DOI:10.20894/IJWT. Periodicity: Bi Annual. Impact Factor: SJIF:4.78 & GIF:0.428 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
S. Li and A. C. Kot, "A novel system for fingerprint privacy protection ,2011 View Artical
B. J. A. Teoh, C. L. D. Ngo, and A. Goh, "Biohashing: Two factor authenticationfeaturing fingerprint data and tokenised random number ,Vol.37 ,Issue 11 ,2004 View Artical
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysisof biohashing and its variants", Pattern Recognit ,Vol.39 ,2006 View Artical
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates", IEEE Trans. Pattern Anal.Mach.Intell ,2007 View Artical
A. Nagar, K. Nandakumar, and A. K. Jain, "Biometric template transformation:A security analysis", in Proc. SPIE, Electron. Imaging,Media Forensics a ,2010 View Artical
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance", IEEE Trans. Inf. Forensics Security ,Vol.2 ,2007 View Artical
W. J. Scheirer and T. E. Boult, "Cracking fuzzy vaults and biometric encryption", in Proc. Biometrics Symp ,2007 View Artical
S. Li and A. C. Kot, "Privacy protection of fingerprint database", IEEE Signal Process ,2011 View Artical
Sheng Li and Alex C.Kot, "fingerprint combination for privacy protection", IEEE Transactions on Information Forensics and Sec ,Vol.8 ,2013 View Artical
S. Li and A. C. Kot, "A novel system for fingerprint privacy protection ,Vol.37 ,Issue 11 ,2011 View Artical
B. J. A. Teoh, C. L. D. Ngo, and A. Goh, "Biohashing: Two factor authenticationfeaturing fingerprint data and tokenised random number ,Vol. ,Issue ,2004 View Artical
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysisof biohashing and its variants", Pattern Recognit ,Vol.39 ,2006 View Artical
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates", IEEE Trans. Pattern Anal.Mach.Intell ,Vol. ,2007 View Artical
A. Nagar, K. Nandakumar, and A. K. Jain, "Biometric template transformation:A security analysis", in Proc. SPIE, Electron. Imaging,Media Forensics a ,Vol. ,2010 View Artical
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance", IEEE Trans. Inf. Forensics Security ,Vol.2 ,Issue 4 ,2007 View Artical
W. J. Scheirer and T. E. Boult, "Cracking fuzzy vaults and biometric encryption", in Proc. Biometrics Symp ,Vol.29 ,2007 View Artical
S. Li and A. C. Kot, "Privacy protection of fingerprint database", IEEE Signal Process ,Vol.18 ,Issue 2 ,2011 View Artical
Sheng Li and Alex C.Kot, "fingerprint combination for privacy protection", IEEE Transactions on Information Forensics and Sec ,Vol.8 ,Issue 2 ,2013 View Artical
S. Li and A. C. Kot, "A novel system for fingerprint privacy protection", Proceedings of the 14th ACM conference on Computer ,Vol. ,2011 View Artical
B. J. A. Teoh, C. L. D. Ngo, and A. Goh, "Biohashing: Two factor authenticationfeaturing fingerprint data and tokenised random number", Pattern Recognition ,Vol.37 ,Issue 11 ,2004 View Artical
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysisof biohashing and its variants", Pattern Recognit ,Vol.39 ,Issue 7 ,2006 View Artical
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates", IEEE Trans. Pattern Anal.Mach.Intell ,Vol.29 ,Issue 4 ,2007 View Artical