometrics. In: International Federation for Information Processing. Lecture Notes on Computer Science, vol 2828
    • (2003) International Federation for Information Processing
    • Goh, A.1    Ngo, D.2
  • 30
  • 38
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an off line biometric based identification scheme
    • Paris, France, January
    • Davida G, Frankel Y, Matt B, Peralta R (1999) On the relation of error correction and cryptography to an off line biometric based identification scheme. In: Proceedings of WCC99, Workshop on coding and cryptography, Paris, France, January 1999
    • (1999) Proceedings of WCC99, Workshop on Coding and Cryptography , pp. 1999
    • Davida, G.1    Frankel, Y.2    Matt, B.3    Peralta, R.4
  • 41
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • Rye Brook, NY, USA
    • Tuyls P, Akkermans A, Kevenaar T, Schrijen G, Bazen A, Veldhuis R (2005) Practical biometric authentication with template protection. In: AVBPA, Rye Brook, NY, USA, pp 436-446
    • (2005) AVBPA , pp. 436-446
    • Tuyls, P.1    Akkermans, A.2    Kevenaar, T.3    Schrijen, G.4    Bazen, A.5    Veldhuis, R.6
  • 47
    • 67549130623 scopus 로고    scopus 로고
    • User adaptive fuzzy commitment for signature templates protection and renewability
    • January-March. Special section on biometrics: advances in security, usability and interoperability
    • Maiorana E, Campisi P, Neri A (2008) User adaptive fuzzy commitment for signature templates protection and renewability. SPIE Journal of Electronic Imaging 17(1), January-March. Special section on biometrics: advances in security, usability and interoperability
    • (2008) SPIE Journal of Electronic Imaging , vol.17 , Issue.1
    • Maiorana, E.1    Campisi, P.2    Neri, A.3
  • 48
    • 78149261619 scopus 로고    scopus 로고
    • Fuzzy commitment for function based signature template protection
    • Maiorana E, Campisi P (2010) Fuzzy commitment for function based signature template protection. IEEE Signal Processing Letters 17(3):249-252
    • (2010) IEEE Signal Processing Letters , vol.17 , Issue.3 , pp. 249-252
    • Maiorana, E.1    Campisi, P.2
  • 49
    • 84956703710 scopus 로고    scopus 로고
    • Workshop on Biometrics: Challenges Arising from Theory to Practice, August 2004
    • Uludag U, Jain A (2004) Fuzzy fingerprint vault. In: Workshop on Biometrics: Challenges Arising from Theory to Practice, August 2004, pp 13-16
    • (2004) Fuzzy Fingerprint Vault. In , pp. 13-16
    • Uludag, U.1    Jain, A.2
  • 50
    • 27644521507 scopus 로고    scopus 로고
    • Automatic secure fingerprint verification system based on fuzzy vault scheme
    • ICASSP 2005, Philadelphia, PA, USA, March
    • Yang S, Verbauwhede I (2005) Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE Intl Conf on Acoustics, Speech, and Signal Processing, ICASSP 2005, Philadelphia, PA, USA, March 2005, pp 609-612
    • (2005) IEEE Intl Conf on Acoustics, Speech, and Signal Processing , vol.2005 , pp. 609-612
    • Yang, S.1    Verbauwhede, I.2
  • 54
    • 37849013877 scopus 로고    scopus 로고
    • Biometric key binding: Fuzzy vault based on iris images
    • Springer, Berlin
    • Lee Y, Bae K, Lee S, Park K, Kim J (2007) Biometric key binding: fuzzy vault based on iris images. In: Lecture Notes on Computer Science, vol 4642. Springer, Berlin, pp 800-808
    • (2007) Lecture Notes on Computer Science , vol.4642 , pp. 800-808
    • Lee, Y.1    Bae, K.2    Lee, S.3    Park, K.4    Kim, J.5
  • 56
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Springer, Berlin
    • Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Eurocrypt. Lecture Notes on Computer Science, vol 3027. Springer, Berlin, pp 523-540
    • (2004) Eurocrypt. Lecture Notes on Computer Science , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 64
    • 84866781016 scopus 로고    scopus 로고
    • Retrieving secrets from iris fuzzy commitment
    • ICB 12, New Delhi, India, March, April 2012
    • Zhou X, Kuijper A, Busch C (2012) Retrieving secrets from iris fuzzy commitment. In: International Conference on Biometrics, ICB 12, New Delhi, India, 29 March-1 April 2012
    • (2012) International Conference on Biometrics , vol.29 , Issue.1
    • Zhou, X.1    Kuijper, A.2    Busch, C.3
  • 66
    • 50249107013 scopus 로고    scopus 로고
    • Cracking fuzzy vaults and biometric encryption
    • USA, September
    • Scheirer W, Boult T (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, Baltimore, MD, USA, September 2007
    • (2007) Biometrics Symposium, Baltimore, MD , pp. 2007
    • Scheirer, W.1    Boult, T.2
  • 76
    • 77956519688 scopus 로고    scopus 로고
    • Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication
    • Workshop on biometrics, San Francisco, USA, June
    • Kanade S, Petrovska-Delacretaz D, Dorizzi B (2010) Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Workshop on biometrics, San Francisco, USA, June 2010
    • (2010) IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
    • Kanade, S.1    Petrovska-Delacretaz, D.2    Dorizzi, B.3
  • 78
    • 84956646282 scopus 로고    scopus 로고
    • December
    • Biometric identification technology ethics (BITE). Tech rep (accessed in December 2012). [Online]. Available: http://www.biteproject.org
    • (2012) Tech Rep
  • 79
    • 84956708872 scopus 로고    scopus 로고
    • December
    • Homeland security, biometric identification & personal detection ethics (HIDE). Tech rep (accessed in December 2012). [Online]. Available: http://www.hideproject.org
    • (2012) Tech Rep
  • 80
    • 85032521774 scopus 로고    scopus 로고
    • IRISS (Increasing Resilience in Surveillance Societies) EU Project. [Online]. Available: http://irissproject.eu/
  • 81
    • 85032542859 scopus 로고    scopus 로고
    • SURPRISE (Surveillance, Privacy and Security) EU Project. [Online]. Available: http://www.surprise-project.eu/
  • 82
    • 85032540062 scopus 로고    scopus 로고
    • 3DFace, 3DFace EU Project. [Online]. Available: http://www.3dface.org/home/welcome
  • 83
    • 85032547287 scopus 로고    scopus 로고
    • TURBINE (TrUsted Revocable Biometric IdeNtitiEs) EU Project. [Online]. Available: http://www.turbine- project.eu/
  • 84
    • 85032552854 scopus 로고    scopus 로고
    • BEAT (Biometrics Evaluation and Testing) EU Project. [Online]. Available: http://www.beat-eu.org/
  • 85
    • 85032544325 scopus 로고    scopus 로고
    • TABULA RASA EU Project. [Online]. Available: http://www.tabularasa-euproject.org/project


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.