Embedding renewable cryptographic keys into noisy data.
Ileana BuhanJeroen DoumenPieter H. HartelQiang TangRaymond N. J. VeldhuisPublished in: Int. J. Inf. Sec. (2010)
Keyphrases
- noisy data
- hash functions
- noise tolerant
- smart card
- high dimensional
- learning from noisy data
- missing data
- secret key
- noise free
- vector space
- intrinsic dimensionality
- input data
- wireless sensor networks
- training data
- data mining
- watermarking algorithm
- key management
- security protocols
- digital signature
- security properties
- neural network