Abstract
This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: We attempt to minimize the assumptions we make about the data and to present techniques that are broadly applicable wherever biometric inputs are used.
Original language | English (US) |
---|---|
Title of host publication | Security with Noisy Data |
Subtitle of host publication | On Private Biometrics, Secure Key Storage and Anti-Counterfeiting |
Publisher | Springer London |
Pages | 79-99 |
Number of pages | 21 |
ISBN (Print) | 9781846289835 |
DOIs | |
State | Published - 2007 |
All Science Journal Classification (ASJC) codes
- General Computer Science