Approximate nearest neighbors: towards removing the curse of dimensionality
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Protecting data privacy through hard-to-reverse negative databases
International Journal of Information Security
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
Binary Biometric Representation through Pairwise Polar Quantization
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Privacy Weaknesses in Biometric Sketches
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An authentication protocol with encrypted biometric data
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Secure set membership using 3SAT
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Everything that is not important: Negative databases [Research Frontier]
IEEE Computational Intelligence Magazine
Theoretical and Practical Boundaries of Binary Secure Sketches
IEEE Transactions on Information Forensics and Security
A Fast Search Algorithm for a Large Fuzzy Database
IEEE Transactions on Information Forensics and Security
Efficient negative databases from cryptographic hash functions
ISC'07 Proceedings of the 10th international conference on Information Security
Classifying and clustering in negative databases
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
Negative databases -- negative representations of a set of data -- have been introduced in 2004 to protect the data they contain. Up to this day, there was no known solution to constitute biometric negative databases. This is surprising as biometric applications are very needy of such protection for privacy reasons. The main difficulty comes from the fact that biometric captures of the same trait give different results and comparisons of the stored reference with the fresh captured biometric data has to take into account this variability. In this paper, we give a first answer to this problem by exhibiting a way to create and exploit biometric negative databases.