[1] A. K. Jain, A. A. Ross, and K. Nandakumar,” Introduction to Biometrics”, Springer, 2017.
[2] N. K.Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems”, IBM Systems Journal, Vol. 40, pp. 614–634, 2001.
[3] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29,pp. 561–572, 2007.
[4] A. B. J. Teoh, D. Ngo, and A. Goh, “Biohashing: two factor authentication featuring fingerprint data and tokenised random number”, Pattern Recognition, Vol. 37, pp. 2245–2255, 2004.
[5] M. Savvides, B.V. Kumar and P. K. Khosla, “Cancelable biometric filters for face recognition”, Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), Vol. 3, pp. 922–925, 2004.
[6] L. C. Jain, “Intelligent Biometric Techniques in Fingerprint and Face recognition”, 1999.
[7] T. E. Boult, W. J. Scheirer and R. Woodworth, “Revocable fingerprint biotokens: Accuracy and security analysis”, IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8, 2007.
[8] E. Maiorana, P. Campisi, J. Ortega-Garcia, and A. Neri, “Cancelable Biometrics for HMM-based Signature Recognition”, IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS), 2008.
[9] A. Juels, and M. Wattenberg, “A fuzzy commitment scheme”, Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS), pp. 28–36, 1999.
[10] S. Kanade, D. camara, E. Krichen, D.
Petrovska-Delacretaz, and B. Dorizzi, “Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris”, The 6th Biometrics Symposium (BSYM)
, 2008.
[11] S. Kanade, D.
Petrovska-Delacretaz, and B. Dorizzi, “Generating and Sharing Biometrics Based Session Keys for Secure Cryptographic Applications”, IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS)
, 2010.
[12] S. Kanade, D.
Petrovska-Delacretaz, and B. Dorizzi, “Obtaining Cryptographic Keys Using Feature Level Fusion of Iris and Face Biometrics for Secure User Authentication”, IEEE CVPR Workshop on Biometrics
, 2010.
[13] P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding", Optics Letters, Vol. 20, pp. 767-769, 1995.
[14] T.-C. Poon, “Optical Scanning Holography with MATLAB”, Springer, New York, 2007.
[15] B. D. Duncan and T.-C. Poon, “Gaussian beam analysis of optical scanning holography,” J. Opt. Soc. Am. 9, 229–236 (1992).
[16] A. M. Elshamy, A. N. Z. Rashed, A. A. Mohamed, O. S. Faragallah, Y. Mu, S. A. Alshebeili, and F. E. Abd El-Samie, “Optical image encryption based on chaotic Baker map and double random phase encoding”, IEEE Journal of Lightwave Technology, Vol. 31, No.15, pp. 2533-2539, 2013.
[17] SC. Pei, and MH. Yeh, “Two dimensional discrete fractional Fourier transform”, Signal Processing, Vol. 67, pp 99-108, 1998.
[18] H. M. Ozaktas, “Fractional Fourier Domains”, Signal Processing, Vol. 46, pp. 119–124, 1995.
[19] S. K. Rajputa, and N. K. Nishchal, “Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm”, Optics Communications, Vol. 388, pp. 38–46, 2017.
[20] R. Soliman, G. El-Banby, A. D. Algarni, M. Elsheikh,“Double Random Phase Encoding for Cancelable Face and Iris Recognition”, Applied optics, Vol. 57, pp. 10305–10316, 2018.
D. Giveki, M. A. Soltanshahi, and G. A. Montazer, " A new image feature descriptor for content based image retrieval using scale invariant feature transform and local derivative pattern", Optik -