Computationally secure authentication with noisy data

B. Schoenmakers, P.T. Tuyls

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

16 Citations (Scopus)


In this chapter we discuss authentication techniques involving data such as biometrics, which are assumed to be typical (essentially unique) for a particular person (or physical object). The data are captured by a sensor or measuring device, which is an imperfect process introducing some noise. Upon enrollment of a user, a sample of the noisy data is captured and stored as a template. Later, during authentication, another sample of the noisy data is captured and matched against the stored template.
Original languageEnglish
Title of host publicationSecurity with noisy data : on private biometrics, secure key storage and anti-counterfeiting
EditorsP.T. Tuyls, B. Skoric, T. Kevenaar
Place of PublicationNew York
ISBN (Print)978-1-84628-983-5
Publication statusPublished - 2007


Dive into the research topics of 'Computationally secure authentication with noisy data'. Together they form a unique fingerprint.

Cite this