1 M. Yeung, "Verification Watermarks on Fingerprint Recognition and Retrieval" 9 : 468-476, 2002
2 M. Droogenbroeck, "Techniques for a Selective Encryption of Uncompressed and Compressed Images" 90-97, 2002
3 R. Pfarrhofer, "Selective Image Encryption using JBIG" 98-107, 2005
4 M. Podesser, "Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments" 2002.
5 L. Rila, "Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication"
6 A. Jain, "Personal Identification in Networked Society" Kluwer Academic Publishers 1999.
7 D. Mon, "Performance Analysis of the Match-on-Card System for the Fingerprint Authentication" 449-459, 2001
8 G. Davida, "On Enabling Secure Applications through Off-Line Biometric Identification" 148-157, 1998
9 A. Jain, "Hiding Fingerprint Minutiae in Images Proc. of AutoID" 28 : 2002
10 D. Maltoni, "Handbook of Fingerprint Recognition" 2003.
1 M. Yeung, "Verification Watermarks on Fingerprint Recognition and Retrieval" 9 : 468-476, 2002
2 M. Droogenbroeck, "Techniques for a Selective Encryption of Uncompressed and Compressed Images" 90-97, 2002
3 R. Pfarrhofer, "Selective Image Encryption using JBIG" 98-107, 2005
4 M. Podesser, "Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments" 2002.
5 L. Rila, "Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication"
6 A. Jain, "Personal Identification in Networked Society" Kluwer Academic Publishers 1999.
7 D. Mon, "Performance Analysis of the Match-on-Card System for the Fingerprint Authentication" 449-459, 2001
8 G. Davida, "On Enabling Secure Applications through Off-Line Biometric Identification" 148-157, 1998
9 A. Jain, "Hiding Fingerprint Minutiae in Images Proc. of AutoID" 28 : 2002
10 D. Maltoni, "Handbook of Fingerprint Recognition" 2003.
11 W. Stallings, "Cryptography and Network Security: Principals and Practice" Pearson Ed. Inc. 2003
12 Y. Moon, "Collaborative Fingerprint Authentication by Smart Card and a Trusted Host" 1 : 108-112, 2000
13 A. Jain, "Biometrics-Based Web Access" 1998.
14 R. Bolle, "Biometric Perils and Patches" 35 : 2727-2738, 2002
15 N. Ratha, "An Analysis of Minutiae Matching Strength" 223-228, 2001
16 S. Lian, "A Selective Image Encryption based on JPEG2000 Codec" 65-72, 2004
17 D. Maio, "A Secure Protocol for Electronic Commerce Based on Fingerprints and Encryption" 519-525, 1999
18 S. Pan, "A Memory-Efficient Fingerprint Verification Algorithm using a Multi-Resolution Accumulator Array for Match-on-Card" 25 : 179-186, 2003
19 Z. Liu, "A Lightweight Encryption Algorithm for Mobile Online Multimedia Devices" 653-658, 2004