{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T04:59:01Z","timestamp":1667451541173},"reference-count":13,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2021,1,1]]},"DOI":"10.1587\/transfun.2020eap0001","type":"journal-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:10:58Z","timestamp":1594678258000},"page":"283-294","source":"Crossref","is-referenced-by-count":1,"title":["Fundamental Limits of Biometric Identification System Under Noisy Enrollment"],"prefix":"10.1587","volume":"E104.A","author":[{"given":"Vamoua","family":"YACHONGKA","sequence":"first","affiliation":[{"name":"Department of Communication Engineering and Informatics, University of Electro-Communications"}]},{"given":"Hideki","family":"YAGI","sequence":"additional","affiliation":[{"name":"Department of Communication Engineering and Informatics, University of Electro-Communications"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] J.A. O&apos;Sullivan and N.A. Schmid, \u201cLarge deviations performance analysis for biometrics recognition,\u201d Proc. 40th Annual Allerton Conf. on Communication, Control, and Computing, pp.1-19, Allerton House, IL, USA, Oct. 2002."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] F. Willems, T. Kalker, S. Baggen, and J.P. Linnartz, \u201cOn the capacity of a biometric identification system,\u201d Proc. IEEE Int. Symp. Inf. Theory, p.82, Yokohama, Japan, June\/July 2003. 10.1109\/isit.2003.1228096","DOI":"10.1109\/ISIT.2003.1228096"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] E. Tuncel, \u201cCapacity\/storage tradeoff in high-dimensional identification systems,\u201d IEEE Trans. Inf. Theory, vol.55, no.5, pp.2097-2016, May 2009. 10.1109\/tit.2009.2016057","DOI":"10.1109\/TIT.2009.2016057"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] T. Ignatenko and F. Willems, \u201cFundamental limits for privacy-preserving biometric identification system that support authentication,\u201d IEEE Trans. Inf. Theory, vol.61, no.10, pp.5583-5594, Oct. 2015. 10.1109\/tit.2015.2458961","DOI":"10.1109\/TIT.2015.2458961"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] T. Ignatenko and F. Willems, \u201cBiometric systems: Privacy and secrecy aspects,\u201d IEEE Trans. Inf. Forensics Security, vol.4, no.4, pp.956-973, Dec. 2009. 10.1109\/tifs.2009.2033228","DOI":"10.1109\/TIFS.2009.2033228"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] O. G\u00fcnl\u00fc and G. Kramer, \u201cPrivacy, secrecy, and storage with multiple noisy measurements of identifiers,\u201d IEEE Trans. Inf. Forensics Security, vol.13, no.11, pp.2872-2883, Nov. 2018. 10.1109\/tifs.2018.2834303","DOI":"10.1109\/TIFS.2018.2834303"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] M. Koide and H. Yamamoto, \u201cCoding theorems for biometric systems,\u201d Proc. IEEE Int. Symp. Inf. Theory, pp.2647-2651, Texas, USA, June 2010. 10.1109\/isit.2010.5513689","DOI":"10.1109\/ISIT.2010.5513689"},{"key":"8","unstructured":"[8] V. Yachongka and H. Yagi, \u201cFundamental trade-off among identification, secrecy and template rates in identification system,\u201d Proc. 2018 Int. Symp. on Inf. Theory and Its Appl., p.507, Singapore, Oct. 2018."},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] V. Yachongka and H. Yagi, \u201cFundamental tradeoff among identification, secrecy and compression rates in biometric identification system,\u201d J. Signal Processing, vol.22, no.6, pp.337-342, Nov. 2018. 10.2299\/jsp.22.337","DOI":"10.2299\/jsp.22.337"},{"key":"10","unstructured":"[10] T.M. Cover and J.A. Thomas, Elements of Information Theory, 2nd ed., John Wiley &amp; Sons, New Jersy, 2006."},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] K. Kittichokechai and G. Caire, \u201cSecret key-based identification and authentication with a privacy constraint,\u201d IEEE Trans. Inf. Theory, vol.62, no.11, pp.6189-6203, Nov. 2016. 10.1109\/tit.2016.2609401","DOI":"10.1109\/TIT.2016.2609401"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[13] K. Kittichokechai, T.J. Oechtering, M. Skoglund, and Y.-K. Chia, \u201cSecure source coding with action-dependent side information,\u201d IEEE Trans. Inf. Theory, vol.61, no.12, pp.6444-6464, Dec. 2015. 10.1109\/tit.2015.2487448","DOI":"10.1109\/TIT.2015.2487448"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[14] M. Bloch and J. Barros, Physical-Layer Security, Cambridge Univ. Press, Cambridge, U.K., 2011. 10.1017\/cbo9780511977985","DOI":"10.1017\/CBO9780511977985"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E104.A\/1\/E104.A_2020EAP0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T16:49:14Z","timestamp":1667407754000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E104.A\/1\/E104.A_2020EAP0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2020eap0001","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}