Abstract
In this chapter we discuss authentication techniques involving data such as biometrics, which are assumed to be typical (essentially unique) for a particular person (or physical object). The data are captured by a sensor or measuring device, which is an imperfect process introducing some noise. Upon enrollment of a user, a sample of the noisy data is captured and stored as a template. Later, during authentication, another sample of the noisy data is captured and matched against the stored template.
Original language | English |
---|---|
Title of host publication | Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting |
Editors | P.T. Tuyls, B. Skoric, T. Kevenaar |
Place of Publication | New York |
Publisher | Springer |
Pages | 141-149 |
ISBN (Print) | 978-1-84628-983-5 |
DOIs | |
Publication status | Published - 2007 |