Afficher la notice abrégée

hal.structure.identifierSAGEM Défense Sécurité [Massy]
dc.contributor.authorBRINGER, Julien
hal.structure.identifierSAGEM Défense Sécurité [Massy]
dc.contributor.authorCHABANNE, Hervé
hal.structure.identifierEcole Nationale Supérieure des Télécommunications [ENST]
dc.contributor.authorCOHEN, Gérard
hal.structure.identifierSAGEM Défense Sécurité [Massy]
hal.structure.identifierEcole Nationale Supérieure des Télécommunications [ENST]
dc.contributor.authorKINDARJI, Bruno
hal.structure.identifierInstitut de Mathématiques de Bordeaux [IMB]
dc.contributor.authorZÉMOR, Gilles
dc.date.accessioned2024-04-04T02:43:34Z
dc.date.available2024-04-04T02:43:34Z
dc.date.created2008-12
dc.date.issued2008-12
dc.identifier.issn1556-6013
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/191344
dc.description.abstractEnFuzzy commitment schemes, introduced as a link between biometrics and cryptography, are a way to handle biometric data matching as an error-correction issue. We focus here on finding the best error-correcting code with respect to a given database of biometric data. We propose a method that models discrepancies between biometric measurements as an erasure and error channel, and we estimate its capacity. We then show that two-dimensional iterative min-sum decoding of properly chosen product codes almost reaches the capacity of this channel. This leads to practical fuzzy commitment schemes that are close to theoretical limits. We test our techniques on public iris and fingerprint databases and validate our findings.
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers
dc.title.enTheoretical and Practical Boundaries of Binary Secure Sketches
dc.typeArticle de revue
dc.identifier.doi10.1109/TIFS.2008.2002937
dc.subject.halInformatique [cs]/Théorie de l'information [cs.IT]
bordeaux.journalIEEE Transactions on Information Forensics and Security
bordeaux.page673--683
bordeaux.volume3
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.issue4
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.peerReviewedoui
hal.identifierhal-00346970
hal.version1
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//hal-00346970v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.jtitle=IEEE%20Transactions%20on%20Information%20Forensics%20and%20Security&rft.date=2008-12&rft.volume=3&rft.issue=4&rft.spage=673--683&rft.epage=673--683&rft.eissn=1556-6013&rft.issn=1556-6013&rft.au=BRINGER,%20Julien&CHABANNE,%20Herv%C3%A9&COHEN,%20G%C3%A9rard&KINDARJI,%20Bruno&Z%C3%89MOR,%20Gilles&rft.genre=article


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée