
This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to satisfy is disjunctiveness. For an unauthorized user multi-secret form of fuzzy vault is identical as standard one. During revealing, depending on used key, corresponding secret is decoded. Described concept is suitable for using with biometrics. It can also work in cooperation with false steganography where every biometric trait encodes different steganographic key.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 7 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
