When designing multiple biometric authentication systems, there is tension between minimizing privacy leakage and maximizing security. This work studies the tradeoff between the two measures for jointly designed "secure sketch" systems. Secure sketch is a biometric system architecture where, as with error-correcting codes, a system is characterized by a parity-check matrix over a finite field. Single systems have been widely researched, but little is known about the privacy and security of joint designs, when leakage of one system can compromise the security of the others. This work introduces worst-case measures of privacy leakage and security for sets of systems and studies the tradeoff between them: First by studying the algebraic struct...
In this work, we study incrementally designed secure biometric identification and authentication sys...
In this review, biometric systems are studied from an information theoretical point of view. In the ...
Abstract — Biometric systems use personal biological or be-havioural traits that can uniquely charac...
When designing multiple biometric authentication systems, there is tension between minimizing privac...
Abstract—This is the first part of a two-part paper on the infor-mation theoretic study of biometric...
This paper addresses privacy leakage in biometric secrecy systems. Four settings are investigated. T...
We focus here on two secure biometric systems (a common randomness based scheme and a fuzzy commitme...
In this paper we analyze two types of biometric identification systems with protected templates that...
Abstract — Secure storage of biometric templates has become an increasingly important issue in biome...
Abstract — Secure storage of biometric templates has become an increasingly important issue in biome...
Motivated by Maurer [1993], Ahlswede and Csiszar [1993] introduced the concept of secret sharing. In...
Biometric systems use personal biological or behavioural traits that can uniquely characterise an in...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Ahlswede and Csiszár [1993] introduced the concept of secret sharing. In their source model two term...
In addition to the inherent qualities that biometrics posses, powerful signal processing tools enabl...
In this work, we study incrementally designed secure biometric identification and authentication sys...
In this review, biometric systems are studied from an information theoretical point of view. In the ...
Abstract — Biometric systems use personal biological or be-havioural traits that can uniquely charac...
When designing multiple biometric authentication systems, there is tension between minimizing privac...
Abstract—This is the first part of a two-part paper on the infor-mation theoretic study of biometric...
This paper addresses privacy leakage in biometric secrecy systems. Four settings are investigated. T...
We focus here on two secure biometric systems (a common randomness based scheme and a fuzzy commitme...
In this paper we analyze two types of biometric identification systems with protected templates that...
Abstract — Secure storage of biometric templates has become an increasingly important issue in biome...
Abstract — Secure storage of biometric templates has become an increasingly important issue in biome...
Motivated by Maurer [1993], Ahlswede and Csiszar [1993] introduced the concept of secret sharing. In...
Biometric systems use personal biological or behavioural traits that can uniquely characterise an in...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Ahlswede and Csiszár [1993] introduced the concept of secret sharing. In their source model two term...
In addition to the inherent qualities that biometrics posses, powerful signal processing tools enabl...
In this work, we study incrementally designed secure biometric identification and authentication sys...
In this review, biometric systems are studied from an information theoretical point of view. In the ...
Abstract — Biometric systems use personal biological or be-havioural traits that can uniquely charac...