[1] S. Hong, H. Kim, S. Lee, and Y. Chung, “Analyzing the secure and energy
efficient transmissions of compressed fingerprint images using
encryption and watermarking,” International Conference for Young
computer Scientists, pp. 2803–2808, 2008.
[2] S. Zhao , H. Li, X. Yan, “A secure and efficient fingerprint images
encryption scheme,” The 9th International Conference for Young
Computer Scientists, pp. 316–320, 2008.
[3] L.Hong, Y.Wan, A.Jain, “Fingerprint image enhancement algorithm and
performance evaluation,” IEEE Trans. Pattern and Mach, Intell, 20(8)
(1998)777-789.
[4] J. FRIDRICH," Symmetric Ciphers Based on Two-Dimensional Chaotic
Maps,"
[5] International Journal of Bifurcation and Chaos, Vol. 8, No. 6 (1998)
1259{1284
[6] C. E. Shannon, “Communication theory of secrecy system,” Bell Syst.
Tech. J. 28, 656–715
[7] P.Patel ,M.Rajpoot, "Secure Fingerprint Identification System and
Matching by Using Image Registration and Key Matching Techniques,"
Proceeding of the International Journal of Engineering Research &
Technology (IJERT) , Vol. 2 , June – 2013.
[8] T. Stathaki, Image Fusion: Algorithms and Applications. New York:
Academic, 2008.
[9] A. Wang, H. J. Sun, and Y. Y. Guan, “The application of wavelet
transform to multi-modality medical image fusion,” Proceedings of the
2006 IEEE International Conference on Networking, Sensing and Control,
(ICNSC), pp. 270-274, 2006.
[10] E. A. Naeem, Mustafa M. AbdElnaby, Mohiy M. Hadhoud and F. E. Abd
El Samie, “Chaotic image encryption in transform domains”, Proceedings
of The 2009 International Conference on Computer Engineering &
Systems (ICCES’09), pp. 288-293, 2009.
[11] S. Kumar D R, K B Raja, R K Chhotaray, S Pattanaik," DWT Based
Fingerprint Recognition using Non Minutiae Features," IJCSI International
Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
[12] N.A Flayh, S.I. Ahson, “Wavelet based image encryption”, Proceedings of
the 9th International Conference on Signal Processing (ICSP), pp. 797-800,
2008.
[13] C.C. Chang, M.S. Hwang, T.S. Chen, “A New Encryption Algorithm for
Image Cryptosystems,” Journal of Syst. Software 58 (2001), pp. 83–91.
[14] Khamies El-Shennawy, Author, book title, “Communication Theory and
Signal Processing For Transform Coding,” Bentham Science Publishers,
2014, eISBN:978-1-60805-830-3, and ISBN:978-1-60805-831-0,(chapter
10)