Graphical Representations of E-Achievability Region for Identification and Secret-Key
Keywords:
Biometric identification system, Secret key, Rate-reliability, R environmentAbstract
In this paper we represent the computations of theoretical results, obtained in [1], on the example of binary symmetric channel. The computations and graphical representations are realized using the “Advanced Inftheo” module, created in 2015 [2, 3] for R environment.
References
M. Haroutunian, L. Ter-Vardanyan, “Investigation of E-achievability region for identification and secret-key generation system”, CSIT-2013 The 9th International Conference on Computer Science and Information Technologies (Dedicated to the 70th anniversary of the National Academy of Sciences of Armenia), Yerevan, Armenia, pp. 107-110 , 2013.
N. Pahlevanyan and M. Haroutunian, "Technical solutions of developing Advanced Inftheo new module for R," CSIT-2015 The 10th International Conference on Computer Science and Information Technologies, Yerevan, Armenia, pp. 306-309, 2015.
N. Pahlevanyan and M. Haroutunian, "Results of performance analysis of Advanced Inftheo new package for R," Transactions of IIAP of NAS of RA, Mathematical Problems of Computer Science, vol. 45, pp. 5-13, 2016.
T. Ignatenko and F. M. Willems, "Biometric security from an information-theoretical perspective," Foundations and Trends in Communications and Information Theory, vol. 7, no. 2-3, pp. 135-316, 2012.
E. A. Haroutunian, M. E. Haroutunian and A. N. Harutyunyan, "Reliability criteria in information theory and in statistical hypothesis testing," Foundations and Trends in Communications and Information Theory, vol. 4, no. 23, pp. 97–263, 2008.
E. Haroutunian, "On bounds for E - capacity of DMC," IEEE Transactions on Information Theory, vol. 53, no. 11, pp. 4210–4220, 2007.
M. Haroutunian, A. Muradyan and L. Ter- Vardanyan, “On the E-capacity of a biometric identification system”, CSIT-2011 The 8th International Conference on Computer Science and Information Technologies, Yerevan, Armenia, pp. 132-134, 2011.
M. E. Haroutunian, A. Muradyan and L. Ter-Vardanyan, "Upper and lower bounds of biometric identification E-capacity", Transactions of IIAP of NAS RA, Mathematical Problems of Computer Science, vol. 36, pp .1-10, 2012.
M. Haroutunian and N. Pahlevanyan "Information theoretical analysis of biometric secret key sharing model," Transactions of IIAP of NAS RA, Mathematical Problems of Computer Science, vol. 42, pp. 17-27, 2014.
M. Haroutunian and L. Ter-Vardanyan, “Rate-reliability for protected biometric identification system with secret generation”, From Information Age to Big Data Era, Yerevan, Armenia, pp. 54-68, 2016.
T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd Edition, New York, NY, USA: Wiley-Interscience, 2006.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.