• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,183
Next 10 →

biometrical data

by Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck
"... Mathematical model for constructing passwords from ..."
Abstract - Add to MetaCart
Mathematical model for constructing passwords from

Hiding Biometric Data

by Anil K. Jain, Umut Uludag, Student Member - IEEE Transactions on Pattern Analysis and Machine Intelligence , 2003
"... With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are ..."
Abstract - Cited by 54 (6 self) - Add to MetaCart
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks

Securing biometric data

by Anthony Vetro, Stark Draper, Shantanu Rane, Jonathan Yedidia, Anthony Vetro, Stark C. Draper, Shantanu Rane, Jonathan S. Yedidia - in Distributed Source Coding
"... This chapter discusses the application of distributed source coding techniques to biometric security. A Slepian-Wolf coding system is used to provide a secure means of storing biometric data that provides robust biometric authentication for genuine users and guards against attacks from imposters. A ..."
Abstract - Cited by 12 (3 self) - Add to MetaCart
This chapter discusses the application of distributed source coding techniques to biometric security. A Slepian-Wolf coding system is used to provide a secure means of storing biometric data that provides robust biometric authentication for genuine users and guards against attacks from imposters. A

Security for Biometric Data

by Claus Vielhauer A, Ton Kalker B
"... Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both privacy protection and user convenience. From a security point of view, biometric authentication offers the possibility to es ..."
Abstract - Add to MetaCart
to establish physical presence and unequivocal identification. However from a privacy point of view, the use of biometric authentication also introduces new problems and user concerns. Namely, when used for privacy-sensitive applications, biometric data are a highly valuable asset. When such data are available

Identification with Encrypted Biometric Data ∗

by Julien Bringer, Hervé Chabanne, Bruno Kindarji, Sagem Sécurité , 901
"... Biometrics make human identification possible with a sample of a biometric trait and an associated database. Classical identification techniques lead to privacy concerns. This paper introduces a new method to identify someone using his biometrics in an encrypted way. Our construction combines Bloom ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Filters with Storage and Locality-Sensitive Hashing. We apply this error-tolerant scheme, in a Hamming space, to achieve biometric identification in an efficient way. This is the first non-trivial identification scheme dealing with fuzziness and encrypted data. Keywords. Identification, Biometrics

SIPPA for Biometric Data Reconstruction

by Dr. Gary, M. Weiss, Bon K. Sy
"... Abstract—We have developed a technique referred to as SIPPA ..."
Abstract - Add to MetaCart
Abstract—We have developed a technique referred to as SIPPA

Negative Databases for Biometric Data

by Julien Bringer, Herve ́ Chabanne , 2010
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

abrasion on biometric data

by Daniel Alonso, Juan Arizaga
"... the west Pyrenees and the influence of feather ..."
Abstract - Add to MetaCart
the west Pyrenees and the influence of feather

Secure remote authentication using biometric data

by Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith - In EUROCRYPT , 2005
"... We show two efficient techniques enabling the use of biometric data to achieve mutual authentication or authenticated key exchange over a completely insecure (i.e., adversarially controlled) channel. In addition to achieving stronger security guarantees than the work of Boyen, we improve upon his so ..."
Abstract - Cited by 86 (13 self) - Add to MetaCart
We show two efficient techniques enabling the use of biometric data to achieve mutual authentication or authenticated key exchange over a completely insecure (i.e., adversarially controlled) channel. In addition to achieving stronger security guarantees than the work of Boyen, we improve upon his

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

by Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith , 2008
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract - Cited by 535 (38 self) - Add to MetaCart
We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying
Next 10 →
Results 1 - 10 of 2,183
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University