A survey on ear biometrics, ACM Computing Surveys, vol.45, issue.2, p.22, 2013. ,
DOI : 10.1145/2431211.2431221
Cancelable templates for sequence-based biometrics with application to on-line signature recognition. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, issue.3, pp.40525-538, 2010. ,
Achieving non-transferability in credential systems using hidden biometrics, Security and Communication Networks, pp.195-206, 2011. ,
DOI : 10.1002/sec.136
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008. ,
DOI : 10.1137/060651380
URL : http://arxiv.org/abs/cs/0602007
Multibiometric cryptosystems based on feature-level fusion. Information Forensics and Security, IEEE Transactions on, vol.7, issue.1, pp.255-268, 2012. ,
DOI : 10.1109/tifs.2011.2166545
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.8698
Multimodal biometrics: Weighted score level fusion based on non-ideal iris and face images, Expert Systems with Applications, vol.41, issue.11, pp.415390-5404, 2014. ,
DOI : 10.1016/j.eswa.2014.02.051
Combining crypto with biometrics effectively . Computers, IEEE Transactions on, vol.55, issue.9, pp.1081-1088, 2006. ,
Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, p.113, 2008. ,
DOI : 10.1109/TIFS.2007.908165
Multi-biometric template protection: Issues and challenges . New Trends and Developments in Biometrics, pp.173-190, 2012. ,
DOI : 10.5772/52152
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.656.391
Biometric template protection using universal background models: An application to online signature. Information Forensics and Security, IEEE Transactions on, vol.7, issue.1, pp.269-282, 2012. ,
Security performance evaluation for biometric template protection techniques, International Journal of Biometrics, vol.5, issue.1, pp.53-72, 2013. ,
DOI : 10.1504/IJBM.2013.050733
Security and privacy challenges with biometric solutions, LSEC Biometrics, 2011. ,
Finger Multi-biometric Cryptosystem using Feature-Level Fusion, International Journal of Signal Processing, Image Processing and Pattern Recognition, vol.7, issue.3, 2014. ,
DOI : 10.14257/ijsip.2014.7.3.18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.639.2249
Secure and Privacy Enhanced Gait Authentication on Smart Phone, The Scientific World Journal, vol.8, issue.3, 2014. ,
DOI : 10.1109/TC.2006.138
URL : http://doi.org/10.1155/2014/438254
Finger multibiometric cryptosystems: fusion strategy and template security, Journal of Electronic Imaging, vol.23, issue.2, pp.23001-023001, 2014. ,
DOI : 10.1117/1.JEI.23.2.023001
Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion, Information Fusion, vol.18, pp.161-174, 2014. ,
DOI : 10.1016/j.inffus.2013.09.001
Biometric cryptosystem using function based on-line signature recognition, Expert Systems with Applications, vol.37, issue.4, pp.3454-3461, 2010. ,
DOI : 10.1016/j.eswa.2009.10.043
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends, IEEE Signal Processing Magazine, vol.30, issue.2, pp.42-52, 2013. ,
DOI : 10.1109/MSP.2012.2230218
A survey on biometric cryptosystems and cancelable biometrics, EURASIP Journal on Information Security, vol.2011, issue.1, pp.1-25, 2011. ,
DOI : 10.1109/TIFS.2006.873653
Predictive models for multibiometric systems, Pattern Recognition, 2014. ,
A framework for analyzing template security and privacy in biometric authentication systems. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.833-841, 2012. ,
Privacy by design solutions for biometric one-tomany identification systems, 2014. ,
Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters, Computers & Security, vol.42, pp.1-12, 2014. ,
DOI : 10.1016/j.cose.2013.12.005
Biometric encryption, Encyclopedia of Cryptography and Security, pp.90-98, 2011. ,
DOI : 10.1016/s0969-4765(07)70084-x
Secure Sketches for Protecting Biometric Templates, Security and Privacy in Biometrics, pp.69-104, 2013. ,
DOI : 10.1007/978-1-4471-5230-9_4
Biometric template protection. Datenschutz und Datensicherheit-DuD, pp.299-304, 2009. ,
Practical Biometric Authentication with Template Protection, Audio-and Video-Based Biometric Person Authentication, pp.436-446, 2005. ,
DOI : 10.1007/11527923_45
URL : http://doc.utwente.nl/63477/1/4n9f1vpwmm6aqdt0.pdf
Editorial: Special Issue on ???Security and Multimodality in Pervasive Environments???, Wireless Personal Communications, vol.55, issue.1, pp.1-4, 2010. ,
DOI : 10.1007/s11277-009-9790-4
Privacy Protection of Biometric Templates, HCI International 2014-Posters' Extended Abstracts, pp.153-158, 2014. ,
DOI : 10.1007/978-3-319-07857-1_27
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system, Signal, Image and Video Processing, pp.1-11, 2014. ,
DOI : 10.1007/s11760-014-0663-2
Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area, Privacy Technologies and Policy, pp.172-190, 2014. ,
DOI : 10.1007/978-3-319-06749-0_12
Fusion of face and iris biometrics, Handbook of Iris Recognition, pp.219-237, 2013. ,
Impact of some biometric modalities on forensic science, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, pp.47-62, 2014. ,
Security and Privacy in Biometrics, 2013. ,
DOI : 10.1007/978-1-4471-5230-9
Iris Segmentation for Challenging Periocular Images, Burge andBowyer, pp.281-308 ,
DOI : 10.1007/978-1-4471-6784-6_13
Handbook of Iris Recognition Advances in Computer Vision and Pattern Recognition, 2013. ,
Handbook of multibiometrics, 2006. ,
Palmprint identification using feature-level fusion, Pattern Recognition, vol.39, issue.3, pp.478-487, 2006. ,
DOI : 10.1016/j.patcog.2005.08.014
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.2201
Secure and privacyfriendly logging for egovernment services, Availability, Reliability and Security ARES 08. Third International Conference on, pp.1091-1096, 2008. ,
DOI : 10.1109/ares.2008.41
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.580.9724
Security and Privacy Issues in E-passports, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), pp.74-88, 2005. ,
DOI : 10.1109/SECURECOMM.2005.59
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.544.9714
Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source, Biometric Technology for Human Identification VII, pp.76670-76670, 2010. ,
DOI : 10.1117/12.850240
URL : http://doc.utwente.nl/74579/1/Kelkboom10_Analytical_template_protection_performance_and_maximum_key_size_given_a_Gaussian-modeled_biometric_source.pdf
Reliability-balanced feature level fusion for fuzzy commitment scheme, Biometrics (IJCB), 2011 International Joint Conference on, pp.1-7, 2011. ,
Multimodal biometric systems: Study to improve accuracy and performance, 2014. ,
Multibiometric Template Security Using Fuzzy Vault, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems, pp.1-6, 2008. ,
DOI : 10.1109/BTAS.2008.4699352
Multi-algorithm fusion with template protection, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, pp.1-8, 2009. ,
DOI : 10.1109/BTAS.2009.5339045
URL : http://doc.utwente.nl/69009/1/Kelkboom09_Multi-Algorithm_Fusion_with_Template_Protection.pdf
Secure Biometric Templates from Fingerprint-Face Features, 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp.1-6, 2007. ,
DOI : 10.1109/CVPR.2007.383385
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.8400
Pattern recognition techniques in online hand written signature verification-a survey, Multimedia Computing and Systems, 2009. ICMCS'09. International Conference on, pp.216-221, 2009. ,
Multimodality to improve security and privacy in fingerprint authentication system, 2007 International Conference on Intelligent and Advanced Systems, pp.753-757, 2007. ,
DOI : 10.1109/ICIAS.2007.4658487
Dynamic random projection for biometric template protection, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp.1-7, 2010. ,
DOI : 10.1109/BTAS.2010.5634538
Criteria towards metrics for benchmarking template protection algorithms, 2012 5th IAPR International Conference on Biometrics (ICB), pp.498-505, 2012. ,
DOI : 10.1109/ICB.2012.6199799
URL : https://www.cosic.esat.kuleuven.be/publications/article-2161.pdf
A fingerprint cryptosystem based on minutiae phase spectrum, 2010 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2010. ,
DOI : 10.1109/WIFS.2010.5711456
Generation and use of a biometric key, US Patent, vol.8670, p.562, 2014. ,
Towards standardizing trusted evidence of identity, Proceedings of the 2013 ACM workshop on Digital identity management, DIM '13, pp.63-72, 2013. ,
DOI : 10.1145/2517881.2517890
Methods and apparatus for generation of cancelable fingerprint template, US Patent, vol.8538, p.96, 2013. ,
Face template protection using chaotic encryption, 2013. ,
Assessing Semantic Conformance of Minutiae-based Feature Extractors, 2011. ,
Information Technology -Security Techniques -Biometric Information Protection, 2011. ,