Abstract
A biometric authentication system can be partitioned into a layer that extracts common randomness out of a pair of related biometric sequences [Maurer, 1993] and a layer that masks a key sequence with this common randomness. We will analyze the performance of such a layered system first, and will show that an alternative method, the XOR- echnique, is not always secure.
| Original language | English |
|---|---|
| Title of host publication | Proc. of the Twenty-seventh symposium on Information Theory in the Benelux, June 8-9, 2006, Noordwijk, The Netherlands |
| Editors | R.L. Lagendijk, Jos. Weber, H., A. Berg, van den, F. |
| Place of Publication | Eefde |
| Publisher | Werkgemeenschap voor Informatie- en Communicatietheorie (WIC) |
| Pages | 197-204 |
| ISBN (Print) | 90-71048-22-5 |
| Publication status | Published - 2006 |