Protocols Using Keys from Faulty Data
Revised Papers from the 9th International Workshop on Security Protocols
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices
Proceedings of the 11th USENIX Security Symposium
Proceedings of the 2003 workshop on New security paradigms
Pass-thoughts: authenticating with our minds
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Robust, short and sensitive authentication tags using secure sketch
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
IEEE Transactions on Pattern Analysis and Machine Intelligence
Fuzzy extractors for continuous distributions
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
EURASIP Journal on Advances in Signal Processing
AIKED'08 Proceedings of the 7th WSEAS International Conference on Artificial intelligence, knowledge engineering and data bases
Secure Biometric Authentication with Improved Accuracy
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Towards practical biometric key generation with randomized biometric templates
Proceedings of the 15th ACM conference on Computer and communications security
WSEAS Transactions on Computers
Network Security Using Biometric and Cryptography
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
The practical subtleties of biometric key generation
SS'08 Proceedings of the 17th conference on Security symposium
An agent-oriented mobile payment system secured using a biometrics approach
International Journal of Agent-Oriented Software Engineering
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Systematic Construction of Iris-Based Fuzzy Commitment Schemes
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Multi-biometrics based cryptographic key regeneration scheme
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Mobile user location-specific encryption (MULE): using your office as your password
Proceedings of the third ACM conference on Wireless network security
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Robust iris verification for key management
Pattern Recognition Letters
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Cognitive radio policy languages
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
Fighting coercion attacks in key generation using skin conductance
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Increasing error tolerance in biometric systems
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Problems of Information Transmission
Secure sketch for biometric templates
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Using PCA to improve the generation of speech keys
MICAI'06 Proceedings of the 5th Mexican international conference on Artificial Intelligence
Phoneme spotting for speech-based crypto-key generation
CIARP'05 Proceedings of the 10th Iberoamerican Congress conference on Progress in Pattern Recognition, Image Analysis and Applications
Binarized revocable biometrics in face recognition
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Generation of replaceable cryptographic keys from dynamic handwritten signatures
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Obtaining true-random binary numbers from a weak radioactive source
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Cryptographic keys generation using fingercodes
IBERAMIA-SBIA'06 Proceedings of the 2nd international joint conference, and Proceedings of the 10th Ibero-American Conference on AI 18th Brazilian conference on Advances in Artificial Intelligence
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Cryptographic-speech-key generation using the SVM technique over the lp-cepstral speech space
Nonlinear Speech Modeling and Applications
Parameter optimization in a text-dependent cryptographic-speech-key generation task
NOLISP'05 Proceedings of the 3rd international conference on Non-Linear Analyses and Algorithms for Speech Processing
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Security performance evaluation for biometric template protection techniques
International Journal of Biometrics
Privacy-preserving noisy keyword search in cloud computing
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Hi-index | 0.00 |
Abstract: We propose a technique to reliably generate a crypto-graphic key from a user's voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regenerate the key by uttering her password again. We describe an empirical evaluation of this technique using 250 utterances recorded from 50 users.