A. K. Jain and A. Ross, Multibiometric systems, Communications of the ACM, vol.47, issue.1, pp.34-40, 2004.
DOI : 10.1145/962081.962102

C. Rathgeb and A. Uhl, A survey on biometric cryptosystems and cancelable biometrics, EURASIP Journal on Information Security, vol.2011, issue.1, pp.1-25, 2011.
DOI : 10.1109/TIFS.2006.873653

URL : http://doi.org/10.1186/1687-417x-2011-3

M. Upmanyu, Blind Authentication: A Secure Crypto-Biometric Verification Protocol. Transactions on Information Forensics and Security, IEEE 2010, pp.255-268

A. K. Jain, K. Nandakumar, and A. Nagar, Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, pp.1-17, 2008.
DOI : 10.1109/TIFS.2007.908165

URL : http://doi.org/10.1155/2008/579416

V. Q. Huynh, A Combination of ANN and Secure Sketch for Generating Strong Biometric Key, Journal of Science and Technology Vietnamese Academy of Science and Technology, issue.4B, pp.51-81, 2013.

T. T. Le, Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault, in Transactions on Large-Scale Data-and Knowledge-Centered Systems XVI, pp.57-70, 2014.

W. Lifang and Y. Songlong, A Face Based Fuzzy Vault Scheme for Secure Online Authentication, Second International Symposium on Data, Privacy and E-Commerce, 2010.

P. Failla, Y. Sutcu, and M. Barni, eSketch, Proceedings of the 12th ACM workshop on Multimedia and security, MM&Sec '10, pp.241-246
DOI : 10.1145/1854229.1854271

T. H. Nguyen and T. T. Nguyen, An approach to protect Private Key using fingerprint Biometric Encryption Key in BioPKI based security system, 2008 10th International Conference on Control, Automation, Robotics and Vision, 2008.
DOI : 10.1109/ICARCV.2008.4795763

K. Xi, A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment, Security and Communication Networks, vol.54, issue.11, pp.487-499, 2011.
DOI : 10.1002/sec.225

H. Al-assam, R. Rashid, and S. Jassim, Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange, The 8th International Conference for Internet Technology and Secured Transactions (ICITST), 2013.
DOI : 10.1109/icist.2013.6747573

A. K. Jain and U. Uludag, Hiding biometric data. Transactions on Pattern Analysis and Machine Intelligence, pp.1494-1498, 2003.

H. Fengling, M. Alkhathami, and R. Van-schyndel, Biometric-Kerberos authentication scheme for secure mobile computing services, The 6th International Congress on Image and Signal Processing (CISP), 2013.

A. Juels and M. Wattenberg, A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36
DOI : 10.1145/319709.319714

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.763

H. Al-assam, H. Sellahewa, and S. Jassim, A lightweight approach for biometric template protection, Mobile Multimedia/Image Processing, Security, and Applications 2009, 2009.
DOI : 10.1117/12.818291

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.1122