Evans N, Marcel S, Ross A, Teoh ABJ(2015) Biometrics security and privacy protection. IEEE Signal Process Mag 32(5):17–18.
[2]Johnson W, Lindenstrauss J (1984) Extensions of Lipschitz maps into a hilbert space. Contemporary Mathimatics 26:189–206.
[3] Jain, A.K., Ross, A., Prabhakar, S., "An Introduction toBiometric Recognition", IEEE Trans. on Circuits andSystems for Video Technology, January 2004,Vol. 14, No.1, pp 4-20
[4] R. Cappelli, M. Ferrara, D. Maltoni, Minutia Cylinder Code : a new representation and matching technique for fingerprint recognition, IEEE Transactions on Pattern Analysis and Machine
Intelligence, 32(12) (2010) 2128-2141
[5] M. Ferrara, R. Cappelli, D. Maltoni, Non-invertible minutia cylinder code representation, IEEE
Transactions on Inf. Forensics security 7(6) (2012) 1727-1737
[6] Cancelable Biometrics: Fingerprint Shell combinedwith Quantization and Bit String generation Chinthamred by premsai
July 4, 2014
[7] Towards Cancelable Multi- Biometrics Based On Bloom Filters:
A case study on Feature Level Fusion Of Face and Iris
[9] Jain, A.K., Ross, A., Prabhakar, S., "An Introduction to Biometric Recognition", IEEE Trans. on Circuits and Systems for Video Technology, January 2004,Vol. 14, No.
1, pp 4-20