Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/146318
DC Field | Value | |
---|---|---|
dc.title | Security analysis for key generation systems using face images | |
dc.contributor.author | Zhang W. | |
dc.contributor.author | Zhang C. | |
dc.contributor.author | Chen T. | |
dc.date.accessioned | 2018-08-21T05:10:08Z | |
dc.date.available | 2018-08-21T05:10:08Z | |
dc.date.issued | 2004 | |
dc.identifier.citation | Zhang W., Zhang C., Chen T. (2004). Security analysis for key generation systems using face images. Proceedings - International Conference on Image Processing, ICIP 2 : 3455-3458. ScholarBank@NUS Repository. | |
dc.identifier.issn | 15224880 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/146318 | |
dc.description.abstract | In this paper, we analyze the security problem of user information associated key generation (UIAKG) systems. We consider three kinds of attacks from the hacker: the exhaustive search attack, the authentic key statistics attack and the device key statistics attack. Under each attack, we give the estimate of the number of guesses the hacker has to make in order to access the system. Such analysis provides useful guidelines in designing a UIAKG system. The analysis also suggests that a user-dependent UIAKG is more secure than a user-independent one. Two UIAKG systems using face images as inputs are designed and compared to support the above theoretical analysis. | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | OFFICE OF THE PROVOST | |
dc.contributor.department | DEPARTMENT OF COMPUTER SCIENCE | |
dc.description.sourcetitle | Proceedings - International Conference on Image Processing, ICIP | |
dc.description.volume | 2 | |
dc.description.page | 3455-3458 | |
dc.published.state | published | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.