Theoretical and Practical Boundaries of Binary Secure Sketches
hal.structure.identifier | SAGEM Défense Sécurité [Massy] | |
dc.contributor.author | BRINGER, Julien | |
hal.structure.identifier | SAGEM Défense Sécurité [Massy] | |
dc.contributor.author | CHABANNE, Hervé | |
hal.structure.identifier | Ecole Nationale Supérieure des Télécommunications [ENST] | |
dc.contributor.author | COHEN, Gérard | |
hal.structure.identifier | SAGEM Défense Sécurité [Massy] | |
hal.structure.identifier | Ecole Nationale Supérieure des Télécommunications [ENST] | |
dc.contributor.author | KINDARJI, Bruno | |
hal.structure.identifier | Institut de Mathématiques de Bordeaux [IMB] | |
dc.contributor.author | ZÉMOR, Gilles | |
dc.date.accessioned | 2024-04-04T02:43:34Z | |
dc.date.available | 2024-04-04T02:43:34Z | |
dc.date.created | 2008-12 | |
dc.date.issued | 2008-12 | |
dc.identifier.issn | 1556-6013 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/191344 | |
dc.description.abstractEn | Fuzzy commitment schemes, introduced as a link between biometrics and cryptography, are a way to handle biometric data matching as an error-correction issue. We focus here on finding the best error-correcting code with respect to a given database of biometric data. We propose a method that models discrepancies between biometric measurements as an erasure and error channel, and we estimate its capacity. We then show that two-dimensional iterative min-sum decoding of properly chosen product codes almost reaches the capacity of this channel. This leads to practical fuzzy commitment schemes that are close to theoretical limits. We test our techniques on public iris and fingerprint databases and validate our findings. | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers | |
dc.title.en | Theoretical and Practical Boundaries of Binary Secure Sketches | |
dc.type | Article de revue | |
dc.identifier.doi | 10.1109/TIFS.2008.2002937 | |
dc.subject.hal | Informatique [cs]/Théorie de l'information [cs.IT] | |
bordeaux.journal | IEEE Transactions on Information Forensics and Security | |
bordeaux.page | 673--683 | |
bordeaux.volume | 3 | |
bordeaux.hal.laboratories | Institut de Mathématiques de Bordeaux (IMB) - UMR 5251 | * |
bordeaux.issue | 4 | |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.peerReviewed | oui | |
hal.identifier | hal-00346970 | |
hal.version | 1 | |
hal.popular | non | |
hal.audience | Internationale | |
hal.origin.link | https://hal.archives-ouvertes.fr//hal-00346970v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.jtitle=IEEE%20Transactions%20on%20Information%20Forensics%20and%20Security&rft.date=2008-12&rft.volume=3&rft.issue=4&rft.spage=673--683&rft.epage=673--683&rft.eissn=1556-6013&rft.issn=1556-6013&rft.au=BRINGER,%20Julien&CHABANNE,%20Herv%C3%A9&COHEN,%20G%C3%A9rard&KINDARJI,%20Bruno&Z%C3%89MOR,%20Gilles&rft.genre=article |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |