Author of the publication

Biometric systems: privacy and secrecy aspects.

, and . IEEE Trans. Information Forensics and Security, 4 (4): 956-973 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ignatenko, Tanya
add a person with the name Ignatenko, Tanya
 

Other publications of authors with the same name

Fundamental limits for biometric identification with a database containing protected templates., and . ISITA, page 54-59. IEEE, (2010)On information leakage in fuzzy commitment., and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410P. SPIE, (2010)High-Rate Error Correction Schemes for SRAM-PUFs based on Polar Codes., , , , , and . CoRR, (2017)Identification and secret-key binding in binary-symmetric template-protected biometric systems., and . WIFS, page 1-5. IEEE, (2010)Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication., and . IEEE Trans. Information Theory, 61 (10): 5583-5594 (2015)Reference point detection for improved fingerprint matching., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720G. SPIE, (2006)Privacy Leakage in Binary Biometric Systems: From Gaussian to Binary Data., and . Security and Privacy in Biometrics, Springer, (2013)Achieving Secure Fuzzy Commitment Scheme for Optical PUFs., and . IIH-MSP, page 1185-1188. IEEE Computer Society, (2009)On Privacy in Secure Biometric Authentication Systems., and . ICASSP (2), page 121-124. IEEE, (2007)Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method., , , , and . ISIT, page 499-503. IEEE, (2006)