This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: We attempt to minimize the assumptions we make about the data and to present techniques that are broadly applicable wherever biometric inputs are used.
|Original language||English (US)|
|Title of host publication||Security with Noisy Data|
|Subtitle of host publication||On Private Biometrics, Secure Key Storage and Anti-Counterfeiting|
|Number of pages||21|
|State||Published - Dec 1 2007|
ASJC Scopus subject areas
- Computer Science(all)