We propose a metric of information gained through biometric matching systems. Firstly, we discuss how the information about the identity of a person is derived from biometric samples through a… (More)
The presence of natural estrogens, 17beta-estradiol (E2), estrone (E1) and estriol (E3), as well as estrogenic activity in wastewater influents and secondary effluents were investigated in 20… (More)
Biometric identification has lately attracted attention because of its high convenience; it does not require a user to enter a user ID. The identification accuracy, however, degrades as the number of… (More)
Claimants and enrollees who have high similarity scores against many others are referred to as wolves and lambs, respectively. These animals can cause false accepts against many others and compromise… (More)
Recent studies have proposed various attacks against location privacy using a Markov Chain transition matrix trained for each user. However, when a user has disclosed only a small amount of location… (More)
In this paper, we introduce a new concept that we call fuzzy signature, which is a signature scheme that uses a noisy string such as biometric data as a private key, but does not require auxiliary… (More)
The removal and degradation characteristics of natural and synthetic estrogens by activated sludge were investigated by a series of batch experiments using the activated sludge samples of four actual… (More)
We propose a measure of information gained through biometric matching systems. Firstly, we discuss how the information about the identity of a person is derived from biometric samples through a… (More)
It is known that various types of location privacy attacks can be carried out using a personalized transition matrix that is learned for each target user, or a population transition matrix that is… (More)