[1]
Jain AK, Ross A, Prabhakar S. An introduction to biometric recognition. IEEE Trans Syst Technol 2004; 14: 4-20.
[2]
Ratha NK. Privacy protection in high security biometrics applications. Ethics and Policy of Biometrics, Lecture Notes in Computer Science,. A. Kumar and D. Zhang, Eds. Springer Berlin Heidelberg 2010; 6005: pp. 62-9.
[3]
Ratha NK, Connell JH, Bolle RM. An analysis of minutiae matching strength. Proceedings of the third international conference on audio- and video-based biometric person authentication. 2001; 11: 233-8.
[4]
Jain AK, Nandakumar K, Nagar A. Biometric template security. EURASIP 2008; 2008: 1-17.
[5]
Juels A, Sudan M. A fuzzy vault scheme.Proceedings of the IEEE International Symposium on Information Theory 2002. 408.
[6]
Yanikoglu B, Kholmatov A. Combining multiple biometrics to protect privacy. Proceedings of ICPRBCTP Workshop. Cambridge, England. August 2004.
[7]
Ang R, Safavi-Naini R, McAven L. Cancelable key-based fingerprint templates. Proceedings of 10th Australian Conference on Information security and Privacy Info Sec Priv 2005; 3574: 242-52.
[8]
Ratha NK, Chikkerur S, Connell JH, Bolle R. Generating cancelable fingerprint templates. IEEE Trans Analysis Intell 2007; 29(4): 561-72.
[9]
Maiorana E, Martinez-Diaz M, Campisi P, Ortega-Garcia J, Neri A. Template protection for HMM-based on-line signature authentication. Proc IEEE Conf Comp Recog 2008 2008; 1-6.
[10]
Jinyu Z, Ratha N, Connell J. Cancelable iris biometric. Proceedings of the 19th International IAPR Conference on Pattern Recognition (ICPR) 2008; 1-4.
[11]
Feng YC, Yuen PC, Jain AK. A hybrid approach for face template protection. Proceedings of SPIE Conference on Biometric Technology for Human Identification 2008; 6944 Orlando, FL, USA
[12]
Suzwani I, Fakariah HA, Syed AA. A new hybrid approach for securing multibiometric templates based on cancelable and fuzzy commitment scheme. Aust J Basic Appl Sci 2015; 9(26): 72-6.
[13]
Padma PP, Marina G. Cancelable biometrics: securing biometric face template. IJAIT 2012; 4(1): 25-34.
[14]
Baca M, Antonic M, Franjo M. Upgrading existing biometric security systems by implementing the concept of cancelable biometrics. Proceedings of Central European Conference on Information & Intelligent Systems 2008.
[15]
Ratha N, Connell J, Bolle R. Enhancing security and privacy in biometrics-based authentication systems. IBM J Syst 2001; 40: 614-34.
[16]
Maltoni D, Maio D, Jain AK, Prabhakar S. In: handbook of fingerprint recognition. Springer, Berlin, Germany 2003.
[17]
Breebaart J, Yang B, Buhan-Dulman I, Busch C. Biometric template protection: the need for open standards. J Private Secur 2009; 5(2009): 299-304.
[18]
Andy Adler Biometric system security. In: Handbook of Biometrics. Springer 2007.
[19]
Illingworth J, Kittler J. A survey of the hough transform. Computer Vision, Graphics, and Image Processing 1988; 44(1): 87-116.
[20]
Daugman J. How iris recognition works. IEEE Trans Circuit Syst Technol 2004; 14(1): 21-30.
[21]
Anap MB, Vikhe PS. Iris recognition system using 2D log-gabor filter. Int J Adv Eng 2012; 1(2): 59-62.
[22]
Daugman J. Statistical richness of visual phase information: update on recognizing persons by iris patterns. Int J Comput Vision 2001; 45(1): 25-38.