• Publications
  • Influence
GSHADE: faster privacy-preserving distance computation and biometric identification
TLDR
We introduce a generalization of the SHADE protocol, called GSHADE, that enables privacy-preserving computation of several distance metrics, including (normalized) Hamming distance, Euclidean distance, Mahalanobis distance, and scalar product. Expand
  • 62
  • 7
  • PDF
Faster secure computation for biometric identification using filtering
TLDR
We propose a new construction for biometric identification based on filtering techniques that has the same security properties as the other SMC-based schemes but runs significantly faster while keeping good biometric performances. Expand
  • 24
  • 2
  • PDF
Fuzzy Vault for Multiple Users
TLDR
We introduce an extension of the Fuzzy Vault scheme to support multiple users. Expand
  • 6
  • 1
Interactive measurement and characterization of DNA molecules by analysis of AFM images
In the past few years, computer‐based analysis of atomic‐force microscopic images has acquired increasing importance for studying biomolecules such as DNA. On the one hand, fully automated methods doExpand
  • 40
Balancing is the key: Performing finger vein template protection using fuzzy commitment
TLDR
We propose a novel vein extraction technique adapted to template protection and use it to apply a fuzzy commitment scheme to finger vein biometrics. Expand
  • 7
  • PDF
Fuzzy vault and template-level fusion applied to a binary fingerprint representation
TLDR
In this paper, we apply the fuzzy vault scheme to a transformation-invariant binary fingerprint representation. Expand
  • 5
  • PDF
Adding localization information in a fingerprint binary feature vector representation
TLDR
A new framework to transform a fingerprint minutiae template into a binary feature vector of fixed length is described. Expand
  • 8
Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures
TLDR
We extend further a recent work on the vulnerability analysis of an embedded hardware verification module (matcher) against Side Channel Analysis (SCA) techniques, by introducing a new SCA strategy. Expand
  • 5
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
TLDR
We study in this work the potential side channel leakages of a hardware biometric comparison system that has been designed for fingerprints. Expand
  • 6
  • PDF
[Quality assessment of the medical information on the standardized discharge summary].
BACKGROUND DRG-based management of public hospitals in France involves the use of standardised discharge abstracts for the "Medicalisation of Information Systems Program". METHODS To assess theExpand
  • 11