
Gernot, T. and Lacharme, P. (2022). Biometric masterkeys.
Computers & Security.
Goldberger, A. L., Amaral, L. A., Glass, L., Hausdorff,
J. M., Ivanov, P. C., Mark, R. G., Mietus, J. E., Moody,
G. B., Peng, C. K., and Stanley, H. E. (2000). Phys-
iobank, physiotoolkit, and physionet : Components of
a new research resource for complex physiologic sig-
nals.
Huang, G. B., Mattar, M., Berg, T., and Learned-Miller,
E. (2008). Labeled faces in the wild: A database
for studying face recognition in unconstrained envi-
ronments. in Workshop on faces in’Real-Life’Images:
detection, alignment, and recognition.
Juels, A. and Sudan, M. (2002). A fuzzy vault scheme.
Proceedings IEEE International Symposium on Infor-
mation Theory.
Khalil-Hani, M., Marsono, M. N., and Bakhteri, R. (2013).
Biometric encryption based on a fuzzy vault scheme
with a fast chaff generation algorithm. Future Gener-
ation Computer Systems.
Lee, Y. J., Park, K. R., Lee, S. J., Bae, K., and Kim, J.
(2008). A new method for generating an invariant iris
private key based on the fuzzy vault system. IEEE
Transactions on Systems Man and Cybernetics Part B
(Cybernetics).
Maio, D., Maltonil, D., Cappelli, R., Wayman, J., and Jain,
A. (2002). Fvc2002: Second fingerprint verification
competition. Proceedings of the 16th International
Conference on Pattern Recognition (ICPR).
Makowski, D., Pham, T., Lau, Z., and Brammer,
J. (2021). Neurokit2 : The python tool-
box for neurophysiological signal processing.
https://github.com/neuropsychology/NeuroKit.
Martinez, J., Almeida, R., Olmos, S., Rocha, A., and La-
guna, P. (2004). A wavelet-based ecg delineator : eval-
uation on standard databases. IEEE Transactions on
Biomedical Engineering, 51(4) :570–581. 28.
Merkle, J., Niesing, M., Schwaiger, M., Ihmor, H., and Ko-
rte, U. (2010). Security capacity of the fuzzy finger-
print vault. International Journal on Advances in Se-
curity.
Nagar, A., Nandakumar, K., and Jain, A. K. (2008). Secur-
ing fingerprint template: Fuzzy vault with minutiae
descriptors. 19th International Conference on Pattern
Recognition.
Nandakumar, K., Jain, A. K., and Pankanti, S. (2007a).
Fingerprint-based fuzzy vault: Implementation and
performance. IEEE Transactions on Information
Forensics and Security.
Nandakumar, K., Nagar, A., and Jain, A. K. (2007b). Hard-
ening fingerprint fuzzy vault using password. Ad-
vances in Biometrics International Conference ICB.
Poon, H. T. and Miri, A. (2012). On efficient decoding for
the fuzzy vault scheme. 11th International Conference
on Information Science, Signal Processing and their
Applications (ISSPA).
Radha, N., Karthikeyan, S., and P.Anupriya (2010). Se-
curing retina fuzzy vault system using soft biometrics.
Global Journal of Computer Science and Technology.
Rathgeb, C., Tams, B., Merkle, J., Nesterowicz, V., Korte,
U., and Neu, M. (2023). Multi-biometric fuzzy vault
based on face and fingerprints. Computer Science.
Rathgeb, C., Tams, B., Wagner, J., and Busch, C. (2016).
Unlinkable improved multi-biometric iris fuzzy vault.
EURASIP Journal on Information Security.
Reddy, E. S. and Babu, I. R. (2008). Performance of iris
based hard fuzzy vault. IEEE International Confer-
ence on Computer and Information Technology Work-
shops CIT, 8.
Rice, J. A. (2006). Mathematical statistics and data analysis.
Duxbury Press.
Sharma, A., Raghuwanshi, A., and Sharma, V. (2015). Bio-
metric system-a review. Int. J.Comput. Sci. Inf. Tech-
nol.
Simonoff, J. (2012). Smoothing methods in statistics.
Springer Science & Business Media.
Uludag, U., Pankanti, S., and Jain, A. K. (2005). Fuzzy
vault for fingerprints. Audio- and Video-Based Bio-
metric Person Authentication.
Uludag, U., Pankanti, S., Prabhakar, S., , and Jain, A. K.
(2004). Biometric cryptosystems: issues and chal-
lenges. Proceedings of the IEEE, 92(6):948–960.
Velciu, M.-A., P
˘
atrascu, A., and Patriciu, V.-V. (2015). An
evaluation of the reed-solomon error-correcting codes
usage for bio-cryptographic algorithms. 10th Jubilee
IEEE International Symposium on Applied Computa-
tional Intelligence and Informatics.
V.S.Meenakshi and Padmavathi, D. G. (2010). Retina and
iris based multimodal biometric fuzzy vault. Interna-
tional Journal of Computer Applications.
You, L. and Wang, T. (2018). A novel fuzzy vault scheme
based on fingerprint and finger vein feature fusion.
Soft Computing.
Zheng, A. and Casari, A. (2018). Feature engineering for
machine learning: Principles and techniques for data
scientists. O’Reilly Media.
Fuzzy Vault Security Enhancement Avoid Statistical Biases
51