U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, Biometric cryptosystems: issues and challenges, Proceedings of the IEEE, vol.92, issue.6, pp.948-960, 2004.
DOI : 10.1109/JPROC.2004.827372

URL : http://biometrics.cse.msu.edu/Uludagetal_Cryptosystems_ProcIEEE04.pdf

K. Bowyer, K. Hollingsworth, and P. Flynn, Image understanding for iris biometrics: A survey, Computer Vision and Image Understanding, vol.110, issue.2, pp.281-307, 2008.
DOI : 10.1016/j.cviu.2007.08.005

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Hao, R. Anderson, and J. Daugman, Combining Cryptography with Biometrics Effectively, IEEE Transactions on Computers, vol.55, issue.9, pp.1081-1088, 2006.

X. Wu, N. Qi, K. Wang, and D. Zhang, A Novel Cryptosystem Based on Iris Key Generation, 2008 Fourth International Conference on Natural Computation, pp.53-56, 2008.
DOI : 10.1109/ICNC.2008.808

J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, Theoretical and Practical Boundaries of Binary Secure Sketches, IEEE Transactions on Information Forensics and Security, vol.3, issue.4, pp.673-683, 2008.
DOI : 10.1109/TIFS.2008.2002937

URL : https://hal.archives-ouvertes.fr/hal-00346970

G. Davida, Y. Frankel, and B. Matt, On enabling secure applications through offline biometric identification, Proc. of IEEE, Symp. on Security and Privacy, pp.148-157, 1998.
DOI : 10.1109/secpri.1998.674831

A. Juels and M. Wattenberg, A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999.
DOI : 10.1145/319709.319714

I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. Veldhuis, Fuzzy extractors for continuous distributions, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, 2006.
DOI : 10.1145/1229285.1229325

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Rathgeb and A. Uhl, Systematic Construction of Iris-Based Fuzzy Commitment Schemes, Proceedings of the 3rd International Conference on Biometrics 2009 (ICB'09, pp.5558-947, 2009.
DOI : 10.1007/978-3-642-01793-3_95

C. Rathgeb and A. Uhl, Context-based texture analysis for secure revocable irisbiometric key generation, Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, ICDP '09, 2009.
DOI : 10.1049/ic.2009.0229

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, 2007.
DOI : 10.1109/BTAS.2007.4401904

URL : https://hal.archives-ouvertes.fr/hal-00270547

C. Vielhauer, R. Steinmetz, and A. Mayerhöfer, Biometric hash based on statistical features of online signatures, Object recognition supported by user interaction for service robots, p.10123, 2002.
DOI : 10.1109/ICPR.2002.1044628

Y. Sutcu, H. T. Sencar, and N. Memon, A secure biometric authentication scheme based on robust hashing, Proceedings of the 7th workshop on Multimedia and security , MM&Sec '05, pp.111-116, 2005.
DOI : 10.1145/1073170.1073191

C. Rathgeb and A. Uhl, An iris-based Interval-Mapping scheme for Biometric Key generation, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, 2009.
DOI : 10.1109/ISPA.2009.5297681

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Daugman, How Iris Recognition Works, IEEE Trans. CSVT, vol.14, issue.1, pp.21-30, 2004.
DOI : 10.1016/b978-0-12-374457-9.00025-1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

N. K. Ratha, J. H. Connell, and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001.
DOI : 10.1147/sj.403.0614