In this chapter we discuss authentication techniques involving data such as biometrics, which are assumed to be typical (essentially unique) for a particular person (or physical object). The data are captured by a sensor or measuring device, which is an imperfect process introducing some noise. Upon enrollment of a user, a sample of the noisy data is captured and stored as a template. Later, during authentication, another sample of the noisy data is captured and matched against the stored template. © 2007 Springer-Verlag London.
CITATION STYLE
Schoenmakers, B., & Tuyls, P. (2007). Computationally secure authentication with noisy data. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 141–149). Springer London. https://doi.org/10.1007/978-1-84628-984-2_9
Mendeley helps you to discover research relevant for your work.