A. Abaza, A. Ross, C. Hebert, M. A. Harrison, and M. S. Nixon, A survey on ear biometrics, ACM Computing Surveys, vol.45, issue.2, p.22, 2013.
DOI : 10.1145/2431211.2431221

E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-garcia, and A. Neri, Cancelable templates for sequence-based biometrics with application to on-line signature recognition. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, issue.3, pp.40525-538, 2010.

C. Adams, Achieving non-transferability in credential systems using hidden biometrics, Security and Communication Networks, pp.195-206, 2011.
DOI : 10.1002/sec.136

Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008.
DOI : 10.1137/060651380

URL : http://arxiv.org/abs/cs/0602007

A. Nagar, K. Nandakumar, and A. K. Jain, Multibiometric cryptosystems based on feature-level fusion. Information Forensics and Security, IEEE Transactions on, vol.7, issue.1, pp.255-268, 2012.
DOI : 10.1109/tifs.2011.2166545

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.8698

H. M. Sim, H. Asmuni, R. Hassan, and R. M. Othman, Multimodal biometrics: Weighted score level fusion based on non-ideal iris and face images, Expert Systems with Applications, vol.41, issue.11, pp.415390-5404, 2014.
DOI : 10.1016/j.eswa.2014.02.051

F. Hao, R. Anderson, and J. Daugman, Combining crypto with biometrics effectively . Computers, IEEE Transactions on, vol.55, issue.9, pp.1081-1088, 2006.

A. K. Jain, K. Nandakumar, and A. Nagar, Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, p.113, 2008.
DOI : 10.1109/TIFS.2007.908165

C. Rathgeb and C. Busch, Multi-biometric template protection: Issues and challenges . New Trends and Developments in Biometrics, pp.173-190, 2012.
DOI : 10.5772/52152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.656.391

E. Argones-rua, E. Maiorana, J. L. , A. Castro, and P. Campisi, Biometric template protection using universal background models: An application to online signature. Information Forensics and Security, IEEE Transactions on, vol.7, issue.1, pp.269-282, 2012.

Y. Isobe, T. Ohki, and N. Komatsu, Security performance evaluation for biometric template protection techniques, International Journal of Biometrics, vol.5, issue.1, pp.53-72, 2013.
DOI : 10.1504/IJBM.2013.050733

K. Simoens, Security and privacy challenges with biometric solutions, LSEC Biometrics, 2011.

L. Lu and J. Peng, Finger Multi-biometric Cryptosystem using Feature-Level Fusion, International Journal of Signal Processing, Image Processing and Pattern Recognition, vol.7, issue.3, 2014.
DOI : 10.14257/ijsip.2014.7.3.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.639.2249

T. Hoang and D. Choi, Secure and Privacy Enhanced Gait Authentication on Smart Phone, The Scientific World Journal, vol.8, issue.3, 2014.
DOI : 10.1109/TC.2006.138

URL : http://doi.org/10.1155/2014/438254

J. Peng, Q. Li, A. A. El-latif, and X. Niu, Finger multibiometric cryptosystems: fusion strategy and template security, Journal of Electronic Imaging, vol.23, issue.2, pp.23001-023001, 2014.
DOI : 10.1117/1.JEI.23.2.023001

Y. Chin, T. Ong, A. Teoh, and K. Goh, Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion, Information Fusion, vol.18, pp.161-174, 2014.
DOI : 10.1016/j.inffus.2013.09.001

E. Maiorana, Biometric cryptosystem using function based on-line signature recognition, Expert Systems with Applications, vol.37, issue.4, pp.3454-3461, 2010.
DOI : 10.1016/j.eswa.2009.10.043

J. Bringer, H. Chabanne, and A. Patey, Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends, IEEE Signal Processing Magazine, vol.30, issue.2, pp.42-52, 2013.
DOI : 10.1109/MSP.2012.2230218

C. Rathgeb and A. Uhl, A survey on biometric cryptosystems and cancelable biometrics, EURASIP Journal on Information Security, vol.2011, issue.1, pp.1-25, 2011.
DOI : 10.1109/TIFS.2006.873653

B. Kumar-ramachandran-nair, S. Bhanu, N. S. Ghosh, and . Thakoor, Predictive models for multibiometric systems, Pattern Recognition, 2014.

K. Simoens, J. Bringer, H. Chabanne, and S. Seys, A framework for analyzing template security and privacy in biometric authentication systems. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.833-841, 2012.

A. Cavoukian and A. Stoianov, Privacy by design solutions for biometric one-tomany identification systems, 2014.

C. Rathgeb and C. Busch, Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters, Computers & Security, vol.42, pp.1-12, 2014.
DOI : 10.1016/j.cose.2013.12.005

A. Cavoukian and A. Stoianov, Biometric encryption, Encyclopedia of Cryptography and Security, pp.90-98, 2011.
DOI : 10.1016/s0969-4765(07)70084-x

Y. Sutcu, Q. Li, and N. Memon, Secure Sketches for Protecting Biometric Templates, Security and Privacy in Biometrics, pp.69-104, 2013.
DOI : 10.1007/978-1-4471-5230-9_4

J. Breebaart, B. Yang, I. Buhan-dulman, and C. Busch, Biometric template protection. Datenschutz und Datensicherheit-DuD, pp.299-304, 2009.

P. Tuyls, A. H. Akkermans, T. A. Kevenaar, G. Schrijen, A. M. Bazen et al., Practical Biometric Authentication with Template Protection, Audio-and Video-Based Biometric Person Authentication, pp.436-446, 2005.
DOI : 10.1007/11527923_45

URL : http://doc.utwente.nl/63477/1/4n9f1vpwmm6aqdt0.pdf

D. G. Lee, S. Hussain, G. Roussos, and Y. Zhang, Editorial: Special Issue on ???Security and Multimodality in Pervasive Environments???, Wireless Personal Communications, vol.55, issue.1, pp.1-4, 2010.
DOI : 10.1007/s11277-009-9790-4

M. Butt, O. Henniger, A. Nouak, and A. Kuijper, Privacy Protection of Biometric Templates, HCI International 2014-Posters' Extended Abstracts, pp.153-158, 2014.
DOI : 10.1007/978-3-319-07857-1_27

N. Wang, Q. Li, A. A. El-latif, J. Peng, X. Yan et al., A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system, Signal, Image and Video Processing, pp.1-11, 2014.
DOI : 10.1007/s11760-014-0663-2

N. Buchmann, C. Rathgeb, H. Baier, and C. Busch, Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area, Privacy Technologies and Policy, pp.172-190, 2014.
DOI : 10.1007/978-3-319-06749-0_12

R. Connaughton, K. W. Bowyer, and P. J. Flynn, Fusion of face and iris biometrics, Handbook of Iris Recognition, pp.219-237, 2013.

A. I. Awad and A. E. Hassanien, Impact of some biometric modalities on forensic science, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, pp.47-62, 2014.

P. Campisi, Security and Privacy in Biometrics, 2013.
DOI : 10.1007/978-1-4471-5230-9

R. R. Jillela, A. A. Ross, V. N. Boddeti, B. V. Kumar, X. Hu et al., Iris Segmentation for Challenging Periocular Images, Burge andBowyer, pp.281-308
DOI : 10.1007/978-1-4471-6784-6_13

M. J. Burge and K. W. Bowyer, Handbook of Iris Recognition Advances in Computer Vision and Pattern Recognition, 2013.

A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of multibiometrics, 2006.

A. Kong, D. Zhang, and M. Kamel, Palmprint identification using feature-level fusion, Pattern Recognition, vol.39, issue.3, pp.478-487, 2006.
DOI : 10.1016/j.patcog.2005.08.014

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.2201

K. Wouters, K. Simoens, D. Lathouwers, and B. Preneel, Secure and privacyfriendly logging for egovernment services, Availability, Reliability and Security ARES 08. Third International Conference on, pp.1091-1096, 2008.
DOI : 10.1109/ares.2008.41

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.580.9724

A. Juels, D. Molnar, and D. Wagner, Security and Privacy Issues in E-passports, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), pp.74-88, 2005.
DOI : 10.1109/SECURECOMM.2005.59

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.544.9714

E. J. Kelkboom, J. Breebaart, I. Buhan, and R. N. Veldhuis, Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source, Biometric Technology for Human Identification VII, pp.76670-76670, 2010.
DOI : 10.1117/12.850240

URL : http://doc.utwente.nl/74579/1/Kelkboom10_Analytical_template_protection_performance_and_maximum_key_size_given_a_Gaussian-modeled_biometric_source.pdf

C. Rathgeb, A. Uhl, and P. Wild, Reliability-balanced feature level fusion for fuzzy commitment scheme, Biometrics (IJCB), 2011 International Joint Conference on, pp.1-7, 2011.

A. M. Siddiqui, R. Telgad, and P. D. Deshmukh, Multimodal biometric systems: Study to improve accuracy and performance, 2014.

K. Nandakumar and A. K. Jain, Multibiometric Template Security Using Fuzzy Vault, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems, pp.1-6, 2008.
DOI : 10.1109/BTAS.2008.4699352

E. Kelkboom, X. Zhou, J. Breebaart, R. Veldhuis, and C. Busch, Multi-algorithm fusion with template protection, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, pp.1-8, 2009.
DOI : 10.1109/BTAS.2009.5339045

URL : http://doc.utwente.nl/69009/1/Kelkboom09_Multi-Algorithm_Fusion_with_Template_Protection.pdf

Y. Sutcu, Q. Li, and N. Memon, Secure Biometric Templates from Fingerprint-Face Features, 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp.1-6, 2007.
DOI : 10.1109/CVPR.2007.383385

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.8400

K. Radhika, G. Sekhar, and M. Venkatesha, Pattern recognition techniques in online hand written signature verification-a survey, Multimedia Computing and Systems, 2009. ICMCS'09. International Conference on, pp.216-221, 2009.

M. Islam, M. Sayeed, and A. Samraj, Multimodality to improve security and privacy in fingerprint authentication system, 2007 International Conference on Intelligent and Advanced Systems, pp.753-757, 2007.
DOI : 10.1109/ICIAS.2007.4658487

B. Yang, D. Hartung, K. Simoens, and C. Busch, Dynamic random projection for biometric template protection, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp.1-7, 2010.
DOI : 10.1109/BTAS.2010.5634538

K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch et al., Criteria towards metrics for benchmarking template protection algorithms, 2012 5th IAPR International Conference on Biometrics (ICB), pp.498-505, 2012.
DOI : 10.1109/ICB.2012.6199799

URL : https://www.cosic.esat.kuleuven.be/publications/article-2161.pdf

K. Nandakumar, A fingerprint cryptosystem based on minutiae phase spectrum, 2010 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2010.
DOI : 10.1109/WIFS.2010.5711456

J. Bringer, H. Chabanne, D. Pointcheval, and S. Zimmer, Generation and use of a biometric key, US Patent, vol.8670, p.562, 2014.

B. Yang, C. Busch, J. Bringer, E. Kindt, W. R. Belser et al., Towards standardizing trusted evidence of identity, Proceedings of the 2013 ACM workshop on Digital identity management, DIM '13, pp.63-72, 2013.
DOI : 10.1145/2517881.2517890

R. M. Bolle, S. S. Chikkerur, J. H. Connell, and N. K. Ratha, Methods and apparatus for generation of cancelable fingerprint template, US Patent, vol.8538, p.96, 2013.

W. Cheng and G. An, Face template protection using chaotic encryption, 2013.

S. Abt, Assessing Semantic Conformance of Minutiae-based Feature Extractors, 2011.

I. Iec, Information Technology -Security Techniques -Biometric Information Protection, 2011.