Jain AK, Ross A, Prabhakar S: **An introduction to biometric recognition.** *IEEE Trans Circ Syst Video Technol* 2004, **14:** 4-20. 10.1109/TCSVT.2003.818349

Google Scholar

Cappelli R, Lumini A, Maio D, Maltoni D: **Fingerprint image reconstruction from standard templates.** *IEEE Trans Pattern Anal Mach Intell* 2007, **29**(9):1489-1503.

Google Scholar

Ross A, Shah J, Jain AK: **From template to image: reconstructing fingerprints from minutiae points.** *IEEE Trans Pattern Anal Mach Intell* 2007, **29**(4):544-560.

Google Scholar

Jain AK, Nandakumar K, Nagar A: **Biometric template security.** *EURASIP J Adv Signal Process* 2008, 1-17.

Google Scholar

Luo Y, Cheung SS, Ye S: **Anonymous biometric access control based on homomorphic encryption.** *ICME'09: Proc of the 2009 IEEE Int Conf on Multimedia and Expo* 2009, 1046-1049.

Google Scholar

Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV: **Efficient biometric verification in encrypted domain.** *ICB '09: Proc of the Third Int Conf on Biometrics* 2009, 899-908.

Google Scholar

SPEED: **(Signal Processing in the Encrypted Domain) project.**[http://www.speedproject.eu/]

Uludag U, Pankanti S, Prabhakar S, Jain AK: **Biometric cryptosystems: issues and challenges.** *Proc IEEE* 2004, **92**(6):948-960.

Google Scholar

Cavoukian A, Stoianov A: **Biometric encryption.** In *Encyclopedia of Biometrics*. Springer; 2009.

Google Scholar

Cavoukian A, Stoianov A: **Biometric encryption: the new breed of untraceable biometrics.** In *Biometrics: Fundamentals, Theory, and Systems*. Wiley, London; 2009.

Google Scholar

Jain AK, Ross A: **U Uludag, Biometric template security: Challenges and solutions.** *Proc of European Signal Processing Conf (EUSIPCO)* 2005.

Google Scholar

Ratha NK, Connell JH, Bolle RM: **Enhancing security and privacy in biometrics-based authentication systems.** *IBM Syst J* 2001, **40:** 614-634.

Google Scholar

Dodis Y, Ostrovsky R, Reyzin L, Smith A: **Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.** *Proc Eurocrypt* 2004, **2004:** 523-540. (LNCS: 3027)

Google Scholar

Verbitskiy EA, Tuyls P, Obi C, Schoenmakers B, Ŝkorić B: **Key extraction from general nondiscrete signals.** *IEEE Trans Inf Forensic Secur* 2010, **5**(2):269-279.

Google Scholar

Juels A, Wattenberg M: **A fuzzy commitment scheme.** *6th ACM Conf on Computer and Communications Security* 1999, 28-36.

Google Scholar

Juels A, Sudan M: **A fuzzy vault scheme.** *Proc 2002 IEEE Int Symp on Information Theory* 2002, 408.

Google Scholar

Nagar A, Nandakumar K, Jain A: **A hybrid biometric cryptosystem for securing fingerprint minutiae templates.** *Pattern Recogn Lett* 2010, **31:** 733-741. 10.1016/j.patrec.2009.07.003

Google Scholar

Monrose F, Reiter MK, Li Q, Wetzel S: **Cryptographic key generation from voice.** *SP '01: Proc of the 2001 IEEE Symp on Security and Privacy* 2001, 12.

Google Scholar

Monrose F, Reiter MK, Wetzel S: **Password hardening based on keystroke dynamics.** *Proc of 6th ACM Conf on Computer and Communications Security, CCCS* 1999, 73-82.

Google Scholar

Soutar C, Tomko GJ, Schmidt GJ: **Fingerprint controlled public key cryptographic system.** *US Patent* 1996, 5541994.

Google Scholar

Feng H, Wah CC: **Private key generation from on-line handwritten signatures.** *Inf Manag Comput Secur* 2002, **10**(18):159-164.

Google Scholar

Vielhauer C, Steinmetz R, Mayerhöfer A: **Biometric hash based on statistical features of online signatures.** *Proc of the 16 th Int Conf on Pattern Recognition (ICPR'02)* 2002, **1:** 10123.

Google Scholar

Monrose F, Reiter MK, Li Q, Wetzel S: **Using Voice to Generate Cryptographic Keys.** *Proc 2001: A Speaker Odyssey, The Speech Recognition Workshop* 2001, 6.

Google Scholar

Vielhauer C: **Biometric User Authentication for IT Security.** In *Advances in Information Security*. *Volume 18*. Springer; 2006.

Google Scholar

Ballard L, Kamara S, Monrose F, Reiter M: **On the requirements of biometric key generators, Technical Report TR-JHU-SPARBKMR- 090707.** *Submitted and available as JHU Department of Computer Science Technical Report* 2007.

Google Scholar

Ballard L, Kamara S, Reiter MK: **The practical subtleties of biometric key generation.** *SS'08: Proc of the 17th Conf on Security symposium* 2008, 61-74.

Google Scholar

Jain AK, Flynn PJ, Ross AA: *Handbook of Biometrics.* Springer; 2008.

Google Scholar

Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV: **Biometric encryption--enrollment and verification procedures.** *Proc SPIE, Optical Pattern Recognition IX* 1998, **3386:** 24-35.

Google Scholar

Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV: **Biometric encryption using image processing.** *Proc SPIE, Optical Security and Counterfeit Deterrence Techniques II* 1998, **3314:** 178-188.

Google Scholar

Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV: **Biometric encryption, ICSA Guide to Cryptography.** 1999.

Google Scholar

Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV: **Method for secure key management using a biometrics.** *US Patent* 2001, 6219794.

Google Scholar

Hao F, Anderson R, Daugman J: **Combining cryptography with biometrics effectively.** *IEEE Trans Comput* 2006, **55**(9):1081-1088.

Google Scholar

Bringer J, Chabanne H, Cohen G, Kindarji B, Źemor G: **Optimal iris fuzzy sketches.** *Proc 1st IEEE Int Conf on Biometrics: Theory, Applications, and Systems (BTAS'07)* 2007, 1-6.

Google Scholar

Bringer J, Chabanne H, Cohen G, Kindarji B, Źemor G: **Theoretical and practical boundaries of binary secure sketches.** *IEEE Trans Inf Forensic Secur* 2008, **3:** 673-683.

Google Scholar

Rathgeb C, Uhl A: **Systematic construction of iris-based fuzzy commitment schemes.** *Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09)* 2009, 947-956. LNCS: 5558

Google Scholar

Rathgeb C, Uhl A: **Context-based texture analysis for secure revocable iris-biometric key generation.** *Proc of the 3rd Int Conf on Imaging for Crime Detection and Prevention, ICDP '09* 2009.

Google Scholar

Zhang L, Sun Z, Tan T, Hu S: **Robust biometric key extraction based on iris cryptosystem.** *Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09)* 2009, 1060-1070. LNCS: 5558

Google Scholar

Ignatenko T, Willems F: **Achieving secure fuzzy commitment scheme for optical pufs.** *Int Conf on Intelligent Information Hiding and Multimedia Signal Processing* 2009, 1185-1188.

Google Scholar

Rathgeb C, Uhl A: **Adaptive fuzzy commitment scheme based on iris-code error analysis.** *Proc of the 2nd European Workshop on Visual Information Processing (EUVIP'10)* 2010, 41-44.

Google Scholar

Teoh A, Kim J: **Secure biometric template protection in fuzzy commitment scheme.** *IEICE Electron Express* 2007, **4**(23):724-730. 10.1587/elex.4.724

Google Scholar

Goh A, Ngo DCL: **Computation of cryptographic keys from face biometrics.** *Communications and Multimedia Security* 2003, 1-13. (LNCS: 2828)

Google Scholar

Zeng Z, Watters PA: **A novel face hashing method with feature fusion for biometric cryptosystems.** *European Conference on Universal Multiservice Networks* 2007, 439-444.

Google Scholar

Ao M, Li SZ: **Near infrared face based biometric key binding.** *Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09)* 2009, 376-385. LNCS: 5558

Google Scholar

Tong V, Sibert H, Lecoeur J, Girault M: **Biometric fuzzy extractors made practical: a proposal based on fingercodes.** *Int Conf on Biometrics* 2007. (LNCS: 4642)

Google Scholar

Nandakumar K: **A fingerprint cryptosystem based on minutiae phase spectrum.** *Proc of IEEE Workshop on Information Forensics and Security (WIFS)* 2010.

Google Scholar

Van der Veen M, Kevenaar T, Schrijen G-J, Akkermans TH, Zuo F: **Face biometrics with renewable templates.** *SPIE Proc on Security, Steganography, and Watermarking of Multimedia Contents* 2006, **6072:** 205-216.

Google Scholar

Lu H, Martin K, Bui F, Plataniotis K, Hatzinakos D: **Face recognition with biometric encryption for privacy-enhancing self exclusion.** *Proc of the 16th Int Conf on Digital Signal Processing (DSP 2009)* 2009.

Google Scholar

Maiorana E, Campisi P, Neri A: **User adaptive fuzzy commitment for signature templates protection and renewability.** *SPIE J Elec Imaging Spec Sect Biomet Adv Secur Usability Interoper* 2008, **17**(1):1-12.

Google Scholar

Maiorana E, Campisi P: **Fuzzy commitment for function based signature template protection.** *IEEE Signal Process Lett* 2010, **17**(3):249-252.

Google Scholar

Zheng G, Li W, Zhan C: **Cryptographic key generation from biometric data using lattice mapping.** *18th Int Conf on Pattern Recognition (ICPR 2006)* 2006, **4:** 513-516.

Google Scholar

Linnartz J-P, Tuyls P: **New shielding functions to enhance privacy and prevent misuse of biometric templates.** *Proc 4th Int Conf Audio- And Video-Based Biometric Person Authentication* 2003, 393-402.

Google Scholar

Tuyls P, Akkermans AHM, Kevenaar TAM, Schrijen GJ, Bazen AM, Veldhuis RNJ: **Practical biometric authentication with template protection.** *Proc Audio-and Video-Based Biometrie Person Authentication* 2005, **3546:** 436-446. 10.1007/11527923_45

Google Scholar

Buhan IR, Doumen JM, Hartel PH, Veldhuis RNJ: **Constructing practical fuzzy extractors using QIM, Centre for Telematics and Information Technology, University of Twente, Enschede, Technical Report TR-CTIT-07-52.** 2007.

Google Scholar

Li H, Wang M, Pang L, Zhang W: **Key binding based on biometric shielding functions.** *IAS* 2009, 19-22.

Google Scholar

Clancy TC, Kiyavash N, Lin DJ: **Secure smartcard-based fingerprint authentication.** *Proc ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop* 2003, 45-52.

Google Scholar

Nandakumar K, Jain AK, Pankanti S: **Fingerprint-based fuzzy vault: implementation and performance.** *IEEE Trans Inf Forensic Secur* 2007, **2:** 744-757.

Google Scholar

Uludag U, Jain AK: **Fuzzy fingerprint vault.** *Proc Workshop: Biometrics: Challenges Arising from Theory to Practice* 2004, 13-16.

Google Scholar

Uludag U, Jain AK: **Securing fingerprint template: fuzzy vault with helper data.** *Proc IEEE Workshop on Privacy Research In Vision* 2006.

Google Scholar

Yang S, Verbauwhede I: **Automatic secure fingerprint verification system based on fuzzy vault scheme.** *Proc of IEEE Int Conf Audio, Speech and Signal Processing (ICASSP'05)* 2005, **5:** 609-612.

Google Scholar

Chung Y, Moon D, Lee S, Jung S, Kim T, Ahn D: **Automatic alignment of fingerprint features for fuzzy fingerprint vault.** *Proc of Conf on Information Security and Cryptology* 2005, 358-369.

Google Scholar

Li P, Yang X, Cao K, Tao X, Wang R, Tian J: **An alignment free fingerprint cryptosystem based on fuzzy vault scheme.** *J Netw Comput Appl* 2010, **33:** 207-220. 10.1016/j.jnca.2009.12.003

Google Scholar

Jeffers J, Arakala A: **Minutiae-based structures for a fuzzy vault.** *Proc of the Biometric Consortium Conf 2006* 2006, 1-6.

Google Scholar

Moon D, Choi W-Y, Moon K, Chung Y: **Fuzzy fingerprint vault using multiple polynomials.** *IEEE 13th Int Symposium on Consumer Electronics, ISCE '09* 2009, 290-293.

Google Scholar

Nagar A, Chaudhury S: **Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme.** *18th Int Conf on Pattern Recognition (ICPR'06)* 2006, **ICPR 4:** 537-540.

Google Scholar

Nagar A, Nandakumar K, Jain AK: **Securing fingerprint template: Fuzzy vault with minutiae descriptors.** *Int Conf on Pattern Recognition (ICPR'08). IEEE* 2008, 1-4.

Google Scholar

Arakala A: **Secure and private fingerprint-based authentication.** *Bull Aust Math Soc* 2009, **80:** 347-349. 10.1017/S0004972709000665

MathSciNet
Google Scholar

Lee YJ, Bae K, Lee SJ, Park KR, Kim J: **Biometric key binding: Fuzzy vault based on iris images.** *Proc of Second Int Conf on Biometrics* 2007, 800-808.

Google Scholar

Wu X, Qi N, Wang K, Zhang D: **A Novel Cryptosystem based on Iris Key Generation.** *Fourth Int Conf on Natural Computation (ICNC'08)* 2008, 53-56.

Google Scholar

Wu X, Qi N, Wang K, Zhang D: **An iris cryptosystem for information security.** *IIH-MSP '08: Proc of the 2008 Int Conf on Intelligent Information Hiding and Multimedia Signal Processing* 2008, 1533-1536.

Google Scholar

Wu X, Wang K, Zhang D: **A cryptosystem based on palmprint feature.** *19th Int Conf on Pattern Recognition, (ICPR 2008)* 2008, 1-4.

Google Scholar

Wu Y, Qiu B: **Transforming a pattern identifier into biometric key generators.** *Proc of Int Conf on Multimedia and Expo (ICME)* 2010, 78-82.

Google Scholar

Reddy E, Babu I: **Performance of Iris Based Hard Fuzzy Vault.** *Int J Comput Sci Netw Secur (IJCSNS)* 2008, **8**(1):297-304.

Google Scholar

Kumar A, Kumar A: **A palmprint based cryptosystem using double encryption.** *Proc SPIE Conf Biometric Technology for human identification* 2008, **6944:** 69440D-1-69440D-9.

Google Scholar

Kumar A, Kumar A: **Development of a new cryptographic construct using palmprint-based fuzzy vault.** *EURASIP J Adv Signal Process* 2009, 11.

Google Scholar

Kholmatov A, Yanikoglu B: **Biometric cryptosystem using online signatures.** *Comput Inf Sci ISCIS 2006 (LNCS)* 2006, **4263:** 981-990. 10.1007/11902140_102

Google Scholar

Bodo A: **Method for producing a digital signature with aid of a biometric feature.** *German patent DE 4243908 A1* 1994.

Google Scholar

Davida G, Frankel Y, Matt B: **On enabling secure applications through off-line biometric identification.** *Proc of IEEE, Symp on Security and Privacy* 1998, 148-157.

Google Scholar

Davida G, Frankel Y, Matt B: **On the relation of error correction and cryptography to an off line biometric based identication scheme.** *Proc of WCC99, Workshop on Coding and Cryptography* 1999, 129-138.

Google Scholar

Yang S, Verbauwhede I: **Secure Iris Verification.** *Proc of the IEEE Int Conf on Acoustics, Speech and Signal Processing, (ICASSP 2007)* 2007, **2:** II-133-II-136.

Google Scholar

Scheidat T, Vielhauer C, Dittmann J: **An iris-based interval mapping scheme for biometric key generation.** *Proc of the 6th Int Symposium on Image and Signal Processing and Analysis, ISPA '09* 2009, 550-555.

Google Scholar

Hoque S, Fairhurst M, Howells G: **Evaluating biometric encryption key generation using handwritten signatures.** *Proc of the 2008 Bio-inspired, Learning and Intelligent Systems for Security* 2008, 17-22.

Google Scholar

Sutcu Y, Sencar HT, Memon N: **A secure biometric authentication scheme based on robust hashing.** *MMSec '05: Proc of the 7th Workshop on Multimedia and Security* 2005, 111-116.

Google Scholar

Li Q, Guo M, Chang E-C: **Fuzzy extractors for asymmetric biometric representations.** *IEEE Workshop on Biometrics (In association with CVPR)* 2008, 1-6.

Google Scholar

Li Q, Chang E-C: **Robust, short and sensitive authentication tags using secure sketch.** *MM&Sec '06: Proc of the 8th workshop on Multimedia and security* 2006, 56-61.

Google Scholar

Sutcu Y, Li Q, Memon N: **Protecting biometric templates with sketch: Theory and practice.** *IEEE Trans Inf Forensic Secur* 2007, **2:** 503-512.

Google Scholar

Rathgeb C, Uhl A: **An iris-based interval-mapping scheme for biometric key generation.** *Proc of the 6th Int Symposium on Image and Signal Processing and Analysis, ISPA '09* 2009.

Google Scholar

Rathgeb C, Uhl A: **Privacy Preserving Key Generation for Iris Biometrics.** *Proc of the 11th Joint IFIP TC6 and TC11 Conf. on Communications and Multimedia Security, CMS '2010* 2010, 191-200. LNCS: (6109)

Google Scholar

Monrose F, Reiter MK, Lopresti DP, Shih C: **Toward speech generated cryptographic keys on resource constrained devices.** *Proc 11th USENIX Security Symposium* 2002, 283-296.

Google Scholar

Ballard L, Kamara S, Monrose F, Reiter MK: **Towards practical biometric key generation with randomized biometric templates.** *CCS '08: Proc of the 15th ACM Conf on Computer and Communications Security* 2008, 235-244.

Google Scholar

Chen BC, Chandran V: **Biometric based cryptographic key generation from faces.** *Proc. Digital Image Computing: Techniques and Applications (DICTA)* 2007, 394-401.

Google Scholar

Goh A, Teoh ABJ, Ngo DCL: **Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs.** *IEEE Trans Pattern Anal Mach Intell* 2006, **28**(12):1892-1901.

Google Scholar

Teoh ABJ, Ngo DCL, Goh A: **Personalised cryptographic key generation based on face hashing.** *Comput Secur* 2004, **2004**(23):606-614.

Google Scholar

Teoh ABJ, Ngo DCL, Goh A: **Biometric Hash: High-Confidence Face Recognition.** *IEEE Trans Circ Syst Video Technol* 2006, **16**(6):771-775.

Google Scholar

Song OT, Teoh AB, Ngo DCL: **Application-specific key release scheme from biometrics.** *Int J Netw Secur* 2008, **6**(2):122-128.

Google Scholar

Teoh ABJ, Ngo DCL, Goh A: **Biohashing: two factor authentication featuring fingerprint data and tokenised random number.** *Pattern Recogn* 2004, **37:** 2245-2255. 10.1016/j.patcog.2004.04.011

Google Scholar

Chong SC, Jin ATB, Ling DNC: **High security iris verification system based on random secret integration, Comput.** *Vision Image Understanding* 2006, **102**(2):169-177. 10.1016/j.cviu.2006.01.002

Google Scholar

Chong SC, Jin ATB, Ling DNC: **Iris authentication using privatized advanced correlation filter.** In *Proc of the 1st Int IAPR Conf on Biometrics (ICB'06)*. *Volume 4642*. Springer Lecture Notes on Computer Science; 2006:382-388.

Google Scholar

Connie T, Teoh A, Goh M, Ngo D: **Palmhashing: a novel approach for cancelable biometrics.** *Inf Process Lett* 2005, **93**(1):1-5. 10.1016/j.ipl.2004.09.014

MathSciNet
Google Scholar

Song OT, Teoh ABJ, Ngo DCL: **Application-specific key release scheme from biometrics.** *Int J Netw Secur* 2008, **6**(2):127-133.

Google Scholar

Beng A, Teoh J, Toh K-A: **Secure biometric-key generation with biometric helper.** *3rd IEEE Conf on Industrial Electronics and Applications (ICIEA 2008)* 2008, 2145-2150.

Google Scholar

Kong A, Cheunga K-H, Zhanga D, Kamelb M, Youa J: **An analysis of BioHashing and its variants.** *Pattern Recogn* 2006, **39:** 1359-1368. 10.1016/j.patcog.2005.10.025

Google Scholar

Teoh ABJ, Kuan YW, Lee S: **Cancellable biometrics and annotations on biohash.** *Pattern Recogn* 2008, **41**(6):2034-2044. 10.1016/j.patcog.2007.12.002

Google Scholar

Lumini A, Nanni L: **An improved biohashing for human authentication.** *Pattern Recogn* 2007, **40**(3):1057-1065. 10.1016/j.patcog.2006.05.030

Google Scholar

Nanni L, Lumini A: **Random subspace for an improved biohashing for face authentication.** *Pattern Recogn Lett* 2008, **29**(3):295-300. 10.1016/j.patrec.2007.10.005

Google Scholar

Jain AK, Flynn PJ, Ross AA: *Handbook of Biometrics.* Springer, New York; 2008.

Google Scholar

Nandakumar K, Jain AK: **Multibiometric template security using fuzzy vault.** *IEEE 2nd Int Conf on Biometrics: Theory, Applications, and Systems, BTAS '08* 2008, 1-6.

Google Scholar

Voderhobli K, Pattinson C, Donelan H: **A schema for cryptographic key generation using hybrid biometrics.** *7th annual postgraduate symp.: The convergence of telecommunications, networking and broadcasting, Liverpool* 2006.

Google Scholar

Sutcu Y, Li Q, Memon N: **Secure biometric templates from fingerprint-face features.** *IEEE Conf on Computer Vision and Pattern Recognition, CVPR '07* 2007, 1-6.

Google Scholar

Cimato S, Gamassi M, Piuri V, Sassi R, Scotti F: **A multibiometric verification system for the privacy protection of iris templates.** *Proc of the Int Workshop on Computational Intelligence in Security for Information Systems CISIS08* 2008, 227-234.

Google Scholar

Kanade S, Petrovska-Delacretaz D, Dorizzi B: **Multi-biometrics based cryptographic key regeneration scheme.** *IEEE 3rd Int Conf on Biometrics: Theory, Applications, and Systems, BTAS '09* 2009, 1-7.

Google Scholar

Kanade S, Camara D, Petrovska-Delacrtaz D, Dorizzi B: **Application of biometrics to obtain high entropy cryptographic keys.** *Proceedings of World Academy on Science, Engineering, and Technology, Hong Kong* 2009., **52:**

Google Scholar

Meenakshi VS, Padmavathi G: **Security analysis of password hardened multimodal biometric fuzzy vault.** *Proceedings of World Academy of Science, Engineering and Technology* 2009., **56:**

Google Scholar

Jagadeesan A, Thillaikkarasi T, Duraiswamy K: **Cryptographic key generation from multiple biometric modalities: Fusing minutiae with iris feature.** *Int J Comput Appl* 2010, **2**(6):16-26.

Google Scholar

Zhang M, Yang B, Zhang W, Takagi T: **Multibiometric based secure encryption and authentication scheme with fuzzy extractor.** *Int J Netw Secur* 2011, **12**(1):50-57.

Google Scholar

Chafia F, Salim C, Farid B: **A biometric crypto-system for authentication.** *Proc of Int Conf on Machine and Web Intelligence (ICMWI)* 2010, 434-438.

Google Scholar

Chen H, Sun H, Lam K-Y: **Key management using biometrics.** *Int Symposium on Data, Privacy, and E-Commerce* 2007, **1:** 321-326.

Google Scholar

Bui FM, Martin K, Lu H, Plataniotis KN, Hatzinakos D: **Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (BE) applications.** *Trans Inf Forensic Secur* 2010, **5:** 118-132.

Google Scholar

Draper S, Khisti A, Martinian E, Vetro A, Yedidia J: **Secure storage of fingerprint biometrics using slepian-wolf codes.** *Inform Theory and Apps Work (UCSD)* 2007.

Google Scholar

Martinian SYE, Yedidia JS: **Secure biometrics via syndromes.** In *43rd Annual Allerton Conf on Communications, Control, and Computing*. Monticello, IL, USA; 2005.

Google Scholar

Boyen X, Dodis Y, Katz J, Ostrovsky R: **A Smith, Secure remote authentication using biometric data.** *Proc Eurocrypt 05 (LNCS)* 2005, **3494:** 147-163.

MathSciNet
Google Scholar

Chang E-C, Roy S: **Robust extraction of secret bits from minutiae.** *Proc of the 2nd Int Conf on Biometrics 2007 (ICB'07)* 2007, 750-759.

Google Scholar

Kholmatov A, Yanikoglu B, Savas E, Levi A: **Secret sharing using biometric traits.** *Proc of SPIE* 2006, **6202:** 62020W.

Google Scholar

Hirschbichler M, Boyd C, Boles W: **A multiple-control fuzzy vault.** *PST '08: Proc of the 2008 Sixth Annual Conf on Privacy, Security and Trust* 2008, 36-47.

Google Scholar

Margarov G, Tolba M: **Biometrics based secret sharing using fuzzy vault.** *7th Int Conf on Computer Science and Information Technologies (CSIT'09)* 2009.

Google Scholar

Buhan IR, Doumen JM, Hartel PH, Veldhuis RNJ: **Fuzzy extractors for continuous distributions.** *University of Twente, Technical Report* 2006.

Google Scholar

Vielhauer C, Steinmetz R: **Handwriting: feature correlation analysis for biometric hashes.** *EURASIP J Appl Signal Process* 2004, **2004**(1):542-558.

Google Scholar

Scheidat T, Vielhauer C: **Biometric hashing for handwriting: entropy based feature selection and semantic fusion.** *Proc of SPIE* 2008, **6819:** 68190N.1-68190N.12.

Google Scholar

Kelkboom EJC, Breebaart J, Buhan I, Veldhuis RNJ: **Analytical template protection performance and maximum key size given a Gaussian modeled biometric source.** *Proc of SPIE defense, security and sensing* 2010.

Google Scholar

Verbitskiy E, Tuyls P, Denteneer D, Linnartz JP: **Reliable biometric authentication with privacy protection.** *Paper presented at the SPIE Biometric Technology for Human Identification Conference* 2004.

Google Scholar

Tuyls P, Goseling J: **Capacity and examples of template protecting biometric authentication systems.** *Proc ECCV Workshop BioAW (LNCS)* 2004, **3087:** 158-170.

Google Scholar

Li Q, Sutcu Y, Memon N: **Secure sketch for biometric templates.** *Adv. Cryptology Asiacrypt* 2006, **99:**-113. (LNCS:4284)

Google Scholar

Sutcu Y, Li Q, Memon N: **How to Protect Biometric Templates.** *Proc of SPIE SPIE Conf on Security, Steganography and Watermarking of Multimedia Contents IX* 2007, **6505:** 11.

Google Scholar

Li Q, Chang E-C: **Hiding secret points amidst chaff.** *Proc of the Eurocrypt '06* 2006, 59-72. (LNCS 4004)

Google Scholar

Ignatenko T, Willems FMJ: **Information leakage in fuzzy commitment schemes.** *Trans Inf Forensic Secur* 2010, **5**(2):337-348.

Google Scholar

Ignatenko T, Willems FMJ: **Biometric systems: privacy and secrecy aspects.** *Trans Inf Forensic Secur* 2009, **4**(4):956-973.

Google Scholar

Zuo J, Ratha NK, Connel JH: **Cancelable iris biometric.** *Proc of the 19th Int Conf on Pattern Recognition 2008 (ICPR'08)* 2008, 1-4.

Google Scholar

Savvides M, Kumar B, Khosla P: **Cancelable biometric filters for face recognition.** *ICPR '04: Proc of the Pattern Recognition, 17th Int Conf on (ICPR'04)* 2004, **3:** 922-925.

Google Scholar

Hämmerle-Uhlr J, Pschernig E, Uhl A: **Cancelable iris biometrics using block re-mapping and image warping.** *Proc of the Information Security Conf 2009 (ISC'09) LNCS* 2009, **5735:** 135-142.

Google Scholar

Rathgeb C, Uhl A: **Two-factor authentication or how to potentially counterfeit experimental results in biometric systems.** *Proc of the Int Conf on Image Analysis and Recognition (ICIAR'10), Part II* **6112:** 296-305. LNCS 2010

Ratha NK, Connell JH, Chikkerur S: **Generating cancelable fingerprint templates.** *IEEE Trans Pattern Anal Mach Intell* 2007, **29**(4):561-572.

Google Scholar

Ratha NK, Connell JH, Bolle RM, Chikkerur S: **Cancelable biometrics: a case study in fingerprints.** *ICPR '06: Proc of the 18th Int Conf on Pattern Recognition* 2006, 370-373.

Google Scholar

Färberböck P, Hämmerle-Uhl J, Kaaser D, Pschernig E, Uhl A: **Transforming rectangular and polar iris images to enable cancelable biometrics.** In *Proc of the Int Conf on Image Analysis and Recognition (ICIAR'10)*. *Volume 6112*. Springer LNCS; 2010:276-386.

Google Scholar

Rathgeb C, Uhl A: **Secure iris recognition based on local intensity variations.** In *Proc of the Int Conf on Image Analysis and Recognition (ICIAR'10)*. *Volume 6112*. Springer LNCS; 2010:266-275.

Google Scholar

Maiorana E, Martinez-Diaz M, Campisi P, Ortega-Garcia J, Neri A: **Template protection for HMM-based on-line signature authentication.** *Proc Workshop Biometrics CVPR Conference* 2008, 1-6.

Google Scholar

Maiorana E, Martinez-Diaz M, Campisi P, Ortega-Garcia J, Neri A: **Cancelable biometrics for hmm-based signature recognition.** *Proc of the 2nd IEEE Int Conf on Biometrics: Theory, applications and systems (BTAS'08)* 2008, 1-6.

Google Scholar

Maiorana E, Campisi P, Fierrez J, Ortega-Garcia J, Neri A: **Cancelable templates for sequence-based biometrics with application to on-line signature recognition.** *Trans Syst Man Cybernet A Syst Hum* 2010, **40**(3):525-538.

Google Scholar

Boult T: **Robust distance measures for face-recognition supporting revocable biometric tokens.** *FGR '06: Proc of the 7th Int Conf on Automatic Face and Gesture Recognition* 2006, 560-566.

Google Scholar

Boult T, Scheirer W, Woodworth R: **Revocable fingerprint biotokens: Accuracy and security analysis.** *IEEE Computer Society Conference on Computer Vision and Pattern Recognition* 2007, **1:** 1-8.

Google Scholar

Boult T, Scheirer W: **Bio-cryptographic protocols with bipartite biotokens.** *Proc of the IEEE Biometric Symposium, BSYM '08* 2008, 9-16.

Google Scholar

Boult T, Scheirer W: **Bipartite biotokens: definition, implementation, and analysis.** *Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09)* **5558:** 775-785. LNCS: 2009

Teoh ABJ, Ngo DCL: **Biophasor: token supplemented cancellable biometrics.** *Proc of the Int Conf on Control, Automation, Robotics and Vision (ICARCV'06)* 2006, 1-5.

Google Scholar

Teoh ABJ, Yuang CT: **Cancellable biometrics realization with multispace random projections.** *IEEE Trans SMC B Recent Adv Biomet Syst* 2007, **37**(5):1096-1106.

Google Scholar

Teoh ABJ, Chong L-Y: **Secure speech template protection in speaker verification system.** *Speech Commun* 2010, **52**(2):150-163. 10.1016/j.specom.2009.09.003

Google Scholar

Kuan YW, Teoh ABJ, Ngo DCL: **Secure hashing of dynamic hand signatures using wavelet-Fourier compression with biophasor mixing and 2** ^{N} **discretization.** *EURASIP J Appl Signal Process* 2007, **2007**(1):32.

Google Scholar

Yip WK, Teoh ABJ, Ngo DCL: **Replaceable and securely hashed keys from online signatures.** *IEICE Electron Express* 2006, **3**(18):410-416. 10.1587/elex.3.410

Google Scholar

Kim Y, Toh K: **A method to enhance face biometric security.** *IEEE Int Conf on Biometrics: Theory, Applications, and Systems, BTAS '07* 2007, 1-6.

Google Scholar

Wang Y, Plataniotis K: **Face based biometric authentication with changeable and privacy preservable templates.** *Proc of the IEEE Biometrics Symposium* 2007, 11-13.

Google Scholar

Ouda O, Tsumura N, Nakaguchi T: **Bioencoding: a reliable tokenless cancelable biometrics scheme for protecting iris codes.** *IEICE Trans Inf Syst* 2010, **E93.D:** 1878-1888. 10.1587/transinf.E93.D.1878

Google Scholar

Ouda O, Tsumura N, Nakaguchi T: **Tokenless cancelable biometrics scheme for protecting iris codes.** *Proc of the 20th Int. Conf. on Pattern Recognition (ICPR'10)* 2010, 882-885.

Google Scholar

Pillai JK, Patel VM, Chellappa R, Ratha NK: **Sectored random projections for cancelable iris biometrics.** *Proc of the IEEE Int Conf. on Acoustics Speech and Signal Processing (ICASSP)* 2010, 1838-1841.

Google Scholar

Jeong MY, Lee C, Kim J, Choi JY, Toh KA, Kim J: **Changeable biometrics for appearance based face recognition.** *Proc of Biometric Consortium Conf, 2006 Biometrics Symposium* 2006, 1-5.

Google Scholar

Tulyakov S, Farooq F, Govindaraju V: **Symmetric hash functions for fingerprint minutiae.** *Int Workshop on Pattern Recognition for Crime Prevention (LNCS: 3687), Security and Surveillance* 2005, 30-38.

Google Scholar

Tulyakov S, Farooq F, Mansukhani P, Govindaraju V: **Symmetric hash functions for secure fingerprint biometric systems.** *Pattern Recogn Lett* 2007, **28**(16):2427-2436. 10.1016/j.patrec.2007.08.008

Google Scholar

Ang R, Safavi-Naini R, McAven L: **Cancelable key-based fingerprint templates.** *Proc of the Australasian Conf. on Information Security and Privacy ACISP'05* 2005, 242-252. (LNCS 3574)

Google Scholar

Yang B, Busch C, Gafurov D, Bours P: **Renewable minutiae templates with tunable size and security.** *Proc of the 20th Int Conf on Pattern Recognition (ICPR'10)* 2010, 878-881.

Google Scholar

Yang B, Hartung D, Simoens K, Busch C: **Dynamic random projection for biometric template protection.** *Proc of the 4th IEEE Int Conf on Biometrics: Theory, applications and systems (BTAS'10)* 2010, 1-7.

Google Scholar

Lee C, Choi J, Toh K, Lee S, Kim J: **Alignment-free cancelable fingerprint templates based on local minutiae information.** *IEEE Trans Syst Man Cybern B Cybern* 2007, **37**(4):980-992.

Google Scholar

Hirata S, Takahashi K: **Cancellable biometrics with perfect secrecy for correlation-based matching.** *Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09), LNCS* 2009, **5558:** 868-878.

Google Scholar

Takahashi K, Hirata S: **Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering.** *IEEE 3rd Int Conf on Biometrics: Theory, Applications, and Systems, BTAS '09* 2009, 1-6.

Google Scholar

Bringer J, Chabanne H, Kindarji B: **Anonymous identification with cancelable biometrics.** *Proc of the 6th Int Symposium on Image and Signal Processing and Analysis, ISPA '09* 2009, 494-499.

Google Scholar

Feng YC, Yuen PC, Jain AK: **A hybrid approach for face template protection.** *Proc of SPIE* 2008, **6944:** 694408-1-694408-11.

Google Scholar

Prasanalakshmi B, Kannammal A: **A secure cryptosystem from palm vein biometrics.** *ICIS '09: Proc of the 2nd Int Conf on Interaction Sciences* 2009, 1401-1405.

Google Scholar

Bringer J, Chabanne H, Kindarji B: **The best of both worlds: applying secure sketches to cancelable biometrics.** In *Paper presented at the WISSec*. Luxembourg City, Luxembourg; 2007.

Google Scholar

Gaddam SVK, Lal M: **Efficient cancellable biometric key generation scheme for cryptography.** *Int J Netw Secur* 2010, **11**(2):61-69.

Google Scholar

Lalithamani N, Soman K: **Irrevocable cryptographic key generation from cancelable fingerprint templates: an enhanced and effective scheme.** *Eur J Sci Res* 2009, **31:** 372-387.

Google Scholar

Lalithamani N, Soman K: **An effective scheme for generating irrevocable cryptographic key from cancelable fingerprint templates.** *Int J Comput Sci Netw Secur* 2009, **9**(3):183-193. (IJCSNS 09)

Google Scholar

Lalithamani N, Soman KP: **Towards generating irrevocable key for cryptography from cancelable fingerprints.** *Int Conf on Computer Science and Information Technology* 2009, 563-568.

Google Scholar

Gong Y, Deng K, Shi P: **Pki key generation based on iris features.** *Int Conf on Computer Science and Software Engineering* 2008, **6:** 166-169.

Google Scholar

Arul P, Shanmugam A: **Generate a key for AES using biometric for VOIP network security.** *J Theoretical Appl Inf Technol* 2009, 107-112.

Google Scholar

Khan MK, Zhang J, Wang X: **Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices.** *Chaos Solitons Frac* 2008, **35**(3):519-524. 10.1016/j.chaos.2006.05.061

Google Scholar

Han B-J, Shin Y-N, Jeun I-K, Jung H-C: **A framework for alternative pin service based on cancellable biometrics.** *Joint Workshop on Information Security, JWIS'09* 2009.

Google Scholar

Rathgeb C, Uhl A: **Iris-biometric hash generation for biometric database indexing.** *Proc of the 20th International Conference on Pattern Recognition (ICPR'10)* 2010, 2848-2851.

Google Scholar

Upmanyu M, Namboodiri AM, Srinathan K, Jawahar C: **Efficient privacy preserving video surveillance.** *Proc of the IEEE Int Conf on Computer Vision (ICCV'09)* 2009.

Google Scholar

Ratha NK, Connell JH, Bolle RM: **An analysis of minutiae matching strength.** *AVBPA '01: Proc of the Third Int Conf on Audio- and Video-Based Biometric Person Authentication* 2001, 223-228.

Google Scholar

Schuckers S, Hornak L, Norman T, Derakhshani R, Parthasaradhi S: **Issues for liveness detection in biometrics.** *Biometric Consortium Conference, 2002 Biometrics Symposium* 2002.

Google Scholar

Adler A: **Sample images can be independently restored from face recognition templates.** *Proc of the Canadian Conf on Electrical and Computer Engineering* 2003, **2:** 1163-1166.

Google Scholar

Adler A: **Vulnerabilities in biometric encryption systems.** *Audio- and video-based Biometric Person Authentication (AVBPA)* 2005, 1100'1109.

Google Scholar

Stoianov A, Kevenaar T, van der Veen M: **Security issues of biometric encryption.** *Proc of the Toronto Int. Conf. Science and Technology for Humanity (TIC-STH)* 2009, 34-39.

Google Scholar

Boyen X: **Reusable cryptographic fuzzy extractors, CCS'2004 Proc. of the 11th ACM Conf. on Computer and Communications Security.** 2004, 82-91.

Google Scholar

Scheirer W, Boult T: **Cracking fuzzy vaults and biometric encryption.** *Biomet Symp* 2007, **2007:** 1-6.

Google Scholar

Rathgeb C, Uhl A: **Statistical attack against iris-biometric fuzzy commitment schemes.** *Proc of the IEEE Computer Society and IEEE Biometrics Council Workshop on Biometrics (CVPRW'11)* 2011, 25-32.

Google Scholar

Failla P, Sutcu Y, Barni M: **esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics.** *Proc of the 12th ACM workshop on Multimedia and security MM&Sec '10* 2010, 241-246.

Google Scholar

Simoens K, Tuyls P, Preneel B: **Privacy weaknesses in biometric sketches.** *Proc of the 30th IEEE Symposium on Security and Privacy* 2009, 188-203.

Google Scholar

Buhan-Dulman I, Merchan JG, Kelkboom E: **Efficient strategies for playing the indistinguishability game for fuzzy sketches.** *Proc of IEEE Workshop on Information Forensics and Security (WIFS)* 2010.

Google Scholar

Kelkboom ERC, Breebaart J, Kevenaar TAM, Buhan I, Veldhuis RNJ: **Preventing the decodability attack based crossmatching in a fuzzy commitment scheme.** *Trans Inf Forensic Secur* 2011, **6**(1):107-121.

Google Scholar

Daugman J: **The importance of being random: statistical principles of iris recognition.** *Pattern Recogn* 2003, **36**(2):279-291. 10.1016/S0031-3203(02)00030-4

Google Scholar

Buhan IR, Breebaart J, Guajardo J, de Groot K, Kelkboom E, Akkermans T: **A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem.** *Proc of the First Int. Workshop Signal Processing in the Encrypted Domain (SPEED '09)* 2009, 82-99.

Google Scholar

Chang E-C, Shen R, Teo FW: **Finding the original point set hidden among chaff.** *ASIACCS '06: Proc of the 2006 ACM Symposium on Information, Computer and Communications Security* 2006, 182-188.

Google Scholar

Mihailescu P: **The fuzzy vault for fingerprints is vulnerable to brute force attack.** *CoRR* 2007., **abs/0708.2974:**

Google Scholar

Miri A, Poon HT: **A collusion attack on the fuzzy vault scheme.** *ISC Int J Inf Secur* 2009, **1**(1):27-34.

Google Scholar

Hong S, Jeon W, Kim S, Won D, Park C: **The vulnerabilities analysis of fuzzy vault using password.** *FGCN '08: Proc of the 2008 Second Int Conf on Future Generation Communication and Networking* 2008, 76-83.

Google Scholar

Kümmel K, Vielhauer C: **Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting.** *Proc of the 12th ACM workshop on Multimedia and security, MM&Sec '10* 2010, 67-72.

Google Scholar

Delivasilis DL, Katsikas SK: **Side channel analysis on biometric-based key generation algorithms on resource constrained devices.** *Int J Netw Secur* 2005, **3**(1):44-50.

Google Scholar

Tao Z, Ming-Yu F, Bo F: **Side-channel attack on biometric cryptosystem based on keystroke dynamics.** *The First International Symposium on Data, Privacy, and E-Commerce, (ISDPE 2007)* 2007, 221-223.

Google Scholar

Karakoyunlu D, Sunar B: **Differential template attacks on PUF enabled cryptographic devices.** *Proc of IEEE Workshop on Information Forensics and Security (WIFS)* 2010.

Google Scholar

Quan F, Fei S, Anni C, Feifei Z: **Cracking cancelable fingerprint template of Ratha.** *Int Symposium on Computer Science and Computational Technology* 2008, **2:** 572-575.

Google Scholar

Shin SW, Lee M-K, Moon D, Moon K: **Dictionary attack on functional transform-based cancelable fingerprint templates.** *ETRI J* 2009, **31**(5):628-630. 10.4218/etrij.09.0209.0137

Google Scholar

Cimato S, Gamassi M, Piuri V, Sassi R, Scotti F: **Privacy in biometrics.** In *Biometrics: Fundamentals, Theory, and Systems*. Wiley, London; 2009.

Google Scholar

Jain AK, Ross A, Pankanti S: **Biometrics: a tool for information security.** *IEEE Trans Inf Forensic Secur* 2006, **1:** 125-143. 10.1109/TIFS.2006.873653

Google Scholar

Delvaux N, Chabanne H, Bringer J, Lindeberg P, Midgren J, Breebaart J, Akkermans T, van der Veen M, Veldhuis R, Kindt E, Simoens K, Busch C, Bours P, Gafurov D, Yang B, Stern J, Rust C, Cucinelli B, Skepastianos D: **Pseudo identities based on fingerprint characteristics.** *IIH-MSP '08: Proc of the 2008 Int Conf on Intelligent Information Hiding and Multimedia Signal Processing* 2008, 1063-1068.

Google Scholar

Bringer J, Despiegel V: **Binary feature vector fingerprint representation from minutiae vicinities.** *Proc of the 4th IEEE Int Conf on Biometrics: Theory, Applications and Systems (BTAS'10)* 2010, 1-6.

Google Scholar

Xu H, Veldhuis RN: **Binary representations of fingerprint spectral minutiae features.** *Proc of the 20th Int Conf on Pattern Recognition (ICPR'10)* 2010, **1212:**-1216.

Google Scholar

Barni M, Bianchi T, Catalano D, Di RM, Donida LR, Failla P, Fiore D, Lazzeretti R, Piuri V, Scotti F, Piva A: **Privacy preserving fingercode authentication.** *Proc of the 12th ACM workshop on Multimedia and security MM&Sec '10* 2010, 231-240.

Google Scholar

Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV: **Blind authentication: a secure crypto-biometric verification protocol.** *Trans Inf Forensic Secur* 2010, **5**(2):255-268.

Google Scholar

Willems F, Ignatenko T: **Identification and secret-key binding in binary-symmetric template-protected biometric systems.** *Proc of IEEE Workshop on Information Forensics and Security (WIFS)* 2010.

Google Scholar

Kelkboom EJC, Molina GG, Breebaart J, Veldhuis RNJ, Kevenaar TAM, Jonker W: **Binary biometrics: an analytic 22 framework to estimate the performance curves under Gaussian assumption.** *Trans Syst Man Cybern A Syst Hum* 2010, **40**(3):555-571.

Google Scholar

Breebaart J, Busch C, Grave J, Kindt E: **A reference architecture for biometric template protection based on pseudo identities.** *Proc of the BIOSIG 2008: Biometrics and Electronic Signatures* 2008, 25-38.

Google Scholar