[1] A. K. Jain, A. A. Ross, and K. Nandakumar, “ Introduction to Biometrics,” Springer, 2011, http://www.csee.wvu.edu/ross/BiometricsTextBook.
[2] Ritu and M. Garg, “A Review on Fingerprint Based Identification System,” SBIET College IJARCCE, Vol. 3, No. 3, 2014.
[3] L. Kocarev, S. Lian, “Chaos-Based Cryptography”, Algorithms and Applications, vol. 354, Berlin 2011.
[4] C.C. Chang, M.S. Hwang, T.S. Chen, "A New Encryption Algorithm for Image Cryptosystems," Proceedings of the Journal of Syst. Software, vol. 58, pp. 83–91, 2001.
[5] Alfalou A, Alkolidi A (2005) “Implementation of an all- optical image compression architecture based on
[6] fourier transform which will be the core principle in the realization of DCT”, Proc. SPIE 5823, pp. 183: 190V. M. Patel, N. K. Ratha, and R. Chellappa, “Cancelable biometrics: A Review,” Proceedings of the IEEE Signal Processing Magazine 32(5), 54-65, 2015.
[7] A. Sarkar and B. K. Singh “Cancelable biometric based key generation for symmetric cryptography,” International Conference on Inventive Communication and Computational Technologies (ICICCT),doi:10.1109/icicct.2017.7975229,2017.
[8] H. Kaur and P. Khanna, “Non-invertible biometric encryption to generate Cancelable biometric templates,” Proceedings of the world Congress on Engineering and Computer Science, San Francisco USA I, October 25-27, 2017.
[9] Wei-Chao Liu and Hong-tao Guo, “Occluded Fingerprint Recognition Algorithm Based on Multi Association Features Match,” Proceedings of the Journal Of Multimedia, Vol. 9, No. 7, pp. 910 - 917, 2014.
[10] S. Wang, G. Deng, and J. Hu, “A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations,” Proceedings of the Pattern Recognition Vol. 61, pp. 447-458, 2017.
[11] W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, “A fingerprint and finger-vein based cancelable multi-biometric system, ” Proceedings of the Pattern Recognition Vol. 78, pp. 242-251, 2018.
[12] Z. Jin, M.H.Lim, A.B.J.Teoh, B.M.Goi, “A non-invertible randomized graph- based Hamming embedding for generating cancelable fingerprint template,” Pattern Recognit. Lett., Vol. 42,
[13] S. Wang and J. Hu, “Design of alignment-free cancelable fingerprint templates via curtailed circular convolution,” Proceedings of the Elsevier J. Pattern Recognition. Vol.47, no. 3, pp. 1321- 1329, 2014.
[14] P. Das, K. Karthik and B. C. Garai, “A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs," Proceedings of the Elsevier J. Pattern Recognition. Vol. 45, no. 9, pp. 3373-3388 , 2012.
[15] Carmen Pellicer- Lostao, Ricardo Lopez-Ruiz, “Notions of Chaotic Cryptography, Sketch of a Chaos based Cryptosystem”, Proceedings of the Applied Cryptosystem and network Security (Intech Books), 1st Edition, pp. 267-294, March 2012.
[16] G. Bhatnagar, and Q. Wu, “Chaos-Based Security Solution for Fingerprint Data during Communication and Transmission,” Proceedings of the Instrumentation and Measurement, IEEE Transactions on, Vol. 61, No. 4, pp. 876-887, 2012.
[17] Ensherah A. Naeem, Mustafa M. Abd Elnaby , Naglaa F. Soliman , Alaa M. Abbas, Osama S. Faragallah, Noura Semary, Mohiy M. Hadhoud f, Saleh A. Alshebeili, Fathi E. Abd El-Samie, " Efficient implementation of chaotic image encryption in transform domains", Proceedings of the Journal of Systems and Software, Vol. 97, pp. 118–127 , 2014.
[18] B. V. K. V. Kumar, A. Mahalanobis, and R. D. Juday, “Correlation Pattern Recognition,” Cambridge Univ. Press, 2005.
[19] A. Sarkar, B. K. Singh, and U. Bhaumik, “Cryptographic Key Generation Scheme from Cancellable Biometrics,” Progress in Computing Analytics and Networking 265–272.doi:10.1007/978-981-10-7871-2_26, 2018.
[20] Soliman RF, Amin M, Abd El-Samie FE ," A double random phase encoding approach for cancelable Iris recognition," Springer, Optical and Quantum Electronics no.50, Vol.326, pp.1–12,2018.
[21] S. Wang, and J. Hu, “A blind system identification approach to cancelable fingerprint templates,” Proceedings of Pattern Recognition Vol. 54, pp. 14-22, 2016.
[22] Technical Document about FAR, FRR and ERR, Version 1.0, by SYRIS Technology Corporation, 2004.
[23] Wu, J. C., and Wilson, C. L., “An empirical study of sample size in ROC-curve analysis of fingerprint data,” Proceedings of the
Biometric Technology for Human Identification III (SPIE), Vol. 6202, DOI: 10.1117/12.665601, 2006.
[24] Fingerdata base http://bias.csr.unibo.it/fvc2002/databases.asp ,Accessed July 2018.
[25] CASIA-Iris V3 Database, http://www.cbsr.ia.ac.cn/ English/Iris Data base.asp. Accessed December 2018.
[26] CASIA Palmprint Database, http://biometrics.idealtest.org / Accessed July 2018.
[27] ORL database: https://www.cl.cam.ac.uk/research/dtg/ attarchive /facedatabase.html, Accessed July 2018.