Biometric cryptosystems: issues and challenges, Proceedings of the IEEE, vol.92, issue.6, pp.948-960, 2004. ,
DOI : 10.1109/JPROC.2004.827372
URL : http://biometrics.cse.msu.edu/Uludagetal_Cryptosystems_ProcIEEE04.pdf
Image understanding for iris biometrics: A survey, Computer Vision and Image Understanding, vol.110, issue.2, pp.281-307, 2008. ,
DOI : 10.1016/j.cviu.2007.08.005
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.4909
Combining Cryptography with Biometrics Effectively, IEEE Transactions on Computers, vol.55, issue.9, pp.1081-1088, 2006. ,
A Novel Cryptosystem Based on Iris Key Generation, 2008 Fourth International Conference on Natural Computation, pp.53-56, 2008. ,
DOI : 10.1109/ICNC.2008.808
Theoretical and Practical Boundaries of Binary Secure Sketches, IEEE Transactions on Information Forensics and Security, vol.3, issue.4, pp.673-683, 2008. ,
DOI : 10.1109/TIFS.2008.2002937
URL : https://hal.archives-ouvertes.fr/hal-00346970
On enabling secure applications through offline biometric identification, Proc. of IEEE, Symp. on Security and Privacy, pp.148-157, 1998. ,
DOI : 10.1109/secpri.1998.674831
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
Fuzzy extractors for continuous distributions, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, 2006. ,
DOI : 10.1145/1229285.1229325
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.2298
Systematic Construction of Iris-Based Fuzzy Commitment Schemes, Proceedings of the 3rd International Conference on Biometrics 2009 (ICB'09, pp.5558-947, 2009. ,
DOI : 10.1007/978-3-642-01793-3_95
Context-based texture analysis for secure revocable irisbiometric key generation, Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, ICDP '09, 2009. ,
DOI : 10.1049/ic.2009.0229
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.474
Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, 2007. ,
DOI : 10.1109/BTAS.2007.4401904
URL : https://hal.archives-ouvertes.fr/hal-00270547
Biometric hash based on statistical features of online signatures, Object recognition supported by user interaction for service robots, p.10123, 2002. ,
DOI : 10.1109/ICPR.2002.1044628
A secure biometric authentication scheme based on robust hashing, Proceedings of the 7th workshop on Multimedia and security , MM&Sec '05, pp.111-116, 2005. ,
DOI : 10.1145/1073170.1073191
An iris-based Interval-Mapping scheme for Biometric Key generation, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, 2009. ,
DOI : 10.1109/ISPA.2009.5297681
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.2866
How Iris Recognition Works, IEEE Trans. CSVT, vol.14, issue.1, pp.21-30, 2004. ,
DOI : 10.1016/b978-0-12-374457-9.00025-1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.570.8548
Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001. ,
DOI : 10.1147/sj.403.0614