메뉴 건너뛰기




Volumn 30, Issue 5, 2013, Pages 51-64

Secure biometrics: Concepts, authentication architectures, and challenges

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY;

EID: 85032751419     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2013.2261691     Document Type: Article
Times cited : (85)

References (64)
  • 4
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Sept.
    • Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inform. Forensics Sec., vol. 2, no. 3, pp. 503-512, Sept. 2007.
    • (2007) IEEE Trans. Inform. Forensics Sec. , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 8
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • DOI 10.1007/s10623-005-6343-z
    • A. Juels and M. Sudan, "A fuzzy vault scheme," Designs Codes Cryptogr., vol. 38, no. 2, pp. 237-257, Feb. 2006. (Pubitemid 43102559)
    • (2006) Designs, Codes, and Cryptography , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 12
    • 79951830125 scopus 로고    scopus 로고
    • Privacy-security tradeoff in biometric security systems-Part I: Single use case
    • Mar.
    • L. Lai, S. W. Ho, and H. V. Poor, "Privacy-security tradeoff in biometric security systems-Part I: Single use case," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 1, pp. 122-139, Mar. 2011.
    • (2011) IEEE Trans. Inform. Forensics Sec. , vol.6 , Issue.1 , pp. 122-139
    • Lai, L.1    Ho, S.W.2    Poor, H.V.3
  • 13
    • 79951822559 scopus 로고    scopus 로고
    • Privacy-security tradeoff in biometric security systems-Part II: Multiple uses case
    • Mar.
    • L. Lai, S. W. Ho, and H. V. Poor, "Privacy-security tradeoff in biometric security systems-Part II: Multiple uses case," IEEE Trans. Inform. Forensics Sec., vol. 6, no. I, pp. 140-151, Mar. 2011.
    • (2011) IEEE Trans. Inform. Forensics Sec. , vol.6 , pp. 140-151
    • Lai, L.1    Ho, S.W.2    Poor, H.V.3
  • 14
    • 70450232005 scopus 로고    scopus 로고
    • Biometric systems: Privacy and secrecy aspects
    • Dec.
    • T. Ignatenko and F. M. J. Willems, "Biometric systems: Privacy and secrecy aspects," IEEE Trans. Inform. Forensics Sec., vol. 4, no. 4, pp. 956-973, Dec. 2009.
    • (2009) IEEE Trans. Inform. Forensics Sec. , vol.4 , Issue.4 , pp. 956-973
    • Ignatenko, T.1    Willems, F.M.J.2
  • 15
    • 84858252162 scopus 로고    scopus 로고
    • Biometric security from an information-theoretical perspective
    • Feb.
    • T. Ignatenko and F. M. J. Willems, "Biometric security from an information-theoretical perspective," Found. Trends Commun. Inform. Theory, vol. 7, nos. 2-3, pp. 135-316, Feb. 2012.
    • (2012) Found. Trends Commun. Inform. Theory , vol.7 , Issue.2-3 , pp. 135-316
    • Ignatenko, T.1    Willems, F.M.J.2
  • 16
    • 80053027350 scopus 로고    scopus 로고
    • Secure and efficient protocols for iris and fingerprint identification
    • Leuven, Belgium, Sept.
    • M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in Proc. Eur. Symp. Research Computer Security (ESORICS), Leuven, Belgium, Sept. 2011, vol. 6879, pp. 190-209.
    • (2011) Proc. Eur. Symp. Research Computer Security (ESORICS) , vol.6879 , pp. 190-209
    • Blanton, M.1    Gasti, P.2
  • 19
    • 77951204673 scopus 로고    scopus 로고
    • Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumption
    • May
    • E. Kelkboom, G. Molina, J. Breebaart, R. Veldhuis, T. Kevenaar, and W. Jonker, "Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumption," IEEE Trans. Syst. Man, Cybern. A, vol. 40, no. 3, pp. 555-571, May 2010.
    • (2010) IEEE Trans. Syst. Man, Cybern. A , vol.40 , Issue.3 , pp. 555-571
    • Kelkboom, E.1    Molina, G.2    Breebaart, J.3    Veldhuis, R.4    Kevenaar, T.5    Jonker, W.6
  • 21
    • 84870286539 scopus 로고    scopus 로고
    • A theoretical analysis of authentication, privacy and reusability across secure biometric systems
    • Dec.
    • Y. Wang, S. Rane, S. C. Draper, and P. Ishwar, "A theoretical analysis of authentication, privacy and reusability across secure biometric systems," IEEE Trans. Inform. Forensics Sec., vol. 7, no. 6, pp. 1825-1840, Dec. 2012.
    • (2012) IEEE Trans. Inform. Forensics Sec. , vol.7 , Issue.6 , pp. 1825-1840
    • Wang, Y.1    Rane, S.2    Draper, S.C.3    Ishwar, P.4
  • 26
    • 33947411404 scopus 로고    scopus 로고
    • Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparisons
    • Nov.
    • J. Daugman, "Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparisons," Proc. IEEE, vol. 94, no. 11, pp. 1927-1935, Nov. 2006.
    • (2006) Proc. IEEE , vol.94 , Issue.11 , pp. 1927-1935
    • Daugman, J.1
  • 28
    • 27844534088 scopus 로고    scopus 로고
    • A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition
    • DOI 10.1016/j.cviu.2005.05.005, PII S1077314205000822
    • K. Bowyer, K. Chang, and P. Flynn, "A survey of approaches and challenges in 3d and multi-modal 3d + 2d face recognition," Comput. Vis. Image Understand., vol. 101, no. 1, pp. 1-15, Jan. 2006. (Pubitemid 41642085)
    • (2006) Computer Vision and Image Understanding , vol.101 , Issue.1 , pp. 1-15
    • Bowyer, K.W.1    Chang, K.2    Flynn, P.3
  • 30
    • 0029209272 scopus 로고
    • Robust text-independent speaker identification using gaussian mixture speaker models
    • Jan.
    • D. Reynolds and R. Rose, "Robust text-independent speaker identification using gaussian mixture speaker models," IEEE Trans. Speech Audio Processing (1993-2005), vol. 3, no. 1, pp. 72-83, Jan. 1995.
    • (1995) IEEE Trans. Speech Audio Processing (1993-2005 , vol.3 , Issue.1 , pp. 72-83
    • Reynolds, D.1    Rose, R.2
  • 31
    • 85032751690 scopus 로고    scopus 로고
    • Gait recognition: A challening signal processing technology for biometric identification
    • DOI 10.1109/MSP.2005.1550191
    • N. Boulgouris, D. Hatzinakos, and K. N. Plat aniotis, "Gait recognition: A challenging signal processing technology for biometric identification," IEEE Signal Processing Mag., vol. 22, no. 6, pp. 78-90, 2005. (Pubitemid 46404905)
    • (2005) IEEE Signal Processing Magazine , vol.22 , Issue.6 , pp. 78-90
    • Boulgouris, N.V.1    Hatzinakos, D.2    Plataniotis, K.N.3
  • 32
    • 33947410829 scopus 로고    scopus 로고
    • Automatic recognition by gait
    • DOI 10.1109/JPROC.2006.886018
    • M. Nixon and J. Carter, "Automatic recognition by gait," Proc. IEEE, vol. 94, no. II, pp. 2013-2024, 2006. (Pubitemid 46453642)
    • (2006) Proceedings of the IEEE , vol.94 , Issue.11 , pp. 2013-2024
    • Nixon, M.S.1    Carter, J.N.2
  • 34
    • 77949776265 scopus 로고    scopus 로고
    • Securing biometric data
    • P. L. Dragotti and M. Gastpar, Eds. New York: Academic ch. 11
    • A. Vetro, S. C. Draper, S. Rane, and J. S. Yedidia, "Securing biometric data," in Distributed Source Coding, P. L. Dragotti and M. Gastpar, Eds. New York: Academic, 2009, ch. 11.
    • (2009) Distributed Source Coding
    • Vetro, A.1    Draper, S.C.2    Rane, S.3    Yedidia, J.S.4
  • 40
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • New York: Spr in ger-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in EUROCRYPT (LNCS, vol. 3027). New York: Spr in ger-Verlag, 2004, pp. 523-540.
    • (2004) EUROCRYPT (LNCS, 3027) , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 41
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • July
    • D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inform. Theory, vol. IT-19, no. 4, pp. 471-480, July 1973.
    • (1973) IEEE Trans. Inform. Theory , vol.IT-19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 42
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • B. Chen and G. Wor nell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, 2001. (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 43
    • 77249113280 scopus 로고    scopus 로고
    • Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption applications
    • F. Bui, K. Martin, H. Lu, K. Plataniotis, and D. Hatzinakos, "Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption applications," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 118-132, 2010.
    • (2010) IEEE Trans. Inform. Forensics Sec. , vol.5 , Issue.1 , pp. 118-132
    • Bui, F.1    Martin, K.2    Lu, H.3    Plataniotis, K.4    Hatzinakos, D.5
  • 44
    • 84937740421 scopus 로고
    • Shift-register synthesis and bch decoding
    • J. Massey, "Shift-register synthesis and bch decoding," IEEE Trans. Inform. Theory, vol. 15, no. 1, pp. 122-127, 1969.
    • (1969) IEEE Trans. Inform. Theory , vol.15 , Issue.1 , pp. 122-127
    • Massey, J.1
  • 45
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • New York: Springer-Verlag
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT (LNCS, vol. 1592). New York: Springer-Verlag, 1999, pp. 233-238.
    • (1999) Advances in Cryptology-EUROCRYPT (LNCS, 1592) , pp. 233-238
    • Paillier, P.1
  • 47
    • 85032752211 scopus 로고    scopus 로고
    • Privacy-preserving nearest neighbor methods
    • Mar.
    • S. Rane and P. Boufounos, "Privacy-preserving nearest neighbor methods," IEEE Signal Processing Mag., vol. 30, no. 2, pp. 18-28, Mar. 2013.
    • (2013) IEEE Signal Processing Mag. , vol.30 , Issue.2 , pp. 18-28
    • Rane, S.1    Boufounos, P.2
  • 48
    • 85032751121 scopus 로고    scopus 로고
    • Encrypted signal processing for privacy protection
    • Jan.
    • I. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection," IEEE Signal Processing Mag., vol. 30, no. 1, pp. 82-105, Jan. 2013.
    • (2013) IEEE Signal Processing Mag. , vol.30 , Issue.1 , pp. 82-105
    • Lagendijk, I.1    Erkin, Z.2    Barni, M.3
  • 50
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001. (Pubitemid 32933421)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 51
    • 33646095185 scopus 로고    scopus 로고
    • An analysis of biohash-ing and its variants
    • A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of biohash-ing and its variants," Pattern Recognit., vol. 39, no. 7, pp. 1359-1368, 2006.
    • (2006) Pattern Recognit. , vol.39 , Issue.7 , pp. 1359-1368
    • Kong, A.1    Cheung, K.-H.2    Zhang, D.3    Kamel, M.4    You, J.5
  • 52
    • 33747604157 scopus 로고    scopus 로고
    • Remarks on BioHash and its mathematical foundation
    • DOI 10.1016/j.ipl.2006.06.010, PII S0020019006002080
    • A. Teoh, T. Connie, and D. Ngo, "Remarks on BioHash and its mathematical foundation," Inform. Process. Lett., vol. 100, pp. 145-150, 2006. (Pubitemid 44262353)
    • (2006) Information Processing Letters , vol.100 , Issue.4 , pp. 145-150
    • Teoh, A.1    Jin, B.2    Connie, T.3    Ngo, D.4    Ling, C.5
  • 57
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • M a r.
    • C. Gentry, "Computing arbitrary functions of encrypted data," Commun. ACM, vol. 53, no. 3, pp. 97-105, M a r. 2010.
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 59
    • 84862081075 scopus 로고    scopus 로고
    • Biometric-rich gestures: A novel approach to authentication on multi-touch devices
    • Austin, TX, May
    • N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon, "Biometric-rich gestures: A novel approach to authentication on multi-touch devices," in Proc. ACM Conf. Human Factors Computing Systems, Austin, TX, May 2012, pp. 977-986.
    • (2012) Proc. ACM Conf. Human Factors Computing Systems , pp. 977-986
    • Sae-Bae, N.1    Ahmed, K.2    Isbister, K.3    Memon, N.4
  • 62
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. ACM Design Automation Conf., San Diego, CA, June 2007, pp. 9-14. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.