] S. Rane, Y. Wang, S. C. Draper, and P. Ishwar, ‘‘Secure biometrics: Concepts, authentication architectures and challenges,’’ IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 51–64, Sep. 2013
[2] I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, and J. Yearwood, “Protection of Privacy in Biometric Data,” IEEEAccess, vol. 4, pp. 880–892,2016.
[3] K. Nandakumar and A. K. Jain, ‘‘Biometric template protection: Bridging the performance gap between theory and practice, IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 88–100, Sep. 2015
[4] A. Hadid, N. Evans, S. Marcel, J. Fierrez, “Biometrics systems under spoofing attack an evaluation methodology and lessons learned,” IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 20–30, Sept 2015.
[5] Daniel F Smith, Arnold Wiliem, and Brian C Lovell, “Face recognition on consumer devices: Reflections on replay attacks,” IEEE Transactions on Information Forensics and Security, vol 10, no. 4, pp. 736–745, April 2015.
[6] M. Barni, G. Droandi, R. Lazzeretti, “Privacy protection in biometric-based recognition systems: a marriage between cryptography and signal processing,” IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 66–76, Sept 2015.
[7] V. M. Patel, N. K. Ratha, and R. Chellappa, “Cancelable biometrics: A review,” IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 54–65, Sept 2015
[8] M. Lim, A.-B. Teoh, and J. Kim, ‘‘Biometric feature-type transformation: Making templates compatible for secret protection,’’, IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 77–87, Sep. 2015.
[9] A. Hadid, N. Evans, S. Marcel, and J. Fierro, ‘‘Biometrics systems under spoofing attack: An evaluation methodology and lessons learned,’’ IEEE Signal Processing Magazine., vol. 32, no. 5, pp. 20–30, Sep. 2015.
[10] J. K. Pillai, V. M. Patel, R. Chellappa and N. K. Ratha, ‘‘Sectored random projections for cancelable iris biometrics,’’ in ICASSP, 2010, pp. 1838–1841.
[11] J. K. Pillai, V. M. Patel, R. Chellappa and N. K. Ratha, ‘‘Secure and robust iris recognition using random projections and sparse representations,’’ IEEE Trans. Pattern Anal. Mach. Intell. 30(9), 1877 (2011)
[12] P. P. Paul and M. Gavrilova, “Multimodal cancelable biometrics,’’ in Proc. Kyoto, pp. 43–49, August 22–24, 2012.
[13] N. K. Ratha, J. H. Connel and R. Bolle, ‘‘Enhancing security and privacy in biometrics-based authentication systems,’’ IBM System J. vol.40, no. 3, 614 (2001)
[14] E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia and A. Neri, ‘‘Cancelable templates for sequence-based biometrics with application to on-line signature recognition’’ IEEE Trans. Syst. Man Cybern. A, vol.40, no. 3, 525 (2010).
[15] A.B.J. Teoh, D.C.L. Ngo, A. Goh, “Personalised cryptographic key generation based on FaceHashing", Comput. Security J. vol.23 no.7, pp .606–614, 2004.
[16] C. Rathgeb, F. Breitinger, C. Busch and H. Baier, “On application of bloom filters to iris
biometrics," IET Biometrics vol.3, no.4, 2014.
[17] T Adiono, KS Prakoso, CD Putratama, B Yuwono and S Fuada, “HOG-AdaBoost Implementation for Human Detection Employing FPGA ALTERA DE2-115"International Journal of Advanced Computer and Applications Processing Magazine, Vol. 9, No. 10, 2018.
[18] C. H. Chuang and Y. L. Chen, “Steganographic optical image encryption system based on reversible data hiding and double random phase encoding,” Opt. Eng. Processing Magazine, vol.52, no.2, 2013
[19] A. M. Elshamy, F. E. Abd El-Samie, O. S. Faragallah, E. M. Elshamy,H. S. El-Sayed, S. F. El-Zoghdy, A. N. Z. Rashed, A. A. Mohamed, and A. Q. Alhamad, “Optical image cryptosystem using double random phase encoding and Arnold’s Cat map,” Opt. QuantumElectron. Vol.48, pp.1–18, 2016.
[21] L. Lenc and P. Kral, “Automatic face recognition system based on the SIFT features,” Comput. Electr. Eng. 46, 256–272 (2015).