CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Journal of VLSI Signal Processing Systems - Special issue on multimedia signal processing
Detection, Estimation, and Modulation Theory: Radar-Sonar Signal Processing and Gaussian Signals in Noise
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept
Face Recognition with Renewable and Privacy Preserving Binary Templates
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
EURASIP Journal on Advances in Signal Processing
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Secure sketch for biometric templates
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
Entropy Analysis and New Constructions of Biometric Key Generation Systems
IEEE Transactions on Information Theory
"3D Face": biometric template protection for 3d face recognition
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Quality of service regulation in secure body area networks: system modeling and adaptation methods
EURASIP Journal on Wireless Communications and Networking - Special issue on towards the connected body: advances in body communications
A secure biometric discretization scheme for face template protection
Future Generation Computer Systems
Hi-index | 0.00 |
Biometric encryption (BE) has recently been identified as a promising paradigm to deliver security and privacy, with unique technical merits and encouraging social implications. An integral component in BE is a key binding method, which is the process of securely combining a signal, containing sensitive information to be protected (i.e., the key), with another signal derived from physiological features (i.e., the biometric). A challenge to this approach is the high degree of noise and variability present in physiological signals. As such, fuzzy methods are needed to enable proper operations, with adequate performance results in terms of false acceptance rate and false rejection rate. In this work, the focus will be on a class of fuzzy key binding methods based on dirty paper coding known as quantization index modulation. While the methods presented are applicable to a wide range of biometric modalities, the face biometric is selected for illustrative purposes, in evaluating the QIM-based solutions for BE systems. Performance evaluation of the investigated methods is reported using data from the CMU PIE face database.