Algorithms for Processing Biometric Data Oriented to Privacy Protection and Preservation of Significant Parameters

[1]  Yuliyan Velchev,et al.  Face and ECG Based Multi-Modal Biometric Authentication , 2011 .

[2]  Evgueni A. Haroutunian,et al.  Information Theory and Statistics , 2011, International Encyclopedia of Statistical Science.

[3]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[4]  Sergio Verdú,et al.  Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.

[5]  Taras Holotyak,et al.  Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting , 2011 .

[6]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[7]  Vladimir B. Balakirsky,et al.  Biometric Authentication Based on Significant Parameters , 2011, BIOID.

[8]  Leonid A. Levin,et al.  The Tale of One-Way Functions , 2000, Probl. Inf. Transm..

[9]  Sviatoslav Voloshynovskiy,et al.  Private content identification based on soft fingerprinting , 2011, Electronic Imaging.

[10]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[11]  Vladimir B. Balakirsky,et al.  Mathematical model for constructing passwords from biometrical data , 2009, Secur. Commun. Networks.

[12]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[13]  Vladimir B. Balakirsky,et al.  A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data , 2010, EURASIP J. Inf. Secur..

[14]  Hideki Imai,et al.  Theoretical framework for constructing matching algorithms in biometric authentication systems , 2009, ICB.

[15]  Vladimir B. Balakirsky,et al.  Testing the Independence of Two Non-Stationary Random Processes with Applications to Biometric Authentication , 2007, 2007 IEEE International Symposium on Information Theory.

[16]  F.M.J. Willems,et al.  Privacy leakage in biometric secrecy systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[17]  Marios Savvides,et al.  How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.