Biometric security from an information-theoretical perspective

T Ignatenko, FMJ Willems - Foundations and Trends® in …, 2012 - nowpublishers.com
In this review, biometric systems are studied from an information theoretical point of view. In
the first part biometric authentication systems are studied. The objective of these systems is …

Fundamental limits for privacy-preserving biometric identification systems that support authentication

T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
In this paper, we analyze two types of biometric identification systems with protected
templates that also support authentication. In the first system, two terminals observe …

Successive refinement for hypothesis testing and lossless one-helper problem

C Tian, J Chen - IEEE transactions on information theory, 2008 - ieeexplore.ieee.org
We investigate two closely related successive refinement (SR) coding problems: 1) In the
hypothesis testing (HT) problem, bivariate hypothesis H_0:P_XY against H_1:P_XP_Y, ie …

A new characterization of the capacity region of identification systems under noisy enrollment

V Yachongka, H Yagi - 2020 54th Annual Conference on …, 2020 - ieeexplore.ieee.org
The fundamental limits of two common models: generated and chosen secret models in
biometric identification systems with exponentially many users are considered. Recently …

Exact and soft successive refinement of the information bottleneck

H Charvin, N Catenacci Volpi, D Polani - Entropy, 2023 - mdpi.com
The information bottleneck (IB) framework formalises the essential requirement for efficient
information processing systems to achieve an optimal balance between the complexity of …

A Toolbox for Refined Information-Theoretic Analyses

N Merhav, N Weinberger - Foundations and Trends® in …, 2025 - nowpublishers.com
This monograph offers a toolbox of mathematical techniques that have been effective and
widely applicable in informationtheoretic analyses. The first tool is a generalization of the …

Secret key-based identification and authentication with a privacy constraint

K Kittichokechai, G Caire - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
We consider the problem of identification and authentication based on secret key generation
from some usergenerated source data (eg, a biometric source). The goal is to reliably …

Privacy-preserving identification systems with noisy enrollment

L Zhou, MT Vu, TJ Oechtering… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we study fundamental trade-offs in privacy-preserving biometric identification
systems with noisy enrollment. The proposed identification systems include helper data …

Fundamental limits-achieving polar code designs for biometric identification and authentication

L Zhou, TJ Oechtering… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, we present polar code designs that offer a provably optimal solution for
biometric identification and authentication systems under noisy enrollment for certain …

Identification and lossy reconstruction in noisy databases

E Tuncel, D Gündüz - IEEE transactions on information theory, 2013 - ieeexplore.ieee.org
A high-dimensional database system is studied where the noisy versions of the underlying
feature vectors are observed in both the enrollment and query phases. The noisy …