Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








233 Hits in 4.8 sec

Optimized Quantization in Zero Leakage Helper Data Systems

Taras Stanko, Fitria Nur Andini, Boris Skoric
2017 IEEE Transactions on Information Forensics and Security  
In this case a quantization step is required. Recently de Groot et al. described a generic method to perform the quantization in a Zero Leakage manner.  ...  Redundancy data called Helper Data makes it possible to do error correction while leaking little or nothing ('Zero Leakage') about the extracted secret string.  ...  Introduction 1.Helper Data Systems Security with noisy data is the art of reproducibly extracting secret data from noisy measurements on a physical system.  ... 
doi:10.1109/tifs.2017.2697840 fatcat:2wnrlmar2za6pkm7y654ffewwu

Quantization in zero leakage helper data schemes

Joep de Groot, Boris Škorić, Niels de Vreede, Jean-Paul Linnartz
2016 EURASIP Journal on Advances in Signal Processing  
We refine the theory of helper data schemes with the zero leakage (ZL) property, i.e., the mutual information between the helper data and the extracted secret is zero.  ...  Helper data schemes are used for preserving privacy in biometric databases and for physical unclonable functions.  ...  We derive optimal decision intervals for the reconstruction phase in a Zero Leakage Fuzzy Extractor. Lemma 5.1. Let Rep(y, w) be the reproduction algorithm of a ZL FE system.  ... 
doi:10.1186/s13634-016-0353-z fatcat:2rx3zwdh2fedbfembboik5m7ve

Quantization effects in biometric systems

F.M.J. Willems, T. Ignatenko
2009 2009 Information Theory and Applications Workshop  
It is shown that the squared correlation coefficient must be increased by a factor of π 2 /4 to compensate for such a quantization action, for values of the privacy-leakage rate that approach zero, when  ...  Also the effect that binary quantization of the biometric sequences has on the ratio of the secret-key rate and privacy-leakage rate is considered.  ...  The second requirement is that the privacy leakage in the helper data should be as small as possible.  ... 
doi:10.1109/ita.2009.5044973 fatcat:47lkpohvhvgtrm7xazxmcpkh7m

Zero leakage quantization scheme for biometric verification

J.A. de Groot, J.-P.M.G. Linnartz
2011 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
We will show that zero leakage is achieved if certain criteria are met and we benchmark the performance of this scheme.  ...  Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well.  ...  This yields zero leakage between helper data w i and the corresponding enrolled secret s i , as will be shown in the next section.  ... 
doi:10.1109/icassp.2011.5946883 dblp:conf/icassp/GrootL11 fatcat:wk3yl4fcnbb2njgl4gjxno4dgu

Biometric Systems: Privacy and Secrecy Aspects

T. Ignatenko, F.M.J. Willems
2009 IEEE Transactions on Information Forensics and Security  
1 The privacy leakage is only assessed with respect to the helper data.  ...  We do not consider the leakage from the secret key, since secret keys are either stored using one-way encryption (in authentication systems) or discarded (in key-based cryptographic applications). 1556  ...  There this basic achievability proof is further extended by adding an extra layer in which the one-time pad is used to conceal a secret key in chosen-secret settings and helper data in zero-leakage systems  ... 
doi:10.1109/tifs.2009.2033228 fatcat:z5nln5n5rvfvlfhzmpyhvao5om

Private Authentication Keys Based On Wearable Device Eeg Recordings

Tanya Ignatenko, Vojkan Mihajlovic, Hongxu Yang
2018 Zenodo  
Publication in the conference proceedings of EUSIPCO, Kos island, Greece, 2017  ...  the helper data provides about the biometric enrollment sequence (privacy leakage) is minimal.  ...  In these systems during enrollment, biometric sequence is observed and a secret key together with the helper data are produced.  ... 
doi:10.5281/zenodo.1159782 fatcat:bb7qockn5ngqrium4p6ojdfh4u

Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming

Minyan Pei, A. Lee Swindlehurst, Dongtang Ma, Jibo Wei
2014 IEEE Transactions on Signal Processing  
Assuming zero-forcing transmission at the helper and random vector quantization of the channels, an analytic expression for the achievable ergodic secrecy rate due to the resulting quantization errors  ...  While direct optimization of the secrecy rate is difficult, an approximate upper bound for the mean loss in secrecy rate is derived and a feedback bit allocation method that minimizes the average upper  ...  In [30] , a multicell MISO system with joint processing was considered, where the base stations exchange both CSI and data, and a feedback bit allocation scheme was proposed to maximize the quantization  ... 
doi:10.1109/tsp.2013.2295059 fatcat:h5sefvaxgnaxxdgi45z2mb5cry

Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs [chapter]

Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh
2017 Lecture Notes in Computer Science  
However, the latter causes a significant bias in the derived key when combined with an equidistant quantization.  ...  This new approach effectively counteracts the bias in the derived key already at the input side.  ...  in the helper data.  ... 
doi:10.1007/978-3-319-71501-8_11 fatcat:uroh2glwmvgjdhy6gc565wfmca

Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation [article]

Behrooz Razeghi, Taras Stanko, Boris Škorić, Slava Voloshynovskiy
2019 arXiv   pre-print
We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization.  ...  In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector.  ...  Zero Leakage Helper Data Systems A HDS in its most general form is shown in Fig. 1a . The Gen procedure takes as input a measurement x.  ... 
arXiv:1907.06388v1 fatcat:nljf5besifhwrlqyobggsqjdwy

Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation

Behrooz Razeghi, Taras Stanko, Boris Skoric, Slava Voloshynovskiy
2019 2019 IEEE International Workshop on Information Forensics and Security (WIFS)  
We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguation.  ...  In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector.  ...  Zero Leakage Helper Data Systems A HDS in its most general form is shown in Fig. 1a . The Gen procedure takes as input a measurement x.  ... 
doi:10.1109/wifs47025.2019.9035095 dblp:conf/wifs/RazeghiSSV19 fatcat:27mumtu46bccvp3qhirufdkszu

Fingerprint template protection using minutia-pair spectral representations [article]

Taras Stanko, Bin Chen, Boris Skoric
2018 arXiv   pre-print
Second, we construct a helper data system consisting of zero-leakage quantisation followed by the Code Offset Method.  ...  Storage of biometric data requires some form of template protection in order to preserve the privacy of people enrolled in a biometric database. One approach is to use a Helper Data System.  ...  Zero Leakage Helper Data Systems We briefly review the ZLHDS developed in [5] , [17] for quantisation of an enrollment measurement X ∈ R.  ... 
arXiv:1804.01744v1 fatcat:r6motorymjewbnm3m5i4z2tqda

An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions

Onur Günlü, Rafael Schaefer
2020 Entropy  
Proposed optimal constructions that jointly design the vector quantizer and error-correction code parameters are listed.  ...  optimal PUF constructions.  ...  The FCS can reconstruct a secret key from dependent random variables with zero secrecy leakage [21] .  ... 
doi:10.3390/e23010016 pmid:33374486 pmcid:PMC7824005 fatcat:2gcreyvsmzeabga4jiqoxyshzm

On the Key Generation Rate of Physically Unclonable Functions [article]

Yitao Chen, Muryong Kim, Sriram Vishwanath
2018 arXiv   pre-print
This achievable rate is shown to be optimal under the generated-secret (GS) model for PUFs.  ...  In this paper, an algebraic binning based coding scheme and its associated achievable rate for key generation using physically unclonable functions (PUFs) is determined.  ...  It is also reflected in Theorem 1 in [9] as R l and R w have the same bound. So the key-leakage-privacy region can be treated as key-leakage region or key-storage region.  ... 
arXiv:1801.07733v2 fatcat:esulg2o4rfhpvhdhymy3kvxnqa

Pitfall of the Detection Rate Optimized Bit Allocation within template protection and a remedy

E.J.C. Kelkboom, K.T.J. de Groot, C. Chen, J. Breebaart, R.N.J. Veldhuis
2009 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems  
In this work we focus on the Detection Rate Optimized Bit Allocation (DROBA) quantization scheme that extracts multiple bits per feature component while maximizing the overall detection rate.  ...  Experiments in our work show that the original DROBA algorithm, as known in the literature, creates auxiliary data that leaks a significant amount of information.  ...  TEMPLATE PROTECTION SCHEME WITH DROBA The template protection technique under consideration is known as the helper-data system [2] [3] [11] and is portrayed in Fig. 1 .  ... 
doi:10.1109/btas.2009.5339046 fatcat:dhahmlcfhjfuxakpnxi5gh4aci

Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems [article]

Onur Günlü, Onurcan İşcan, Vladimir Sidorenko, Gerhard Kramer
2019 arXiv   pre-print
The second construction uses nested polar codes for vector quantization during enrollment and for error correction during reconstruction.  ...  Simulations show that the nested polar codes achieve privacy-leakage and storage rates that improve on existing code designs.  ...  amount of helper data.  ... 
arXiv:1709.00275v3 fatcat:6p4vibezaverjclc4jtdgincay
« Previous Showing results 1 — 15 out of 233 results