Abstract
This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: We attempt to minimize the assumptions we make about the data and to present techniques that are broadly applicable wherever biometric inputs are used.
| Original language | English (US) |
|---|---|
| Title of host publication | Security with Noisy Data |
| Subtitle of host publication | On Private Biometrics, Secure Key Storage and Anti-Counterfeiting |
| Publisher | Springer London |
| Pages | 79-99 |
| Number of pages | 21 |
| ISBN (Print) | 9781846289835 |
| DOIs | |
| State | Published - 2007 |
All Science Journal Classification (ASJC) codes
- General Computer Science