References
[1]A. Jain, K. Nandakumar, A. Nagar, "Biometric Template Security", EURASIP Journal on Advances in Signal Processing, Vol. 2008, No. 1, p. 579416, 2008.
[2]U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, "Biometric cryptosystems: issues and challenges", Proceedings of the IEEE, Vol. 92, No. 6, pp. 948-960, 2004.
[3]A. Cavoukian, A. Stoianov, “Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy,” Office of the Information and Privacy Commissioner of Ontario, Technical Report, 2007.
[4]A. Vetro, N. Memon, “Biometric System Security,” Tutorial presented at Second International Conference on Biometrics, Seoul, South Korea, 2007.
[5]C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B. Vijaya Kumar, “Biometric encryption: enrollment and verification procedures”, in the Proceedings of SPIE: Optical Pattern Recognition, pp. 24–35, 1998.
[6]C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B. Vijaya Kumar, "Biometric Encryption using image processing", Optical Security and Counterfeit Deterrence Techniques II, 1998.
[7]C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B. Vijaya Kumar, “Biometric encryption”, ICSA Guide to Cryptography, 1999.
[8]C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B. Vijaya Kumar, "Biometric Encryption using image processing", Optical Security and Counterfeit Deterrence Techniques II, 1998.
[9]A. Juels and M. Wattenberg, "A fuzzy commitment scheme", Proceedings of the 6th ACM conference on Computer and communications security - CCS `99, 1999.
[10]A. Juels and M. Sudan, "A Fuzzy Vault Scheme", Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006.
[11]Y. Feng and P. Yuen, "Binary Discriminant Analysis for Generating Binary Face Template", IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 613-624, 2012.
[12]S. Adamovic, M. Milosavljevic, M. Veinovic, M. Sarac and A. Jevremovic, "Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics", IET Biometrics, vol. 6, no. 2, pp. 89-96, 2017.
[13]S. Sapkal and R. Deshmukh, "Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment", Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS `16, 2016.
[14]L. You and T. Wang, "A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion", Soft Computing, vol. 23, no. 11, pp. 3843-3851, 2018.
[15]D. Chitra and V. Sujitha, "Security analysis of prealigned fingerprint template using fuzzy vault scheme", Cluster Computing, vol. 22, no. 5, pp. 12817-12825, 2018.
[16]V. Sujitha and D. Chitra, "Highly secure palmprint based biometric template using fuzzy vault", Concurrency and Computation: Practice and Experience, vol. 31, no. 12, 2018.
[17]B. Gilkalaye, A. Rattani and R. Derakhshani, "Euclidean-Distance Based Fuzzy Commitment Scheme for Biometric Template Security", 7th International Workshop on Biometrics and Forensics (IWBF), 2019.
[18]S. Chauhan and A. Sharma, "Improved fuzzy commitment scheme", International Journal of Information Technology, 2019.
[19]M. Sandhya, M. Dileep, A. Murthy and M. Misbahuddin, "Fingerprint Cryptosystem Using Variable Selection of Minutiae Points", Advances in Intelligent Systems and Computing, pp. 359-369, 2020.
[20]D. Mohan, N. Sankaran, S. Tulyakov, S. Setlur and V. Govindaraju, "Significant Feature Based Representation for Template Protection", IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2019.
[21]N. Riaz, A. Riaz and S. Khan, "Biometric template security: an overview", Sensor Review, vol. 38, no. 1, pp. 120-127, 2018.
[22]C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics", EURASIP Journal on Information Security, vol. 2011, no. 1, 2011.
[23]E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers and B. Skoric, "Key Extraction From General Nondiscrete Signals", IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 269-279, 2010.
[24]Y. Dodis, L. Reyzin and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data", Advances in Cryptology - EUROCRYPT 2004, pp. 523-540, 2004.
[25]D. Ngo, A. Teoh and A. Goh, "Biometric hash: high-confidence face recognition", IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 6, pp. 771-775, 2006.
[26]Y. Sutcu, Q. Li and N. Memon, "Protecting Biometric Templates With Sketch: Theory and Practice", IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 503-512, 2007.
[27]W. Sheng, S. Chen, G. Xiao, J. Mao and Y. Zheng, "A Biometric Key Generation Method Based on Semisupervised Data Clustering", IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 45, no. 9, pp. 1205-1217, 2015.
[28]E. Zaghouani, A. Benzina and R. Attia, "ECG biometrie template protection based on secure sketch scheme", 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2017.
[29]A. Anees and Y. Chen, "Discriminative binary feature learning and quantization in biometric key generation", Pattern Recognition, vol. 77, pp. 289-305, 2018.
[30]A. Jindal, S. Chalamala and S. Jami, "Face Template Protection Using Deep Convolutional Neural Network", IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2018.
[31]A. Jindal, S. Rao Chalamala and S. Jami, "Securing Face Templates using Deep Convolutional Neural Network and Random Projection", IEEE International Conference on Consumer Electronics (ICCE), 2019.
[32]V. Talreja, M. Valenti and N. Nasrabadi, "Multibiometric secure system based on deep learning", IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2017.
[33]V. Talreja, S. Soleymani, M. Valenti and N. Nasrabadi, "Learning to Authenticate with Deep Multibiometric Hashing and Neural Network Decoding", 2019 IEEE International Conference on Communications (ICC), 2019.
[34]V. Talreja, M. Valenti and N. Nasrabadi, “Zero-Shot Deep Hashing and Neural Network Based Error Correction for Face Template Protection”, arXiv preprint arXiv: 1908.02706, 2019.
[35]G. Mai, K. Cao, X. Lan and P. Yuen, "SecureFace: Face Template Protection", IEEE Transactions on Information Forensics and Security, vol. 16, pp. 262-277, 2020.
[36]Z. Wu, B. Liang, L. You, Z. Jian, J. Li, "High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia", Soft Computing, vol. 20, no. 12, pp. 4907-4918, 2015.
[37]R. Belguechi, E. Cherrier, V. Alimi, P. Lacharme and C. Rosenberger, "An Overview on Privacy Preserving Biometrics", Recent Application in Biometrics, 2011.
[38]R. Bolle, J. Connell and N. Ratha, "Biometric perils and patches", Pattern Recognition, vol. 35, no. 12, pp. 2727-2738, 2002.
[39]A. Goh and D. Ngo, "Computation of Cryptographic Keys from Face Biometrics", Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, pp. 1-13, 2003.
[40]T. Connie, A. Teoh, M. Goh and D. Ngo, "PalmHashing: a novel approach for cancelable biometrics", Information Processing Letters, vol. 93, no. 1, pp. 1-5, 2005.
[41]A. Teoh, Y. Kuan and S. Lee, "Cancellable biometrics and annotations on BioHash", Pattern Recognition, vol. 41, no. 6, pp. 2034-2044, 2008.
[42]Jinyu Zuo, N. Ratha and J. Connell, "Cancelable iris biometric", 19th International Conference on Pattern Recognition, 2008.
[43]L. Ghammam, M. Barbier and C. Rosenberger, "Enhancing the Security of Transformation Based Biometric Template Protection Schemes", International Conference on Cyberworlds (CW), 2018.
[44]C. Rosenberger, "Evaluation of Biometric Template Protection Schemes based on a Transformation", Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018.
[45]M. Hammad, G. Luo and K. Wang, "Cancelable biometric authentication system based on ECG", Multimedia Tools and Applications, vol. 78, no. 2, pp. 1857-1887, 2018.
[46]A. Teoh, S. Cho and J. Kim, "Random permutation Maxout transform for cancellable facial template protection", Multimedia Tools and Applications, vol. 77, no. 21, pp. 27733-27759, 2018.
[47]X. Dong, Z. Jin, A. Teoh, “A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics”, arXiv:1905.03021, 2019.
[48]Y. Chen, Y. Wo, R. Xie, C. Wu and G. Han, "Deep Secure Quantization: On secure biometric hashing against similarity-based attacks", Signal Processing, vol. 154, pp. 314-323, 2019.
[49]K. Atighehchi, L. Ghammam, M. Barbier and C. Rosenberger, "GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates", Future Generation Computer Systems, vol. 101, pp. 819-830, 2019.
[50]E. Abdellatef, N. Ismail, S. Abd Elrahman, K. Ismail, M. Rihan and F. Abd El-Samie, "Cancelable fusion-based face recognition", Multimedia Tools and Applications, vol. 78, no. 22, pp. 31557-31580, 2019.
[51]A. Singh, A. Arora, G. Jaswal and A. Nigam, "Comprehensive survey on cancelable biometrics with novel case study on finger dorsal template protection", Journal of Banking and Financial Technology, vol. 4, no. 1, pp. 37-52, 2020.
[52]]A. S and K. Anil Kumar, "Security and performance enhancement of fingerprint biometric template using symmetric hashing", Computers & Security, vol. 90, p. 101714, 2020.
[53]N. Ratha, J. Connell and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
[54]N. Ratha, S. Chikkerur, J. Connell and R. Bolle, "Generating Cancelable Fingerprint Templates", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, 2007.
[55]Y. Sutcu, H. Sencar and N. Memon, "A secure biometric authentication scheme based on robust hashing", Proceedings of the 7th workshop on Multimedia and security, 2005.
[56]S. Khan, M. Ali Akbar, F. Shahzad, M. Farooq and Z. Khan, "Secure biometric template generation for multi-factor authentication", Pattern Recognition, vol. 48, no. 2, pp. 458-472, 2015.
[57]Y. Liu, J. Ling, Z. Liu, J. Shen and C. Gao, "Finger vein secure biometric template generation based on deep learning", Soft Computing, vol. 22, no. 7, pp. 2257-2265, 2017.
[58]Z. Jin, J. Hwang, Y. Lai, S. Kim and A. Teoh, "Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing", IEEE Transactions on Information Forensics and Security, vol. 13, no. 2, pp. 393-407, 2018.
[59]X. Dong, K. Wong, Z. Jin and J. Dugelay, "A Secure Visual-thermal Fused Face Recognition System Based on Non-Linear Hashing", IEEE 21st International Workshop on Multimedia Signal Processing (MMSP), 2019.
[60]X. Dong, K. Wong, Z. Jin and J. Dugelay, "A Cancellable Face Template Scheme Based on Nonlinear Multi-Dimension Spectral Hashing", 7th International Workshop on Biometrics and Forensics (IWBF), 2019.
[61]L. Debiasi, S. Kirchgasser, B. Prommegger, A. Uhl, A. Grudzien and M. Kowalski, "Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms", IEEE International Workshop on Information Forensics and Security (WIFS), 2019.
[62]H. Kaur and P. Khanna, "Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features", IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, pp. 709-719, 2019.
[63]H. Kaur and P. Khanna, "PolyCodes: generating cancelable biometric features using polynomial transformation", Multimedia Tools and Applications, vol. 79, no. 29-30, pp. 20729-20752, 2020.
[64]H. Kaur and P. Khanna, "Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing", Future Generation Computer Systems, vol. 102, pp. 30-41, 2020.
[65]A. Sardar, S. Umer, C. Pero and M. Nappi, "A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template", IEEE Access, vol. 8, pp. 105263-105277, 2020.
[66]T. Boult, W. Scheirer and R. Woodworth, "Revocable fingerprint biotokens: accuracy and security analysis", 2007 IEEE Conference on Computer Vision and Pattern Recognition, 2007.
[67]K. Nandakumar, A. Nagar and A. Jain, "Hardening Fingerprint Fuzzy Vault Using Password", Advances in Biometrics, pp. 927-937.
[68]O. T. Song, A. B. J. Teoh, and D. C. L. Ngo, “Application-Specific Key Release Scheme from Biometrics,” International Specific Key Release Scheme from Biometrics,” International Journal of Network Security, vol. 6, no. 2, pp. 127–133, March 2008
[69]Y. Feng, P. Yuen and A. Jain, "A Hybrid Approach for Generating Secure and Discriminating Face Template", IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 103-117, 2010.
[70]A. Nagar, K. Nandakumar and A. Jain, "A hybrid biometric cryptosystem for securing fingerprint minutiae templates", Pattern Recognition Letters, vol. 31, no. 8, pp. 733-741, 2010.
[71]H. Kaur and P. Khanna, "Biometric template protection using cancelable biometrics and visual cryptography techniques", Multimedia Tools and Applications, vol. 75, no. 23, pp. 16333-16361, 2015.
[72]Y. A. Alahmadi, S. N. Alassali, "An Improved Key Distribution Protocol Using Symmetric Key Cryptography," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.21-26, 2020.
[73]J. Thomas, J. M. Roy, M. M., V. Vijayan, A. S., "Image Steganography And Cryptography Using Three Level Password Security," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.32-35, 2020.
[74]H. Kaur and P. Khanna, "Cancelable features using log-Gabor filters for biometric authentication", Multimedia Tools and Applications, vol. 76, no. 4, pp. 4673-4694, 2016.
[75]A. Jegede, N. Udzir, A. Abdullah and R. Mahmod, "A Hybrid Scheme for Face Template Protection", Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016.
[76]T. Dang, Q. Truong, T. Le and H. Truong, "Cancellable fuzzy vault with periodic transformation for biometric template protection", IET Biometrics, vol. 5, no. 3, pp. 229-235, 2016.
[77]M. Sandhya and M. Prasad, "Cancelable Fingerprint Cryptosystem Based on Convolution Coding", Advances in Intelligent Systems and Computing, pp. 145-157, 2015.
[78]D. Sadhya and S. Singh, "Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions", Multimedia Tools and Applications, vol. 77, no. 12, pp. 15113-15137, 2017.
[79]W. Nakamura, Y. Kaga, M. Fujio and K. Takahashi, "Security and Efficiency of Biometric Template Protection for Identification", Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019.
[80]S. Jami, S. Chalamala and A. Jindal, "Biometric Template Protection Through Adversarial Learning", IEEE International Conference on Consumer Electronics (ICCE), 2019.
[81]S. Ye, Y. Luo, J. Zhao, S.C.S. Cheung, “Anonymous biometric access control”, EURASIP Journal on Information Security, Vol. 9, No. 1, 2009.
[82]C. Karabat, M. Kiraz, H. Erdogan and E. Savas, "THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system", EURASIP Journal on Advances in Signal Processing, vol. 2015, no. 1, 2015.
[83]M. Gomez-Barrero, J. Fierrez and J. Galbally, "Variable-length template protection based on homomorphic encryption with application to signature biometrics", 4th International Conference on Biometrics and Forensics (IWBF), 2016.
[84]M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi and J. Fierrez, "Multi-biometric template protection based on Homomorphic Encryption", Pattern Recognition, vol. 67, pp. 149-163, 2017.
[85]Y. Ma, L. Wu, X. Gu, J. He and Z. Yang, "A Secure Face-Verification Scheme Based on Homomorphic Encryption and Deep Neural Networks", IEEE Access, vol. 5, pp. 16532-16538, 2017.
[86]H. Wang, Y. Ding, S. Tang and J. Wang, "An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption", Cyberspace Safety and Security, pp. 503-512, 2017.
[87]X. Li, Q. Han and X. Jin, "A Secure and Efficient Face-Recognition Scheme Based on Deep Neural Network and Homomorphic Encryption", International Conference on Virtual Reality and Visualization (ICVRV), 2018.
[88]H. K. Shukla, S. Dubey, "Security in Internet of Things (IoT) Hashing Cryptographic Functions," International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.3, pp.7-11, 2019.
[89]M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks," International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017.
[90]M. Sandhya and M. Prasad, "Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities", Signal Processing for Security Technologies, pp. 323-370, 2016.