Constructing practical Fuzzy Extractors using QIM
暂无分享,去创建一个
[1] Pieter H. Hartel,et al. Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.
[2] Allen Gersho,et al. Asymptotically optimal block quantization , 1979, IEEE Trans. Inf. Theory.
[3] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[4] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[5] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[6] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[7] Allen Gersho,et al. Principles of quantization , 1978 .
[8] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[9] Gregory W. Wornell,et al. The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.
[10] Gregory W. Wornell,et al. Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.
[11] G. Wornell,et al. The duality between information embedding and source coding with side information and some applications , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[12] Nasir D. Memon,et al. Secure Sketch for Biometric Templates , 2006, ASIACRYPT.
[13] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[14] Allen Gersho,et al. Number of nearest neighbors in a Euclidean code , 1994, IEEE Trans. Inf. Theory.
[15] Gregory W. Wornell,et al. Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..