Security: An Overview. In Proceedings of
International Conference on Electronics (Vol. 65).
Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K.,
2004. Biometric cryptosystems: issues and challenges.
Proceedings of the IEEE, 92(6), 948-960.
Juels, A., & Wattenberg, M., 1999. A fuzzy commitment
scheme. In Proceedings of the 6th ACM conference on
Computer and communications security (pp. 28-36).
ACM.
Draper, S. C., Khisti, A., Martinian, E., Vetro, A., &
Yedidia, J. S., 2007. Using distributed source coding
to secure fingerprint biometrics. In Acoustics, Speech
and Signal Processing, 2007. ICASSP 2007. IEEE
International Conference on (Vol. 2, pp. II-129).
IEEE.
Juels, A., & Sudan, M., 2006. A fuzzy vault scheme.
Designs, Codes and Cryptography, 38(2), 237-257.
Tuyls, P., Akkermans, A. H., Kevenaar, T. A., Schrijen, G.
J., Bazen, A. M., & Veldhuis, R. N., 2005. Practical
biometric authentication with template protection. In
Audio-and Video-Based Biometric Person
Authentication (pp. 436-446). Springer Berlin
Heidelberg.
Dodis, Y., Reyzin, L., & Smith, A., 2004. Fuzzy
extractors: How to generate strong keys from
biometrics and other noisy data. In Advances in
cryptology-Eurocrypt 2004 (pp. 523-540). Springer
Berlin Heidelberg.
Verbitskiy, E., Tuyls, P., Obi, C., & Schoenmakers, B.,
2010. Key extraction from general nondiscrete signals.
Information Forensics and Security, IEEE
Transactions on, 5(2), 269-279.
Li, S. Z., 2009. Encyclopedia of Biometrics: I-Z (Vol. 1).
Springer Science & Business Media.
Rathgeb, C., & Uhl, A., 2010. Adaptive fuzzy
commitment scheme based on iris-code error analysis.
In Visual Information Processing (EUVIP), 2010 2nd
European Workshop on (pp. 41-44). IEEE.
Jain, A. K., Nandakumar, K., & Nagar, A. (2008).
Biometric template security. EURASIP Journal on
Advances in Signal Processing, 2008, 113.
Campisi, P., 2013. Security and Privacy in Biometrics.
London: Springer.
Chen, H., & Chen, H., 2010. A hybrid scheme for securing
fingerprint templates. International Journal of
Information Security, 9(5), 353-361.
Ghany, K. K., Hefny, H. A., Hassanien, A. E., & Ghali,
N., 2012. A Hybrid approach for biometric template
security. In Advances in Social Networks Analysis and
Mining (ASONAM), 2012 IEEE/ACM International
Conference on (pp. 941-942). IEEE.
Liu, H., Sun, D., Xiong, K., & Qiu, Z., 2014. A hybrid
approach to protect palmprint templates. The Scientific
World Journal, 2014.
Feng, Y. C., Yuen, P. C., & Jain, A. K., 2008. A hybrid
approach for face template protection. In SPIE
Defense and Security Symposium (pp. 694408-
694408). International Society for Optics and
Photonics.
Rathgeb, C., & Uhl, A., 2011. A survey on biometric
cryptosystems and cancelable biometrics. EURASIP
Journal on Information Security, 2011(1), 1-25.
Savvides, M., Kumar, B. V. K. V., & Khosla, P. K., 2004.
Cancelable biometric filters for face recognition. In
Pattern Recognition, 2004. ICPR 2004. Proceedings
of the 17th International Conference on (Vol. 3, pp.
922-925). IEEE.
Nagar, A., Nandakumar, K., & Jain, A. K., 2010. A hybrid
biometric cryptosystem for securing fingerprint
minutiae templates. Pattern Recognition Letters,
31(8), 733-741.
Nandakumar, K., Nagar, A., & Jain, A. K., 2007.
Hardening fingerprint fuzzy vault using password. In
Advances in biometrics (pp. 927-937). Springer Berlin
Heidelberg.
Mirmohamadsadeghi, L., & Drygajlo, A., 2013. A
template privacy protection scheme for fingerprint
minutiae descriptors. In Biometrics Special Interest
Group (BIOSIG), 2013 International Conference of
the (pp. 1-8). IEEE.
Bringer, J., Chabanne, H., & Kindarji, B., 2008. The best
of both worlds: Applying secure sketches to
cancelable biometrics. Science of Computer
Programming, 74(1), 43-51.
Lalithamani, N., & Soman, K., 2009. An effective scheme
for generating irrevocable cryptographic key from
cancelable fingerprint templates. Int. J. Comput. Sci.
Netw. Secur, 9(3), 183-193.
Valencia, V. S., 2003. Biometric Testing: It’s Not as Easy
as You Think’. In Biometric Consortium Conference.
Maio, D., Maltoni, D., Cappelli, R., Wayman, J. L., &
Jain, A. K., 2002. FVC2002: Second fingerprint
verification competition. In Pattern recognition, 2002.
Proceedings. 16th international conference on (Vol. 3,
pp. 811-814). IEEE.
Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana,
D., & Scotti, F., 2004. Accuracy and performance of
biometric systems. In Instrumentation and
Measurement Technology Conference, 2004. IMTC
04. Proceedings of the 21st IEEE (Vol. 1, pp. 510-
515). IEEE.