IEEE Transactions on Information Theory
Universal hashing and authentication codes
Designs, Codes and Cryptography
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Error-tolerant password recovery
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Guide to Biometrics
Hashing of Databases with the Use of Metric Properties of the Hamming Space
The Computer Journal
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Biometrics and Identity Management
Combinatorial data reduction algorithm and its applications to biometric verification
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Hi-index | 0.00 |
We present a simple combinatorial construction for the mapping of the biometric vectors to short strings, called the passwords. A verifier has to decide whether a given vector can be considered as a corrupted version of the original biometric vector whose password is known or not. The evaluations of the compression factor, the false rejection/acceptance rates, are derived, and an illustration of a possible implementation of the verification algorithm for the DNA data is presented.