Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/146318
DC FieldValue
dc.titleSecurity analysis for key generation systems using face images
dc.contributor.authorZhang W.
dc.contributor.authorZhang C.
dc.contributor.authorChen T.
dc.date.accessioned2018-08-21T05:10:08Z
dc.date.available2018-08-21T05:10:08Z
dc.date.issued2004
dc.identifier.citationZhang W., Zhang C., Chen T. (2004). Security analysis for key generation systems using face images. Proceedings - International Conference on Image Processing, ICIP 2 : 3455-3458. ScholarBank@NUS Repository.
dc.identifier.issn15224880
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/146318
dc.description.abstractIn this paper, we analyze the security problem of user information associated key generation (UIAKG) systems. We consider three kinds of attacks from the hacker: the exhaustive search attack, the authentic key statistics attack and the device key statistics attack. Under each attack, we give the estimate of the number of guesses the hacker has to make in order to access the system. Such analysis provides useful guidelines in designing a UIAKG system. The analysis also suggests that a user-dependent UIAKG is more secure than a user-independent one. Two UIAKG systems using face images as inputs are designed and compared to support the above theoretical analysis.
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentOFFICE OF THE PROVOST
dc.contributor.departmentDEPARTMENT OF COMPUTER SCIENCE
dc.description.sourcetitleProceedings - International Conference on Image Processing, ICIP
dc.description.volume2
dc.description.page3455-3458
dc.published.statepublished
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.