Proceedings of 1994 Workshop on Information Theory and Statistics
DOI: 10.1109/wits.1994.513869
|View full text |Cite
|
Sign up to set email alerts
|

Identification via compressed data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
47
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(47 citation statements)
references
References 8 publications
0
47
0
Order By: Relevance
“…In this paper, we are interested in the minimal achievable deception exponent, which is the best the adversary can do. Based on the minimal achievable deception exponent, the designer of the biometric authentication system can choose an appropriate ∆ value that on one hand, limits the probability of successful deception below the tolerance level, and on the other hand, does not cause too large a probability of false rejection when the legitimate user is authenticated [1], [2].…”
Section: Definition 1 a Deception Exponent E Is Achievable Under The mentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we are interested in the minimal achievable deception exponent, which is the best the adversary can do. Based on the minimal achievable deception exponent, the designer of the biometric authentication system can choose an appropriate ∆ value that on one hand, limits the probability of successful deception below the tolerance level, and on the other hand, does not cause too large a probability of false rejection when the legitimate user is authenticated [1], [2].…”
Section: Definition 1 a Deception Exponent E Is Achievable Under The mentioning
confidence: 99%
“…In a biometric authentication system, successful deception happens when an adversary impersonates a legitimate user by faking a biometric feature close enough to the enrollment and then deceives the authentication system. The first study on the deception probability in the biometric authentication system is [1], where the authors studied the deception in an authentication system where the enrollment is compressed. The authors obtained the optimal trade-off between the compression rate and the exponent of the probability of successful deception when the adversary has no side information.…”
Section: Introductionmentioning
confidence: 99%
“…according to a given distribution. The setting is closely related to the problem considered by Ahlswede et al [1], where the focus was only on discrete sources. In [1], the authors attempt to attack the more general problem where both false positives and false negatives are allowed.…”
Section: Introductionmentioning
confidence: 99%
“…The setting is closely related to the problem considered by Ahlswede et al [1], where the focus was only on discrete sources. In [1], the authors attempt to attack the more general problem where both false positives and false negatives are allowed. In this general case, it was demonstrated in [1] that the question of 'achievable rate' is uninteresting and only the error exponent is studied (in the current paper, where false negatives are not allowed, we show that the rate question becomes interesting again).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation