Multibiometric systems, Communications of the ACM, vol.47, issue.1, pp.34-40, 2004. ,
DOI : 10.1145/962081.962102
A survey on biometric cryptosystems and cancelable biometrics, EURASIP Journal on Information Security, vol.2011, issue.1, pp.1-25, 2011. ,
DOI : 10.1109/TIFS.2006.873653
URL : http://doi.org/10.1186/1687-417x-2011-3
Blind Authentication: A Secure Crypto-Biometric Verification Protocol. Transactions on Information Forensics and Security, IEEE 2010, pp.255-268 ,
Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, pp.1-17, 2008. ,
DOI : 10.1109/TIFS.2007.908165
URL : http://doi.org/10.1155/2008/579416
A Combination of ANN and Secure Sketch for Generating Strong Biometric Key, Journal of Science and Technology Vietnamese Academy of Science and Technology, issue.4B, pp.51-81, 2013. ,
Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault, in Transactions on Large-Scale Data-and Knowledge-Centered Systems XVI, pp.57-70, 2014. ,
A Face Based Fuzzy Vault Scheme for Secure Online Authentication, Second International Symposium on Data, Privacy and E-Commerce, 2010. ,
eSketch, Proceedings of the 12th ACM workshop on Multimedia and security, MM&Sec '10, pp.241-246 ,
DOI : 10.1145/1854229.1854271
An approach to protect Private Key using fingerprint Biometric Encryption Key in BioPKI based security system, 2008 10th International Conference on Control, Automation, Robotics and Vision, 2008. ,
DOI : 10.1109/ICARCV.2008.4795763
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment, Security and Communication Networks, vol.54, issue.11, pp.487-499, 2011. ,
DOI : 10.1002/sec.225
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange, The 8th International Conference for Internet Technology and Secured Transactions (ICITST), 2013. ,
DOI : 10.1109/icist.2013.6747573
Hiding biometric data. Transactions on Pattern Analysis and Machine Intelligence, pp.1494-1498, 2003. ,
Biometric-Kerberos authentication scheme for secure mobile computing services, The 6th International Congress on Image and Signal Processing (CISP), 2013. ,
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36 ,
DOI : 10.1145/319709.319714
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.763
A lightweight approach for biometric template protection, Mobile Multimedia/Image Processing, Security, and Applications 2009, 2009. ,
DOI : 10.1117/12.818291
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.1122