Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Guide to Biometrics
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
EURASIP Journal on Advances in Signal Processing
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
Embedding Renewable Cryptographic Keys into Continuous Noisy Data
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Secure pairing with biometrics
International Journal of Security and Networks
Biometric quantization through detection rate optimized bit allocation
EURASIP Journal on Advances in Signal Processing
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Classification based revocable biometric identity code generation
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Key extraction from general nondiscrete signals
IEEE Transactions on Information Forensics and Security
A key binding system based on n-nearest minutiae structure of fingerprint
Pattern Recognition Letters
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Robust extraction of secret bits from minutiae
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.00 |
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key depends on the amount of information that can be extracted from the source data. This information can be used a-priori to evaluate the potential of the biometric data in the context of a specific cryptographic application. We model the biometric data more naturally as a continuous distribution and we give a new definition for fuzzy extractors that works better for this type of data.