Computationally secure authentication with noisy data

16Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter we discuss authentication techniques involving data such as biometrics, which are assumed to be typical (essentially unique) for a particular person (or physical object). The data are captured by a sensor or measuring device, which is an imperfect process introducing some noise. Upon enrollment of a user, a sample of the noisy data is captured and stored as a template. Later, during authentication, another sample of the noisy data is captured and matched against the stored template. © 2007 Springer-Verlag London.

Cite

CITATION STYLE

APA

Schoenmakers, B., & Tuyls, P. (2007). Computationally secure authentication with noisy data. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 141–149). Springer London. https://doi.org/10.1007/978-1-84628-984-2_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free