2012
DOI: 10.1007/s13389-012-0041-3
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and experimental evaluation of image-based PUFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(30 citation statements)
references
References 41 publications
0
30
0
Order By: Relevance
“…Aiming to amend the detrimental effects of experimental noise and generate time invariant binary strings, the raw output of the PUF is processed through fuzzy extractor techniques 46 combined with hashing approaches, like the random binary method 47 or the Gabor binary method 48 . These methodologies have been integrated in a general security framework that encompasses a holistic security analysis 37 . Figure 3b,c demonstrate a brief overview of the process that allows the generation of the binary strings (code-word) and the corresponding helper data (error correction bits).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Aiming to amend the detrimental effects of experimental noise and generate time invariant binary strings, the raw output of the PUF is processed through fuzzy extractor techniques 46 combined with hashing approaches, like the random binary method 47 or the Gabor binary method 48 . These methodologies have been integrated in a general security framework that encompasses a holistic security analysis 37 . Figure 3b,c demonstrate a brief overview of the process that allows the generation of the binary strings (code-word) and the corresponding helper data (error correction bits).…”
Section: Methodsmentioning
confidence: 99%
“…1d ). The corresponding existing schemes, employ transparent tokens containing randomly micro-structures 1 , 36 , laser-engraved samples 37 , or sheets of regular paper 38 . Their security is based on the complexity of the underlying physical mechanism where a modelling attack would require the division of the token into wavelength sized voxels and solving Maxwell’s equations for each possible arrangement 36 .…”
Section: Introductionmentioning
confidence: 99%
“…Their recovery is achieved through a Fuzzy Extractor scheme [4,5]. The Fuzzy extractor scheme essentially maps every hashed response to a unique bit-string output and it is comprised of two phases; the enrollment and the verification phase.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the tremendous improvement on the time performance, once again, this improvement may not suffice in a real-world system. Other time improvements may include parallelization of the software application and/or reducing the image to hash codes [22,55,56]. Comparing with other state-of-the-art works, Takahashi et al [12] measured a time of 0.827 s to perform 1 vs. 1 comparison, while Wigger et al [15] reported a time to perform 1 vs. 1 comparison (The authors state that: "in the present case of 115 PCB parts, the identification process for one part takes 1.11 s", so we are assuming that is the time needed to perform 115 comparisons (the identification process does not stop after finding a correct correspondence).…”
Section: Discussionmentioning
confidence: 99%
“…Since the appearance of the PUFs in 2001, several object types were proposed as candidates to PUF systems, such as Optical PUFs [19,20], Image-based PUFs [21,22], Coating PUFs [23,24], Silicon PUFs [25], SRAM (Static Random Access Memory) PUFs [26][27][28][29], Paper PUFs [8,30], Arbiter PUFs [31], Reconfigurable PUFs [32], Ring Oscillator Pufs [33,34], RFID (Radio-Frequency Identification) PUFs [35], among others. This work focuses on image-based PUFs because as the authors are interested in its scope.…”
mentioning
confidence: 99%