{"id":"https://openalex.org/W2127128604","doi":"https://doi.org/10.1117/12.839408","title":"On information leakage in fuzzy commitment","display_name":"On information leakage in fuzzy commitment","publication_year":2010,"publication_date":"2010-01-26","ids":{"openalex":"https://openalex.org/W2127128604","doi":"https://doi.org/10.1117/12.839408","mag":"2127128604"},"language":"en","primary_location":{"id":"doi:10.1117/12.839408","is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.839408","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SPIE Proceedings","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076494364","display_name":"Tanya Ignatenko","orcid":"https://orcid.org/0000-0002-8182-6706"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Tanya Ignatenko","raw_affiliation_strings":["Technische Univ. Eindhoven (Netherlands)"],"affiliations":[{"raw_affiliation_string":"Technische Univ. Eindhoven (Netherlands)","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039843593","display_name":"F.M.J. Willems","orcid":"https://orcid.org/0000-0002-7316-3471"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Frans Willems","raw_affiliation_strings":["Technische Univ. Eindhoven (Netherlands)"],"affiliations":[{"raw_affiliation_string":"Technische Univ. Eindhoven (Netherlands)","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076494364"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":0.3383,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60712471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"7541","issue":null,"first_page":"75410P","last_page":"75410P"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.9054443836212158},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6772065758705139},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6481101512908936},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6222672462463379},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5752774477005005},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5194149017333984},{"id":"https://openalex.org/keywords/biometric-data","display_name":"Biometric data","score":0.48145073652267456},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47888392210006714},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4784959852695465},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4454428553581238},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3789615035057068},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3730635643005371},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32145941257476807},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2551882863044739},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.15839096903800964},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.07732221484184265}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.9054443836212158},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6772065758705139},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6481101512908936},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6222672462463379},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5752774477005005},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5194149017333984},{"id":"https://openalex.org/C2989513435","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometric data","level":3,"score":0.48145073652267456},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47888392210006714},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4784959852695465},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4454428553581238},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3789615035057068},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3730635643005371},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32145941257476807},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2551882863044739},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.15839096903800964},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.07732221484184265}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1117/12.839408","is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.839408","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SPIE Proceedings","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/393fdfc0-f8b0-44aa-a475-ee66f021f1a0","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/393fdfc0-f8b0-44aa-a475-ee66f021f1a0","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ignatenko, T & Willems, F M J 2010, On information leakage in fuzzy commitment. in Proceedings of the Media Forensics and Security II, part of the IS &T-SPIE Electronic Imaging Symposium, 18-20 January 2010, San Jose, California. Proceedings of SPIE, vol. 7541, SPIE, Bellingham, pp. 75410P-1/14.","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:library.tue.nl:694970","is_oa":false,"landing_page_url":"http://repository.tue.nl/694970","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:tue:oai:pure.tue.nl:publications/393fdfc0-f8b0-44aa-a475-ee66f021f1a0","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/393fdfc0-f8b0-44aa-a475-ee66f021f1a0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the Media Forensics and Security II, part of the IS&amp;T-SPIE Electronic Imaging Symposium, 18-20 January 2010, San Jose, California, 75410P - 1/14","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W33948074","https://openalex.org/W187677220","https://openalex.org/W1527581375","https://openalex.org/W1546438435","https://openalex.org/W2019414962","https://openalex.org/W2032551902","https://openalex.org/W2099111195","https://openalex.org/W2104641770","https://openalex.org/W2129115604","https://openalex.org/W2165831888","https://openalex.org/W2168892181","https://openalex.org/W2534370658","https://openalex.org/W2548219122","https://openalex.org/W2797816625","https://openalex.org/W2987657883","https://openalex.org/W3152750074"],"related_works":["https://openalex.org/W2070951564","https://openalex.org/W4386057510","https://openalex.org/W4235304214","https://openalex.org/W2348616196","https://openalex.org/W2081577055","https://openalex.org/W4205513058","https://openalex.org/W2583477080","https://openalex.org/W3183904581","https://openalex.org/W4206056428","https://openalex.org/W1942112330"],"abstract_inverted_index":{"In":[0],"1999":[1],"Juels":[2],"and":[3,36,41,45,63,94],"Wattenberg":[4],"introduced":[5],"the":[6,66,83,91,95,107],"fuzzy":[7,53,84],"commitment":[8,11,54,85],"scheme.":[9],"Fuzzy":[10],"is":[12,50,55,72],"a":[13,17,23,99],"particular":[14],"realization":[15],"of":[16,29,101,109],"binary":[18],"biometric":[19,30,38,43,47,61,77,96,112],"secrecy":[20],"system":[21],"with":[22],"chosen":[24],"secret":[25,92],"key.":[26],"Three":[27],"cases":[28],"sources":[31,62],"are":[32,80,104],"considered,":[33],"i.e.":[34],"memoryless":[35,40,46,59,76,111],"totally-symmetric":[37,60,110],"sources,":[39,44,78],"input-symmetric":[42],"sources.":[48],"It":[49],"shown":[51],"that":[52,74],"only":[56,64],"optimal":[57],"for":[58,75,106],"at":[65],"maximum":[67],"secret-key":[68],"rate.":[69],"Moreover,":[70],"it":[71],"demonstrated":[73],"which":[79],"not":[81],"inputsymmetric,":[82],"scheme":[86],"leaks":[87],"information":[88],"on":[89],"both":[90],"key":[93],"data.":[97],"Finally,":[98],"number":[100],"coding":[102],"techniques":[103],"investigated":[105],"case":[108],"data":[113],"statistics.":[114]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
