A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimized Quantization in Zero Leakage Helper Data Systems
2017
IEEE Transactions on Information Forensics and Security
In this case a quantization step is required. Recently de Groot et al. described a generic method to perform the quantization in a Zero Leakage manner. ...
Redundancy data called Helper Data makes it possible to do error correction while leaking little or nothing ('Zero Leakage') about the extracted secret string. ...
Introduction 1.Helper Data Systems Security with noisy data is the art of reproducibly extracting secret data from noisy measurements on a physical system. ...
doi:10.1109/tifs.2017.2697840
fatcat:2wnrlmar2za6pkm7y654ffewwu
Quantization in zero leakage helper data schemes
2016
EURASIP Journal on Advances in Signal Processing
We refine the theory of helper data schemes with the zero leakage (ZL) property, i.e., the mutual information between the helper data and the extracted secret is zero. ...
Helper data schemes are used for preserving privacy in biometric databases and for physical unclonable functions. ...
We derive optimal decision intervals for the reconstruction phase in a Zero Leakage Fuzzy Extractor. Lemma 5.1. Let Rep(y, w) be the reproduction algorithm of a ZL FE system. ...
doi:10.1186/s13634-016-0353-z
fatcat:2rx3zwdh2fedbfembboik5m7ve
Quantization effects in biometric systems
2009
2009 Information Theory and Applications Workshop
It is shown that the squared correlation coefficient must be increased by a factor of π 2 /4 to compensate for such a quantization action, for values of the privacy-leakage rate that approach zero, when ...
Also the effect that binary quantization of the biometric sequences has on the ratio of the secret-key rate and privacy-leakage rate is considered. ...
The second requirement is that the privacy leakage in the helper data should be as small as possible. ...
doi:10.1109/ita.2009.5044973
fatcat:47lkpohvhvgtrm7xazxmcpkh7m
Zero leakage quantization scheme for biometric verification
2011
2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
We will show that zero leakage is achieved if certain criteria are met and we benchmark the performance of this scheme. ...
Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. ...
This yields zero leakage between helper data w i and the corresponding enrolled secret s i , as will be shown in the next section. ...
doi:10.1109/icassp.2011.5946883
dblp:conf/icassp/GrootL11
fatcat:wk3yl4fcnbb2njgl4gjxno4dgu
Biometric Systems: Privacy and Secrecy Aspects
2009
IEEE Transactions on Information Forensics and Security
1 The privacy leakage is only assessed with respect to the helper data. ...
We do not consider the leakage from the secret key, since secret keys are either stored using one-way encryption (in authentication systems) or discarded (in key-based cryptographic applications). 1556 ...
There this basic achievability proof is further extended by adding an extra layer in which the one-time pad is used to conceal a secret key in chosen-secret settings and helper data in zero-leakage systems ...
doi:10.1109/tifs.2009.2033228
fatcat:z5nln5n5rvfvlfhzmpyhvao5om
Private Authentication Keys Based On Wearable Device Eeg Recordings
2018
Zenodo
Publication in the conference proceedings of EUSIPCO, Kos island, Greece, 2017 ...
the helper data provides about the biometric enrollment sequence (privacy leakage) is minimal. ...
In these systems during enrollment, biometric sequence is observed and a secret key together with the helper data are produced. ...
doi:10.5281/zenodo.1159782
fatcat:bb7qockn5ngqrium4p6ojdfh4u
Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming
2014
IEEE Transactions on Signal Processing
Assuming zero-forcing transmission at the helper and random vector quantization of the channels, an analytic expression for the achievable ergodic secrecy rate due to the resulting quantization errors ...
While direct optimization of the secrecy rate is difficult, an approximate upper bound for the mean loss in secrecy rate is derived and a feedback bit allocation method that minimizes the average upper ...
In [30] , a multicell MISO system with joint processing was considered, where the base stations exchange both CSI and data, and a feedback bit allocation scheme was proposed to maximize the quantization ...
doi:10.1109/tsp.2013.2295059
fatcat:h5sefvaxgnaxxdgi45z2mb5cry
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
[chapter]
2017
Lecture Notes in Computer Science
However, the latter causes a significant bias in the derived key when combined with an equidistant quantization. ...
This new approach effectively counteracts the bias in the derived key already at the input side. ...
in the helper data. ...
doi:10.1007/978-3-319-71501-8_11
fatcat:uroh2glwmvgjdhy6gc565wfmca
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation
[article]
2019
arXiv
pre-print
We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization. ...
In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector. ...
Zero Leakage Helper Data Systems A HDS in its most general form is shown in Fig. 1a . The Gen procedure takes as input a measurement x. ...
arXiv:1907.06388v1
fatcat:nljf5besifhwrlqyobggsqjdwy
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation
2019
2019 IEEE International Workshop on Information Forensics and Security (WIFS)
We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguation. ...
In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector. ...
Zero Leakage Helper Data Systems A HDS in its most general form is shown in Fig. 1a . The Gen procedure takes as input a measurement x. ...
doi:10.1109/wifs47025.2019.9035095
dblp:conf/wifs/RazeghiSSV19
fatcat:27mumtu46bccvp3qhirufdkszu
Fingerprint template protection using minutia-pair spectral representations
[article]
2018
arXiv
pre-print
Second, we construct a helper data system consisting of zero-leakage quantisation followed by the Code Offset Method. ...
Storage of biometric data requires some form of template protection in order to preserve the privacy of people enrolled in a biometric database. One approach is to use a Helper Data System. ...
Zero Leakage Helper Data Systems We briefly review the ZLHDS developed in [5] , [17] for quantisation of an enrollment measurement X ∈ R. ...
arXiv:1804.01744v1
fatcat:r6motorymjewbnm3m5i4z2tqda
An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions
2020
Entropy
Proposed optimal constructions that jointly design the vector quantizer and error-correction code parameters are listed. ...
optimal PUF constructions. ...
The FCS can reconstruct a secret key from dependent random variables with zero secrecy leakage [21] . ...
doi:10.3390/e23010016
pmid:33374486
pmcid:PMC7824005
fatcat:2gcreyvsmzeabga4jiqoxyshzm
On the Key Generation Rate of Physically Unclonable Functions
[article]
2018
arXiv
pre-print
This achievable rate is shown to be optimal under the generated-secret (GS) model for PUFs. ...
In this paper, an algebraic binning based coding scheme and its associated achievable rate for key generation using physically unclonable functions (PUFs) is determined. ...
It is also reflected in Theorem 1 in [9] as R l and R w have the same bound. So the key-leakage-privacy region can be treated as key-leakage region or key-storage region. ...
arXiv:1801.07733v2
fatcat:esulg2o4rfhpvhdhymy3kvxnqa
Pitfall of the Detection Rate Optimized Bit Allocation within template protection and a remedy
2009
2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems
In this work we focus on the Detection Rate Optimized Bit Allocation (DROBA) quantization scheme that extracts multiple bits per feature component while maximizing the overall detection rate. ...
Experiments in our work show that the original DROBA algorithm, as known in the literature, creates auxiliary data that leaks a significant amount of information. ...
TEMPLATE PROTECTION SCHEME WITH DROBA The template protection technique under consideration is known as the helper-data system [2] [3] [11] and is portrayed in Fig. 1 . ...
doi:10.1109/btas.2009.5339046
fatcat:dhahmlcfhjfuxakpnxi5gh4aci
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
[article]
2019
arXiv
pre-print
The second construction uses nested polar codes for vector quantization during enrollment and for error correction during reconstruction. ...
Simulations show that the nested polar codes achieve privacy-leakage and storage rates that improve on existing code designs. ...
amount of helper data. ...
arXiv:1709.00275v3
fatcat:6p4vibezaverjclc4jtdgincay
« Previous
Showing results 1 — 15 out of 233 results