Biometric security from an information-theoretical perspective
In this review, biometric systems are studied from an information theoretical point of view. In
the first part biometric authentication systems are studied. The objective of these systems is …
the first part biometric authentication systems are studied. The objective of these systems is …
Fundamental limits for privacy-preserving biometric identification systems that support authentication
In this paper, we analyze two types of biometric identification systems with protected
templates that also support authentication. In the first system, two terminals observe …
templates that also support authentication. In the first system, two terminals observe …
Successive refinement for hypothesis testing and lossless one-helper problem
We investigate two closely related successive refinement (SR) coding problems: 1) In the
hypothesis testing (HT) problem, bivariate hypothesis H_0:P_XY against H_1:P_XP_Y, ie …
hypothesis testing (HT) problem, bivariate hypothesis H_0:P_XY against H_1:P_XP_Y, ie …
A new characterization of the capacity region of identification systems under noisy enrollment
The fundamental limits of two common models: generated and chosen secret models in
biometric identification systems with exponentially many users are considered. Recently …
biometric identification systems with exponentially many users are considered. Recently …
Exact and soft successive refinement of the information bottleneck
The information bottleneck (IB) framework formalises the essential requirement for efficient
information processing systems to achieve an optimal balance between the complexity of …
information processing systems to achieve an optimal balance between the complexity of …
A Toolbox for Refined Information-Theoretic Analyses
This monograph offers a toolbox of mathematical techniques that have been effective and
widely applicable in informationtheoretic analyses. The first tool is a generalization of the …
widely applicable in informationtheoretic analyses. The first tool is a generalization of the …
Secret key-based identification and authentication with a privacy constraint
We consider the problem of identification and authentication based on secret key generation
from some usergenerated source data (eg, a biometric source). The goal is to reliably …
from some usergenerated source data (eg, a biometric source). The goal is to reliably …
Privacy-preserving identification systems with noisy enrollment
In this paper, we study fundamental trade-offs in privacy-preserving biometric identification
systems with noisy enrollment. The proposed identification systems include helper data …
systems with noisy enrollment. The proposed identification systems include helper data …
Fundamental limits-achieving polar code designs for biometric identification and authentication
In this work, we present polar code designs that offer a provably optimal solution for
biometric identification and authentication systems under noisy enrollment for certain …
biometric identification and authentication systems under noisy enrollment for certain …
Identification and lossy reconstruction in noisy databases
A high-dimensional database system is studied where the noisy versions of the underlying
feature vectors are observed in both the enrollment and query phases. The noisy …
feature vectors are observed in both the enrollment and query phases. The noisy …