{"id":"https://openalex.org/W2168848853","doi":"https://doi.org/10.1109/isit.2009.5205878","title":"Secret rate - Privacy leakage in biometric systems","display_name":"Secret rate - Privacy leakage in biometric systems","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2168848853","doi":"https://doi.org/10.1109/isit.2009.5205878","mag":"2168848853"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2009.5205878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2009.5205878","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.tue.nl/en/publications/b9709b83-be9a-4562-9bb0-6e892549067e","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076494364","display_name":"Tanya Ignatenko","orcid":"https://orcid.org/0000-0002-8182-6706"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Tanya Ignatenko","raw_affiliation_strings":["Electrical Engineering Department, Eindhovan University of Technology, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Eindhovan University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039843593","display_name":"F.M.J. Willems","orcid":"https://orcid.org/0000-0002-7316-3471"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Frans Willems","raw_affiliation_strings":["Electrical Engineering Department, Eindhovan University of Technology, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Eindhovan University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076494364"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":1.5229,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84755257,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2251","last_page":"2255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8119198083877563},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.7830003499984741},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7773338556289673},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6221105456352234},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6065230369567871},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5179423689842224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49288463592529297},{"id":"https://openalex.org/keywords/biometric-data","display_name":"Biometric data","score":0.48483359813690186},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4106854200363159},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3895116150379181},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3867080509662628},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28469738364219666}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8119198083877563},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.7830003499984741},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7773338556289673},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6221105456352234},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6065230369567871},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5179423689842224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49288463592529297},{"id":"https://openalex.org/C2989513435","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometric data","level":3,"score":0.48483359813690186},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4106854200363159},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3895116150379181},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3867080509662628},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28469738364219666},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/isit.2009.5205878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2009.5205878","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire/b9709b83-be9a-4562-9bb0-6e892549067e","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/b9709b83-be9a-4562-9bb0-6e892549067e","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ignatenko, T & Willems, F M J 2009, Secret rate - Privacy leakage in biometric systems. in 2009 IEEE International Symposium on Information Theory, ISIT 2009, 28 June - 3 July 2009, Seoul. Institute of Electrical and Electronics Engineers, Piscataway, NJ, pp. 2251-2255. https://doi.org/10.1109/ISIT.2009.5205878","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:library.tue.nl:667793","is_oa":false,"landing_page_url":"http://repository.tue.nl/667793","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:tue:oai:pure.tue.nl:publications/b9709b83-be9a-4562-9bb0-6e892549067e","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/b9709b83-be9a-4562-9bb0-6e892549067e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2009 IEEE International Symposium on Information Theory, ISIT 2009, 28 June - 3 July 2009, Seoul, 2251 - 2255","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:openaire/b9709b83-be9a-4562-9bb0-6e892549067e","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/b9709b83-be9a-4562-9bb0-6e892549067e","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ignatenko, T & Willems, F M J 2009, Secret rate - Privacy leakage in biometric systems. in 2009 IEEE International Symposium on Information Theory, ISIT 2009, 28 June - 3 July 2009, Seoul. Institute of Electrical and Electronics Engineers, Piscataway, NJ, pp. 2251-2255. https://doi.org/10.1109/ISIT.2009.5205878","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W33948074","https://openalex.org/W1504678122","https://openalex.org/W2005118092","https://openalex.org/W2057124070","https://openalex.org/W2104641770","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2119985618","https://openalex.org/W2144387589","https://openalex.org/W2150412388","https://openalex.org/W2153396718","https://openalex.org/W2155676967","https://openalex.org/W2168892181","https://openalex.org/W2534370658","https://openalex.org/W2548219122","https://openalex.org/W3140053156","https://openalex.org/W6630420964"],"related_works":["https://openalex.org/W2070951564","https://openalex.org/W4386057510","https://openalex.org/W2002836168","https://openalex.org/W4235304214","https://openalex.org/W2348616196","https://openalex.org/W2081577055","https://openalex.org/W4205513058","https://openalex.org/W2583477080","https://openalex.org/W3183904581","https://openalex.org/W4206056428"],"abstract_inverted_index":{"Ahlswede":[0],"and":[1,60,127,146,164,183,211,214],"Csiszar":[2],"[1993]":[3],"introduced":[4],"the":[5,22,25,44,54,58,68,78,90,101,111,121,132,135,141,155,170,181,185,203,219],"concept":[6],"of":[7,24,157,178,221],"secret":[8,31,104,136,182,209,212],"sharing.":[9],"In":[10,49,131,161],"their":[11],"source":[12],"model":[13],"two":[14,17],"terminals":[15,26,142],"observe":[16],"correlated":[18],"sequences.":[19],"It":[20],"is":[21,47,65,100,137,195],"objective":[23],"to":[27,57,120],"form":[28],"a":[29,34,41,50,149,175,192],"common":[30],"by":[32,140,202],"interchanging":[33],"public":[35,69,150,171],"message":[36,70,172],"(helper":[37],"data)":[38],"in":[39],"such":[40],"way":[42],"that":[43,67],"secrecy":[45],"leakage":[46,118],"negligible.":[48],"biometric":[51,79,83,95,128,186],"setting,":[52,106],"where":[53],"sequences":[55],"correspond":[56],"enrollment":[59,129,187],"authentication":[61],"data,":[62,80],"respectively,":[63],"it":[64],"crucial":[66],"leaks":[71],"as":[72,75],"little":[73],"information":[74,123,179],"possible":[76],"about":[77,180,184],"since":[81],"compromised":[82],"data":[84,126],"cannot":[85],"be":[86,199],"replaced.":[87],"We":[88,205],"investigated":[89],"fundamental":[91],"trade-offs":[92],"for":[93,107,216],"four":[94,165],"settings.":[96],"The":[97],"first":[98],"one":[99],"standard":[102],"(Ahlswede-Csiszar)":[103],"generation":[105,210],"which":[108,197],"we":[109,153,166],"determined":[110,154,215],"secret-key":[112,223],"vs.":[113,224],"privacy-leakage":[114],"rate":[115,226],"region.":[116],"Here":[117],"corresponds":[119],"mutual":[122],"between":[124],"helper":[125],"sequence.":[130,188],"second":[133],"setting":[134,162],"not":[138],"generated":[139],"but":[143],"independently":[144],"chosen,":[145],"transmitted":[147],"using":[148],"message.":[151],"Again":[152],"region":[156,220],"achievable":[158,222],"rate-leakage":[159],"pairs.":[160,227],"three":[163],"consider":[167],"zero-leakage,":[168],"i.e.":[169],"contains":[173],"only":[174,201],"negligible":[176],"amount":[177],"To":[189],"achieve":[190],"this":[191],"private":[193],"key":[194],"needed,":[196],"can":[198],"observed":[200],"terminals.":[204],"considered":[206],"again":[207],"both":[208,217],"transmission":[213],"cases":[218],"private-key":[225]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
