Extracting Stable Crypto Keys and Pointers from IrisCodes


New paper:

F. Hao, R. Anderson, and J. Daugman (2005) "Combining Cryptography with Biometrics Effectively." (PDF here.)

Other references:

U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain (2004) "Biometric Cryptosystems: Issues and Challenges," Proc. of the IEEE, 92(6): 948-960.

C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. Kumar (1999) "Biometric Encryption," ICSA Guide to Cryptography, McGraw-Hill.

Y. Dodis, L. Reyzin, and A. Smith (2004) "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Eurocrypt 2004 LNCS 3027, 523-540.



Back to Main Page.