Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/146318
Title: | Security analysis for key generation systems using face images | Authors: | Zhang W. Zhang C. Chen T. |
Issue Date: | 2004 | Citation: | Zhang W., Zhang C., Chen T. (2004). Security analysis for key generation systems using face images. Proceedings - International Conference on Image Processing, ICIP 2 : 3455-3458. ScholarBank@NUS Repository. | Abstract: | In this paper, we analyze the security problem of user information associated key generation (UIAKG) systems. We consider three kinds of attacks from the hacker: the exhaustive search attack, the authentic key statistics attack and the device key statistics attack. Under each attack, we give the estimate of the number of guesses the hacker has to make in order to access the system. Such analysis provides useful guidelines in designing a UIAKG system. The analysis also suggests that a user-dependent UIAKG is more secure than a user-independent one. Two UIAKG systems using face images as inputs are designed and compared to support the above theoretical analysis. | Source Title: | Proceedings - International Conference on Image Processing, ICIP | URI: | http://scholarbank.nus.edu.sg/handle/10635/146318 | ISSN: | 15224880 |
Appears in Collections: | Staff Publications |
Show full item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.