CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secret Sharing Over Infinite Domains (Extended Abstract)
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Hiding secret points amidst chaff
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Guessing Under Source Uncertainty
IEEE Transactions on Information Theory
A key binding system based on n-nearest minutiae structure of fingerprint
Pattern Recognition Letters
Hi-index | 0.00 |
A new, soft two-level approach for the generation of multiple and revocable biometric keys, adapted to the analog nature of biometric signals, is proposed. It consists of a novel soft code-offset construction for theEuclideanmetric, applied at the first level, and a code-redundancy construction for the Hamming metric, preferably based on a Reed-Solomon code, applied at the second level.The Shannon entropy analysis shows that the new construction achieves maximal possible security. It is also shown that the previously proposed constructions for the Euclidean metric are vulnerable to biometric template reconstruction in the multiple-key scenario.