Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication
نویسندگان
چکیده
In this work, we present polar code designs that offer a provably optimal solution for biometric identification and authentication systems under noisy enrollment certain sources observation channels. We consider discrete memoryless source symmetric It is shown the proposed achieve fundamental limits with privacy secrecy constraints. Depending on how secret keys are extracted whether leakage rate should be close to zero, four related setups, which (i) generated key system, (ii) chosen (iii) system zero leakage, (iv) leakage. For first two (ii), level characterized by rate. last setups (iv), private additionally employed (iii), it assumed generated, i.e., from information. While in provided uniformly at random some trustful source. This work provides examples of limits-achieving authentication. Moreover, since based codes many existing works study low-complexity short block-length coding, provide design structure framework application
منابع مشابه
Multimedia content authentication: fundamental limits
In many multimedia applications, there is a need to authenticate a source that has been subjected to benign degradations in addition to potential tampering attacks. We develop a meaningful formulation of this problem, and identify and interpret the associated information-theoretic performance limits. The associated systems are shown to perform dramatically better than frequently proposed approa...
متن کاملEstimating the Fundamental Limits is Easier than Achieving the Fundamental Limits
We show through case studies that it is easier to estimate the fundamental limits of data processing than to construct explicit algorithms to achieve those limits. Focusing on binary classification, data compression, and prediction under logarithmic loss, we show that in the finite space setting, when it is possible to construct an estimator of the limits with vanishing error with n samples, it...
متن کاملBiometric Authentication
As people become more connected electronically, the ability to achieve a highly accurate automatic personal identification system is more critical. Biometric technology is a way to achieve fast, user-friendly authentication with a high level of accuracy. This presentation will highlight some of the benefits and the few limits of using biometrics for authentication. Emerging applications, both w...
متن کاملKeystroke Biometric Identification and Authentication on Long-Text Input
A novel keystroke biometric system for long-text input was developed and evaluated for user identification and authentication applications. The system consists of a Java applet to collect raw keystroke data over the internet, a feature extractor, and pattern classifiers to make identification or authentication decisions. Experiments on over 100 subjects investigated two input modes – copy and f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2022
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2021.3137749