N. Bartlow, N. Kalka, B. Cukic, and A. Ross, Protecting Iris Images through Asymmetric Digital Watermarking, 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp.192-197, 2007.
DOI : 10.1109/AUTOID.2007.380618

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.2613

J. Dong and T. Tan, Effects of watermarking on iris recognition performance, 2008 10th International Conference on Control, Automation, Robotics and Vision, pp.1156-1161, 2008.
DOI : 10.1109/ICARCV.2008.4795684

J. Hämmerle-uhl, K. Raab, and A. Uhl, Experimental study on the impact of robust watermarking on iris recognition accuracy (best paper award, applications track), Proceedings of the 25th ACM Symposium on Applied Computing, pp.1479-1484, 2010.

J. Hämmerle-uhl, K. Raab, and A. Uhl, Attack against robust watermarkingbased multimodal biometric recognition systems, Proceedings of the 2011 BioID Workshop, pp.25-36, 2011.

J. Hämmerle-uhl, K. Raab, and A. Uhl, Watermarking as a means to enhance biometric systems: A critical survey, Proceedings of the 2011 Information Hiding Conference (IH'11), 2011.

A. K. Jain and U. Uludag, Hiding fingerprint minutiae in images, Proceedings of AutoID 2002, 3rd Workshop on Automatic Identification Advanced Technologies, pp.97-102, 2002.

A. K. Jain, U. Uludag, and R. L. Hsu, Hiding a face in a fingerprint image, Object recognition supported by user interaction for service robots, pp.756-759, 2002.
DOI : 10.1109/ICPR.2002.1048100

A. K. Jain and U. Uludag, Hiding biometric data, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.25, issue.11, pp.1494-1498, 2003.
DOI : 10.1109/TPAMI.2003.1240122

M. K. Khan, L. Xie, and J. S. Zhang, Robust Hiding of Fingerprint-Biometric Data into Audio Signals, In Advances in Biometrics LNCS, vol.4642, pp.702-712, 2007.
DOI : 10.1007/978-3-540-74549-5_74

A. Lang and J. Dittmann, Digital watermarking of biometric speech references: impact to the EER system performance, Security, Steganography, and Watermarking of Multimedia Contents IX, p.650513, 2007.
DOI : 10.1117/12.703890

D. Moon, T. Kim, S. Jung, Y. Chung, K. Moon et al., Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems, Proceedings of CIS 2005 (Part II), volume 3802 of LNAI, pp.635-642, 2005.
DOI : 10.1007/11596981_94

A. Noore, R. Singh, M. Vatsa, and M. M. Houck, Enhancing security of fingerprints through contextual biometric watermarking, Forensic Science International, vol.169, issue.2-3, pp.188-194, 2007.
DOI : 10.1016/j.forsciint.2006.08.019

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5384

D. Kang-ryoung-park, . Sik-jeong, . Byung-jun, . Kang, and . Lee, A Study on Iris Feature Watermarking on Face Data, Proceedings of the 8th International Conference on Adaptive and Natural Computing Algorithms, ICANNGA '07, pp.415-423, 2007.
DOI : 10.1007/978-3-540-71629-7_47

M. I. Rajibul, M. Shohel, and S. Andrews, Biometric template protection using watermarking with hidden password encryption, Proceedings of the International Symposium on Information Technology 2008 (ITSIM08), pp.296-303, 2008.

N. K. Ratha, J. H. Connell, and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001.
DOI : 10.1147/sj.403.0614

C. Roberts, Biometric attack vectors and defences, Computers & Security, vol.26, issue.1, pp.14-25, 2007.
DOI : 10.1016/j.cose.2006.12.008

URL : https://ourarchive.otago.ac.nz/bitstream/10523/1243/3/BiometricAttackVectors.pdf

T. Satonaka, Biometric watermark authentication with multiple verification rule, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing, pp.597-606, 2002.
DOI : 10.1109/NNSP.2002.1030071

C. Vielhauer and R. Steinmetz, Approaches to biometric watermarks for owner authentification, Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, 2001.
DOI : 10.1117/12.435401

D. Wang, J. Li, D. Hu, and Y. Yan, A Novel Biometric Image Integrity Authentication Using Fragile Watermarking and Arnold Transform, Information Computing and Automation
DOI : 10.1142/9789812799524_0203

M. Minerva, S. Yeung, and . Pankanti, Verification watermarks on fingerprint recognition and retrieval, Journal of Electronal Imaging, Special Issue on Image Security and Digital Watermarking, vol.9, issue.4, pp.468-476, 2000.

C. Zeitz, T. Scheidat, J. Dittmann, and C. Vielhauer, Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, pp.0-1, 2008.
DOI : 10.1117/12.767632