{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:42Z","timestamp":1759092222954,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1145\/3433210.3437512","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:26:39Z","timestamp":1622820399000},"page":"629-643","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Cryptographic Key Derivation from Biometric Inferences for Remote Authentication"],"prefix":"10.1145","author":[{"given":"Erkam","family":"Uzun","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Carter","family":"Yagemann","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Simon","family":"Chung","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Vladimir","family":"Kolesnikov","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2020. Biometric requirements. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/design\/device-experiences\/windows-hello-biometric-requirements.  2020. Biometric requirements. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/design\/device-experiences\/windows-hello-biometric-requirements."},{"key":"e_1_3_2_2_2_1","unstructured":"2020. Biometric security. https:\/\/source.android.com\/security\/biometric\/measure.  2020. Biometric security. https:\/\/source.android.com\/security\/biometric\/measure."},{"key":"e_1_3_2_2_3_1","unstructured":"2020. Combining biometrics. http:\/\/www.cl.cam.ac.uk\/users\/jgd1000\/combine\/.  2020. Combining biometrics. http:\/\/www.cl.cam.ac.uk\/users\/jgd1000\/combine\/."},{"key":"e_1_3_2_2_4_1","volume-title":"Comput. Surveys","volume":"51","author":"Acar A.","year":"2018","unstructured":"A. Acar , H. Aksu , A. S Uluagac , and M. Conti . 2018. A survey on homomorphic encryption schemes: Theory and implementation . Comput. Surveys , Vol. 51 , 4 ( 2018 ). A. Acar, H. Aksu, A. S Uluagac, and M. Conti. 2018. A survey on homomorphic encryption schemes: Theory and implementation. Comput. Surveys, Vol. 51, 4 (2018)."},{"volume-title":"IEEE Canadian Conference on Electrical and Computer Engineering.","author":"Adler A.","key":"e_1_3_2_2_5_1","unstructured":"A. Adler , R. Youmaran , and S. Loyka . 2006. Towards a measure of biometric information . In IEEE Canadian Conference on Electrical and Computer Engineering. A. Adler, R. Youmaran, and S. Loyka. 2006. Towards a measure of biometric information. In IEEE Canadian Conference on Electrical and Computer Engineering."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871072"},{"key":"e_1_3_2_2_7_1","unstructured":"Apple Inc. 2020 a. Face ID security. https:\/\/support.apple.com\/en-us\/HT208108.  Apple Inc. 2020 a. Face ID security. https:\/\/support.apple.com\/en-us\/HT208108."},{"key":"e_1_3_2_2_8_1","unstructured":"Apple Inc. 2020 b. Touch ID security. https:\/\/support.apple.com\/en-us\/HT204587.  Apple Inc. 2020 b. Touch ID security. https:\/\/support.apple.com\/en-us\/HT204587."},{"volume-title":"International Conference on Acoustics, Speech and Signal Processing. IEEE, 631--635","author":"Avila A. R","key":"e_1_3_2_2_9_1","unstructured":"A. R Avila , H. Gamper , C. Reddy , R. Cutler , I. Tashev , and J. Gehrke . 2019. Non-intrusive speech quality assessment using neural networks . In International Conference on Acoustics, Speech and Signal Processing. IEEE, 631--635 . A. R Avila, H. Gamper, C. Reddy, R. Cutler, I. Tashev, and J. Gehrke. 2019. Non-intrusive speech quality assessment using neural networks. In International Conference on Acoustics, Speech and Signal Processing. IEEE, 631--635."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131904"},{"volume-title":"Proceedings of the 33rd Annual Computer Security Applications Conference. 28--41","author":"Azimpourkivi M.","key":"e_1_3_2_2_11_1","unstructured":"M. Azimpourkivi , U. Topkara , and B. Carbunar . 2017b. A secure mobile authentication alternative to biometrics . In Proceedings of the 33rd Annual Computer Security Applications Conference. 28--41 . M. Azimpourkivi, U. Topkara, and B. Carbunar. 2017b. A secure mobile authentication alternative to biometrics. In Proceedings of the 33rd Annual Computer Security Applications Conference. 28--41."},{"key":"e_1_3_2_2_12_1","volume-title":"Fido U2F implementation considerations. FIDO Alliance Proposed Standard","author":"Balfanz D.","year":"2015","unstructured":"D. Balfanz . 2015. Fido U2F implementation considerations. FIDO Alliance Proposed Standard ( 2015 ), 1--5. D. Balfanz. 2015. Fido U2F implementation considerations. FIDO Alliance Proposed Standard (2015), 1--5."},{"key":"e_1_3_2_2_13_1","volume-title":"Automatic face image quality prediction. arXiv:1706.09887","author":"Best-Rowden L.","year":"2017","unstructured":"L. Best-Rowden and A. K Jain . 2017. Automatic face image quality prediction. arXiv:1706.09887 ( 2017 ). L. Best-Rowden and A. K Jain. 2017. Automatic face image quality prediction. arXiv:1706.09887 (2017)."},{"volume-title":"Proceedings of the International Conference on Security and Cryptography. IEEE, 68--77","author":"Blanton M.","key":"e_1_3_2_2_14_1","unstructured":"M. Blanton and M. Aliasgari . 2011. On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting . In Proceedings of the International Conference on Security and Cryptography. IEEE, 68--77 . M. Blanton and M. Aliasgari. 2011. On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting. In Proceedings of the International Conference on Security and Cryptography. IEEE, 68--77."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"M. Blanton and M. Aliasgari. 2013. Analysis of reusability of secure sketches and fuzzy extractors. IEEE transactions on information forensics and security Vol. 8 9 (2013) 1433--1445.  M. Blanton and M. Aliasgari. 2013. Analysis of reusability of secure sketches and fuzzy extractors. IEEE transactions on information forensics and security Vol. 8 9 (2013) 1433--1445.","DOI":"10.1109\/TIFS.2013.2272786"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"K. Bowyer K. Hollingsworth and P. Flynn. 2008. Image understanding for iris biometrics: A survey. Computer vision and image understanding Vol. 110 2 (2008).  K. Bowyer K. Hollingsworth and P. Flynn. 2008. Image understanding for iris biometrics: A survey. Computer vision and image understanding Vol. 110 2 (2008).","DOI":"10.1016\/j.cviu.2007.08.005"},{"key":"e_1_3_2_2_17_1","unstructured":"J. Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry Vol. 189 194 (1996) 4--7.  J. Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry Vol. 189 194 (1996) 4--7."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_28"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_2_20_1","unstructured":"M. Chase H. Chen J. Ding S. Goldwasser S. Gorbunov J. Hoffstein K. Lauter S. Lokam D. Moody T. Morrison etal 2017. Security of homomorphic encryption. HomomorphicEncryption. org Redmond WA Tech. Rep (2017).  M. Chase H. Chen J. Ding S. Goldwasser S. Gorbunov J. Hoffstein K. Lauter S. Lokam D. Moody T. Morrison et al. 2017. Security of homomorphic encryption. HomomorphicEncryption. org Redmond WA Tech. Rep (2017)."},{"volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1171--1186","author":"Chatterjee R.","key":"e_1_3_2_2_21_1","unstructured":"R. Chatterjee , M. S. Riazi , T. Chowdhury , E. Marasco , F. Koushanfar , and A. Juels . 2019. Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1171--1186 . R. Chatterjee, M. S. Riazi, T. Chowdhury, E. Marasco, F. Koushanfar, and A. Juels. 2019. Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1171--1186."},{"volume-title":"29th USENIX Security Symposium","author":"Chen H.","key":"e_1_3_2_2_22_1","unstructured":"H. Chen , I. Chillotti , Y. Dong , O. Poburinnaya , I. Razenshteyn , and M. S. Riazi . 2020. SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search . In 29th USENIX Security Symposium . Boston, MA. H. Chen, I. Chillotti, Y. Dong, O. Poburinnaya, I. Razenshteyn, and M. S. Riazi. 2020. SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. In 29th USENIX Security Symposium. Boston, MA."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"J. Chen Y. Deng G. Bai and G. Su. 2014. Face image quality assessment based on learning to rank. IEEE signal processing letters Vol. 22 1 (2014) 90--94.  J. Chen Y. Deng G. Bai and G. Su. 2014. Face image quality assessment based on learning to rank. IEEE signal processing letters Vol. 22 1 (2014) 90--94.","DOI":"10.1109\/LSP.2014.2347419"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"T. Connie A. Teoh M. Goh and D. Ngo. 2005. Palmhashing: a novel approach for cancelable biometrics. Information processing letters Vol. 93 1 (2005) 1--5.  T. Connie A. Teoh M. Goh and D. Ngo. 2005. Palmhashing: a novel approach for cancelable biometrics. Information processing letters Vol. 93 1 (2005) 1--5.","DOI":"10.1016\/j.ipl.2004.09.014"},{"volume-title":"Elements of information theory","author":"Cover T. M","key":"e_1_3_2_2_25_1","unstructured":"T. M Cover and J. A Thomas . 2012. Elements of information theory . John Wiley & Sons . T. M Cover and J. A Thomas. 2012. Elements of information theory .John Wiley & Sons."},{"volume-title":"The essential guide to image processing","author":"Daugman J.","key":"e_1_3_2_2_26_1","unstructured":"J. Daugman . 2009. How iris recognition works . In The essential guide to image processing . Elsevier , 715--739. J. Daugman. 2009. How iris recognition works. In The essential guide to image processing. Elsevier, 715--739."},{"volume-title":"International conference on the theory and applications of cryptographic techniques. Springer, 523--540","author":"Dodis Y.","key":"e_1_3_2_2_27_1","unstructured":"Y. Dodis , L. Reyzin , and A. Smith . 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data . In International conference on the theory and applications of cryptographic techniques. Springer, 523--540 . Y. Dodis, L. Reyzin, and A. Smith. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques. Springer, 523--540."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0047-259X(82)90077-X"},{"volume-title":"Proceedings of the International Symposium on Privacy Enhancing Technologies","author":"Erkin Z.","key":"e_1_3_2_2_29_1","unstructured":"Z. Erkin , M. Franz , J. Guajardo , S. Katzenbeisser , I. Lagendijk , and T. Toft . 2009. Privacy-Preserving Face Recognition . In Proceedings of the International Symposium on Privacy Enhancing Technologies ( Seattle, WA). Springer-Verlag, 235--253. Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. 2009. Privacy-Preserving Face Recognition. In Proceedings of the International Symposium on Privacy Enhancing Technologies (Seattle, WA). Springer-Verlag, 235--253."},{"key":"e_1_3_2_2_30_1","volume-title":"International Conference on Biometrics. Springer, 213--220","author":"Fierrez-Aguilar J.","year":"2006","unstructured":"J. Fierrez-Aguilar , Y. Chen , J. Ortega-Garcia , and A. K Jain . 2006 . Incorporating image quality in multi-algorithm fingerprint verification . In International Conference on Biometrics. Springer, 213--220 . J. Fierrez-Aguilar, Y. Chen, J. Ortega-Garcia, and A. K Jain. 2006. Incorporating image quality in multi-algorithm fingerprint verification. In International Conference on Biometrics. Springer, 213--220."},{"key":"e_1_3_2_2_31_1","unstructured":"Fingerprint Verification Competitions. 2020. STFV@ICB2013. https:\/\/biolab.csr.unibo.it\/fvcongoing\/UI\/Form\/ICB2013STFV.aspx.  Fingerprint Verification Competitions. 2020. STFV@ICB2013. https:\/\/biolab.csr.unibo.it\/fvcongoing\/UI\/Form\/ICB2013STFV.aspx."},{"volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1322--1333","author":"Fredrikson M.","key":"e_1_3_2_2_32_1","unstructured":"M. Fredrikson , S. Jha , and T. Ristenpart . 2015. Model inversion attacks that exploit confidence information and basic countermeasures . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1322--1333 . M. Fredrikson, S. Jha, and T. Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1322--1333."},{"volume-title":"International Conference Image Analysis and Recognition. Springer, 63--71","author":"Gafurov D.","key":"e_1_3_2_2_33_1","unstructured":"D. Gafurov , P. Bours , B. Yang , and C. Busch . 2013. Independent performance evaluation of pseudonymous identifier fingerprint verification algorithms . In International Conference Image Analysis and Recognition. Springer, 63--71 . D. Gafurov, P. Bours, B. Yang, and C. Busch. 2013. Independent performance evaluation of pseudonymous identifier fingerprint verification algorithms. In International Conference Image Analysis and Recognition. Springer, 63--71."},{"key":"e_1_3_2_2_34_1","volume-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","volume":"00","author":"Gomez-Barrero M.","unstructured":"M. Gomez-Barrero , J. Fierrez , J. Galbally , E. Maiorana , and P. Campisi . 2016. Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics . In 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) , Vol. 00 . 259--266. M. Gomez-Barrero, J. Fierrez, J. Galbally, E. Maiorana, and P. Campisi. 2016. Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics. In 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Vol. 00. 259--266."},{"key":"e_1_3_2_2_35_1","article-title":"General framework to evaluate unlinkability in biometric template protection systems","volume":"13","author":"Gomez-Barrero M.","year":"2017","unstructured":"M. Gomez-Barrero , J. Galbally , C. Rathgeb , and C. Busch . 2017 a. General framework to evaluate unlinkability in biometric template protection systems . IEEE Transactions on Information Forensics and Security , Vol. 13 , 6 (2017). M. Gomez-Barrero, J. Galbally, C. Rathgeb, and C. Busch. 2017a. General framework to evaluate unlinkability in biometric template protection systems. IEEE Transactions on Information Forensics and Security, Vol. 13, 6 (2017).","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_2_36_1","volume-title":"Multi-biometric Template Protection Based on Homomorphic Encryption. Pattern Recogn.","volume":"67","author":"Gomez-Barrero M.","year":"2017","unstructured":"M. Gomez-Barrero , E. Maiorana , J. Galbally , P. Campisi , and J. Fierrez . 2017b . Multi-biometric Template Protection Based on Homomorphic Encryption. Pattern Recogn. , Vol. 67 , C ( July 2017 ), 149--163. M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi, and J. Fierrez. 2017b. Multi-biometric Template Protection Based on Homomorphic Encryption. Pattern Recogn., Vol. 67, C (July 2017), 149--163."},{"key":"e_1_3_2_2_37_1","unstructured":"Google. 2020. Fingerprint security. https:\/\/support.google.com\/pixelphone\/answer\/6300638?hl=en&visit_id=637272039773000531--2694376495&rd=1.  Google. 2020. Fingerprint security. https:\/\/support.google.com\/pixelphone\/answer\/6300638?hl=en&visit_id=637272039773000531--2694376495&rd=1."},{"volume-title":"European Conference on Computer Vision. Springer, 87--102","author":"Guo Y.","key":"e_1_3_2_2_38_1","unstructured":"Y. Guo , L. Zhang , Y. Hu , X. He , and J. Gao . 2016. Ms-celeb-1m: A dataset and benchmark for large-scale face recognition . In European Conference on Computer Vision. Springer, 87--102 . Y. Guo, L. Zhang, Y. Hu, X. He, and J. Gao. 2016. Ms-celeb-1m: A dataset and benchmark for large-scale face recognition. In European Conference on Computer Vision. Springer, 87--102."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"F. Hao R. Anderson and J. Daugman. 2006. Combining crypto with biometrics effectively. IEEE transactions on computers Vol. 55 9 (2006) 1081--1088.  F. Hao R. Anderson and J. Daugman. 2006. Combining crypto with biometrics effectively. IEEE transactions on computers Vol. 55 9 (2006) 1081--1088.","DOI":"10.1109\/TC.2006.138"},{"key":"e_1_3_2_2_40_1","volume-title":"Integrating faces and fingerprints for personal identification","author":"Hong L.","year":"1998","unstructured":"L. Hong and A. K Jain . 1998. Integrating faces and fingerprints for personal identification . IEEE transactions on pattern analysis and machine intelligence, Vol. 20 , 12 ( 1998 ), 1295--1307. L. Hong and A. K Jain. 1998. Integrating faces and fingerprints for personal identification. IEEE transactions on pattern analysis and machine intelligence, Vol. 20, 12 (1998), 1295--1307."},{"key":"e_1_3_2_2_41_1","first-page":"277","article-title":"Systems and methods for recognition of individuals using multiple biometric searches","volume":"7","author":"Howard J. V","year":"2007","unstructured":"J. V Howard and F. Frazier . 2007 . Systems and methods for recognition of individuals using multiple biometric searches . US Patent 7 , 277 ,891. J. V Howard and F. Frazier. 2007. Systems and methods for recognition of individuals using multiple biometric searches. US Patent 7,277,891.","journal-title":"US Patent"},{"key":"e_1_3_2_2_42_1","volume-title":"Efficient Privacy-Preserving Biometric Identification. In ISOC Network and Distributed System Security Symposium -- NDSS","author":"Huang Yan","year":"2011","unstructured":"Yan Huang , Lior Malka , David Evans , and Jonathan Katz . 2011 . Efficient Privacy-Preserving Biometric Identification. In ISOC Network and Distributed System Security Symposium -- NDSS 2011. The Internet Society. Yan Huang, Lior Malka, David Evans, and Jonathan Katz. 2011. Efficient Privacy-Preserving Biometric Identification. In ISOC Network and Distributed System Security Symposium -- NDSS 2011. The Internet Society."},{"volume-title":"Theory of Cryptography Conference. Springer, 245--264","author":"Indyk P.","key":"e_1_3_2_2_43_1","unstructured":"P. Indyk and D. Woodruff . 2006. Polylogarithmic private approximations and efficient matching . In Theory of Cryptography Conference. Springer, 245--264 . P. Indyk and D. Woodruff. 2006. Polylogarithmic private approximations and efficient matching. In Theory of Cryptography Conference. Springer, 245--264."},{"key":"e_1_3_2_2_44_1","volume-title":"cybersecurity and privacy protection","author":"Information","year":"2011","unstructured":"Information technology - Security techniques - Biometric information protection. 2011. ISO\/IEC 24745:2011. ISO\/IEC JTC 1\/SC 27 Information security , cybersecurity and privacy protection ( 2011 ). Information technology - Security techniques - Biometric information protection. 2011. ISO\/IEC 24745:2011. ISO\/IEC JTC 1\/SC 27 Information security, cybersecurity and privacy protection (2011)."},{"key":"e_1_3_2_2_45_1","unstructured":"J. Ji J. Li S. Yan B. Zhang and Q. Tian. 2012. Super-bit locality-sensitive hashing. In Advances in Neural Information Processing Systems.  J. Ji J. Li S. Yan B. Zhang and Q. Tian. 2012. Super-bit locality-sensitive hashing. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"A. Jin D. Ling and A. Goh. 2004. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition Vol. 37 11 (2004).  A. Jin D. Ling and A. Goh. 2004. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition Vol. 37 11 (2004).","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"volume-title":"Proceedings of ACM conference on Computer and communications security.","author":"Juels A.","key":"e_1_3_2_2_48_1","unstructured":"A. Juels and M. Wattenberg . 1999. A fuzzy commitment scheme . In Proceedings of ACM conference on Computer and communications security. A. Juels and M. Wattenberg. 1999. A fuzzy commitment scheme. In Proceedings of ACM conference on Computer and communications security."},{"volume-title":"USENIX Security Symposium. 483--498","author":"Karapanos N.","key":"e_1_3_2_2_49_1","unstructured":"N. Karapanos , C. Marforio , C. Soriente , and S. Capkun . 2015. Sound-proof: usable two-factor authentication based on ambient sound . In USENIX Security Symposium. 483--498 . N. Karapanos, C. Marforio, C. Soriente, and S. Capkun. 2015. Sound-proof: usable two-factor authentication based on ambient sound. In USENIX Security Symposium. 483--498."},{"key":"e_1_3_2_2_50_1","volume-title":"A style-based generator architecture for generative adversarial networks. arXiv:1812.04948","author":"Karras Tero","year":"2018","unstructured":"Tero Karras , Samuli Laine , and Timo Aila . 2018. A style-based generator architecture for generative adversarial networks. arXiv:1812.04948 ( 2018 ). Tero Karras, Samuli Laine, and Timo Aila. 2018. A style-based generator architecture for generative adversarial networks. arXiv:1812.04948 (2018)."},{"key":"e_1_3_2_2_51_1","volume-title":"P Keenan and ISP FCIPS","author":"T.","year":"2015","unstructured":"T. P Keenan and ISP FCIPS . 2015 . Hidden Risks of Biometric Identifiers and How to Avoid Them. BlackHat USA ( 2015). T. P Keenan and ISP FCIPS. 2015. Hidden Risks of Biometric Identifiers and How to Avoid Them. BlackHat USA (2015)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"A. Kholmatov and B. Yanikoglu. 2008. Realization of correlation attack against the fuzzy vault scheme. In Security Forensics Steganography and Watermarking of Multimedia Contents X Vol. 6819. International Society for Optics and Photonics.  A. Kholmatov and B. Yanikoglu. 2008. Realization of correlation attack against the fuzzy vault scheme. In Security Forensics Steganography and Watermarking of Multimedia Contents X Vol. 6819. International Society for Optics and Photonics.","DOI":"10.1117\/12.766861"},{"key":"e_1_3_2_2_53_1","unstructured":"C. Li X. Ma B. Jiang X. Li X. Zhang X. Liu Y. Cao A. Kannan and Z. Zhu. 2017. Deep speaker: an end-to-end neural speaker embedding system. arXiv:1705.02304 (2017).  C. Li X. Ma B. Jiang X. Li X. Zhang X. Liu Y. Cao A. Kannan and Z. Zhu. 2017. Deep speaker: an end-to-end neural speaker embedding system. arXiv:1705.02304 (2017)."},{"key":"e_1_3_2_2_54_1","unstructured":"A. Madry A. Makelov L. Schmidt D. Tsipras and A. Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083 (2017).  A. Madry A. Makelov L. Schmidt D. Tsipras and A. Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_2_55_1","unstructured":"S. Miglani and M. Kumar. 2020. India's billion-member biometric database raises privacy fears. https:\/\/www.reuters.com\/article\/us-india-biometrics-idUSKCN0WI14E.  S. Miglani and M. Kumar. 2020. India's billion-member biometric database raises privacy fears. https:\/\/www.reuters.com\/article\/us-india-biometrics-idUSKCN0WI14E."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2214050"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"A. Nagrani J. S Chung and A. Zisserman. 2017. Voxceleb: a large-scale speaker identification dataset. arXiv:1706.08612 (2017).  A. Nagrani J. S Chung and A. Zisserman. 2017. Voxceleb: a large-scale speaker identification dataset. arXiv:1706.08612 (2017).","DOI":"10.21437\/Interspeech.2017-950"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E93.D.1878"},{"key":"e_1_3_2_2_61_1","volume-title":"PVS: A prototype verification system. In International Conference on Automated Deduction","author":"Owre S.","year":"1992","unstructured":"S. Owre , J. M Rushby , and N. Shankar . 1992 . PVS: A prototype verification system. In International Conference on Automated Deduction . Springer , 748--752. S. Owre, J. M Rushby, and N. Shankar. 1992. PVS: A prototype verification system. In International Conference on Automated Deduction. Springer, 748--752."},{"volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 5206--5210","author":"Panayotov V.","key":"e_1_3_2_2_62_1","unstructured":"V. Panayotov , G. Chen , D. Povey , and S. Khudanpur . 2015. Librispeech: an ASR corpus based on public domain audio books . In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 5206--5210 . V. Panayotov, G. Chen, D. Povey, and S. Khudanpur. 2015. Librispeech: an ASR corpus based on public domain audio books. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 5206--5210."},{"volume-title":"IEEE Symposium on Security and Privacy. 582--597","author":"Papernot N.","key":"e_1_3_2_2_63_1","unstructured":"N. Papernot , P. McDaniel , X. Wu , S. Jha , and A. Swami . 2016. Distillation as a defense to adversarial perturbations against deep neural networks . In IEEE Symposium on Security and Privacy. 582--597 . N. Papernot, P. McDaniel, X. Wu, S. Jha, and A. Swami. 2016. Distillation as a defense to adversarial perturbations against deep neural networks. In IEEE Symposium on Security and Privacy. 582--597."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2019.2908700"},{"key":"e_1_3_2_2_65_1","unstructured":"M. Raginsky and S. Lazebnik. 2009. Locality-sensitive binary codes from shift-invariant kernels. In Advances in neural information processing systems.  M. Raginsky and S. Lazebnik. 2009. Locality-sensitive binary codes from shift-invariant kernels. In Advances in neural information processing systems."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.1912974"},{"key":"e_1_3_2_2_67_1","volume-title":"2004 12th European Signal Processing Conference. IEEE, 1221--1224","author":"Ross A.","year":"2004","unstructured":"A. Ross and A. K Jain . 2004 . Multimodal Biometrics: an overview . In 2004 12th European Signal Processing Conference. IEEE, 1221--1224 . A. Ross and A. K Jain. 2004. Multimodal Biometrics: an overview. In 2004 12th European Signal Processing Conference. IEEE, 1221--1224."},{"key":"e_1_3_2_2_68_1","volume-title":"Efficient Privacy-Preserving Face Recognition. In ICISC 09: 12th International Conference on Information Security and Cryptology (Lecture Notes in Computer Science","volume":"244","author":"Sadeghi Ahmad-Reza","year":"2010","unstructured":"Ahmad-Reza Sadeghi , Thomas Schneider , and Immo Wehrenberg . 2010 . Efficient Privacy-Preserving Face Recognition. In ICISC 09: 12th International Conference on Information Security and Cryptology (Lecture Notes in Computer Science , Vol. 5984), Donghoon Lee and Seokhie Hong (Eds.). Springer, Heidelberg, 229-- 244 . Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. 2010. Efficient Privacy-Preserving Face Recognition. In ICISC 09: 12th International Conference on Information Security and Cryptology (Lecture Notes in Computer Science, Vol. 5984), Donghoon Lee and Seokhie Hong (Eds.). Springer, Heidelberg, 229--244."},{"key":"e_1_3_2_2_69_1","volume-title":"Computers & Security","volume":"53","author":"Saevanee H.","year":"2015","unstructured":"H. Saevanee , N. Clarke , S. Furnell , and V. Biscione . 2015. Continuous user authentication using multi-modal biometrics . Computers & Security , Vol. 53 ( 2015 ). H. Saevanee, N. Clarke, S. Furnell, and V. Biscione. 2015. Continuous user authentication using multi-modal biometrics. Computers & Security, Vol. 53 (2015)."},{"key":"e_1_3_2_2_70_1","unstructured":"N. Sakimura J. Bradley M. Jones B. De Medeiros and C. Mortimore. 2014. OpenID Connect Core 1.0 incorporating errata set 1. The OpenID Foundation (2014).  N. Sakimura J. Bradley M. Jones B. De Medeiros and C. Mortimore. 2014. OpenID Connect Core 1.0 incorporating errata set 1. The OpenID Foundation (2014)."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 815--823","author":"Schroff F.","key":"e_1_3_2_2_72_1","unstructured":"F. Schroff , D. Kalenichenko , and J. Philbin . 2015. Facenet: A unified embedding for face recognition and clustering . In Proceedings of the IEEE conference on computer vision and pattern recognition. 815--823 . F. Schroff, D. Kalenichenko, and J. Philbin. 2015. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE conference on computer vision and pattern recognition. 815--823."},{"volume-title":"IEEE Symp. on Security and Privacy.","author":"Shokri R.","key":"e_1_3_2_2_73_1","unstructured":"R. Shokri , M. Stronati , C. Song , and V. Shmatikov . 2017. Membership inference attacks against machine learning models . In IEEE Symp. on Security and Privacy. R. Shokri, M. Stronati, C. Song, and V. Shmatikov. 2017. Membership inference attacks against machine learning models. In IEEE Symp. on Security and Privacy."},{"volume-title":"International Conference on Information Security. Springer, 465--485","author":"Simhadri S.","key":"e_1_3_2_2_74_1","unstructured":"S. Simhadri , J. Steel , and B. Fuller . 2019. Cryptographic Authentication from the Iris . In International Conference on Information Security. Springer, 465--485 . S. Simhadri, J. Steel, and B. Fuller. 2019. Cryptographic Authentication from the Iris. In International Conference on Information Security. Springer, 465--485."},{"volume-title":"IEEE Symposium on Security and Privacy. 188--203","author":"Simoens K.","key":"e_1_3_2_2_75_1","unstructured":"K. Simoens , P. Tuyls , and B. Preneel . 2009. Privacy weaknesses in biometric sketches . In IEEE Symposium on Security and Privacy. 188--203 . K. Simoens, P. Tuyls, and B. Preneel. 2009. Privacy weaknesses in biometric sketches. In IEEE Symposium on Security and Privacy. 188--203."},{"key":"e_1_3_2_2_76_1","volume-title":"Natural image statistics and neural representation. Annual review of neuroscience","author":"Simoncelli E. P","year":"2001","unstructured":"E. P Simoncelli and B. A Olshausen . 2001. Natural image statistics and neural representation. Annual review of neuroscience , Vol. 24 , 1 ( 2001 ), 1193--1216. E. P Simoncelli and B. A Olshausen. 2001. Natural image statistics and neural representation. Annual review of neuroscience, Vol. 24, 1 (2001), 1193--1216."},{"volume-title":"ACM SIGSAC Conference on Computer and Communications Security. 1056--1067","author":"Sluganovic I.","key":"e_1_3_2_2_77_1","unstructured":"I. Sluganovic , M. Roeschlin , K. B Rasmussen , and I. Martinovic . 2016. Using reflexive eye movements for fast challenge-response authentication . In ACM SIGSAC Conference on Computer and Communications Security. 1056--1067 . I. Sluganovic, M. Roeschlin, K. B Rasmussen, and I. Martinovic. 2016. Using reflexive eye movements for fast challenge-response authentication. In ACM SIGSAC Conference on Computer and Communications Security. 1056--1067."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"crossref","unstructured":"D. Tang Z. Zhou Y. Zhang and K. Zhang. 2018. Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. NDSS (2018).  D. Tang Z. Zhou Y. Zhang and K. Zhang. 2018. Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. NDSS (2018).","DOI":"10.14722\/ndss.2018.23176"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"crossref","unstructured":"A. Teoh Y. W Kuan and S. Lee. 2008. Cancellable biometrics and annotations on biohash. Pattern recognition Vol. 41 6 (2008) 2034--2044.  A. Teoh Y. W Kuan and S. Lee. 2008. Cancellable biometrics and annotations on biohash. Pattern recognition Vol. 41 6 (2008) 2034--2044.","DOI":"10.1016\/j.patcog.2007.12.002"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"crossref","unstructured":"E. Uzun S. P Chung I. Essa and W. Lee. 2018. rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System. In NDSS.  E. Uzun S. P Chung I. Essa and W. Lee. 2018. rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System. In NDSS.","DOI":"10.14722\/ndss.2018.23253"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300381"},{"volume-title":"IEEE Conference on Computer Vision and Pattern Recognition. 529--534","author":"Wolf L.","key":"e_1_3_2_2_82_1","unstructured":"L. Wolf , T. Hassner , and I. Maoz . 2011. Face recognition in unconstrained videos with matched background similarity . In IEEE Conference on Computer Vision and Pattern Recognition. 529--534 . L. Wolf, T. Hassner, and I. Maoz. 2011. Face recognition in unconstrained videos with matched background similarity. In IEEE Conference on Computer Vision and Pattern Recognition. 529--534."},{"volume-title":"IEEE Intern. Symposium on Hardware Oriented Security and Trust.","author":"Zhang Y.","key":"e_1_3_2_2_83_1","unstructured":"Y. Zhang and F. Koushanfar . 2016. Robust privacy-preserving fingerprint authentication . In IEEE Intern. Symposium on Hardware Oriented Security and Trust. Y. Zhang and F. Koushanfar. 2016. Robust privacy-preserving fingerprint authentication. In IEEE Intern. Symposium on Hardware Oriented Security and Trust."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"crossref","unstructured":"B. Z. H. Zhao H. J. Asghar and M. A. Kaafar. 2020. On the Resilience of Biometric Authentication Systems against Random Inputs. NDSS (2020).  B. Z. H. Zhao H. J. Asghar and M. A. Kaafar. 2020. On the Resilience of Biometric Authentication Systems against Random Inputs. NDSS (2020).","DOI":"10.14722\/ndss.2020.24210"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0016-0032(98)00025-8"}],"event":{"name":"ASIA CCS '21: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Hong Kong","acronym":"ASIA CCS '21"},"container-title":["Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3437512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3437512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:11Z","timestamp":1750193291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3437512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":85,"alternative-id":["10.1145\/3433210.3437512","10.1145\/3433210"],"URL":"https:\/\/doi.org\/10.1145\/3433210.3437512","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}