@incollection{, 61B404F79BABEA0B1E1C32BCA729F2E3 , author={{K.Kanagalakshmi} and {DJ Academy for Managerial Excellence, Coimbatore}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}136111 } @incollection{b0, , title={{Generating Cancelable Fingerprint Templates}} , author={{ KNalini } and { SharatRatha } and { JonathanHChikkerur } and { RuudMConnell } and { Bolle }} , booktitle={{IEEE Transactions and Pattern Analysis and Machine Intelligence}} , year={April 2007} 29 } @incollection{b1, , title={{Impact of Artificial Gummy Fingers on Fingerprint Systems}} , author={{ TMatsumoto } and { HMatsumoto } and { KYamada } and { SHoshino }} , booktitle={{Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV}} SPIE, Optical Security and Counterfeit Deterrence Techniques IV , year={2002} 4677 } @incollection{b2, , title={{Access Control System with High Level Security using fingerprints}} , author={{ YounheeGil } and { SungbumDosung Ahn } and { YongwhaPan } and { Chung }} , booktitle={{Proc. of the 32nd Applied Imagery Pattern Recognition Workshop (AIPR'03)}} of the 32nd Applied Imagery Pattern Recognition Workshop (AIPR'03) , publisher={IEEE} , year={2003} } @incollection{b3, , title={{}} , author={{ MRuud } and { JonathanHBolle } and { NaliniKConnell } and { Ratha }} , journal={{Pattern Recognition}} 35 , year={2727-2738, 2002} , publisher={Elsevier} } @book{b4, , title={{Handbook of Fingerprint Recognition}} , author={{ DMaltoni } and { DMaio } and { AKJain } and { SPrabhakar }} , publisher={Springer} } @incollection{b5, , title={{On the Individuality of Fingerprints}} , author={{ SharathPankanti } and { SalilPrbhakar } and { AnilKJain }} , journal={{IEEE Transactions on Pattern Analysis and Machine Intelligence}} 24 8 , year={2002} } @incollection{b6, , title={{Cancelable Biometric Template Generation of Protection Schemes: a Review}} , author={{ EChandra } and { KKanagalakshmi }} , booktitle={{Proceedings of ICECT-2011, Third International Conference on Electronics Computer Technology}} ICECT-2011, Third International Conference on Electronics Computer Technology , year={2011} 5 , note={Published by IEEE} } @incollection{b7, , title={{Biometric Encryption using image processing}} , author={{ CSoutar } and { DRoberge } and { AAstoinav } and { BV KGilroy } and { Kumar }} , booktitle={{Proc. SPIE}} SPIE , year={1998} 3314 } @incollection{b8, , title={{A fuzzy commitment schemes}} , author={{ AJuels } and { MWattenberg }} , booktitle={{Proceedings of 6th ACM Conference on Computer and Communication Security}} 6th ACM Conference on Computer and Communication SecuritySingapore , year={November 1999} } @incollection{b9, , title={{Password hardening based on keystroke dynamics}} , author={{ FMonrose } and { MKReiter } and { SWetzel }} , booktitle={{proceedings of the 6th ACM Conference on Computer and Communication security}} the 6th ACM Conference on Computer and Communication securitySingapore , year={November 1999} } @incollection{b10, , title={{Cryptographic key-generation from voice}} , author={{ FMonrose } and { MKReiter } and { QLi } and { SWetzel }} , booktitle={{Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy}} IEEE Computer Society Symposium on Research in Security and PrivacyUSA , year={May 2001} } @incollection{b11, , title={{Biometric hash based on statistical features of online signatures}} , author={{ CViellhauer } and { RSteinmetz } and { AMayyerhofer }} , booktitle={{Proceedings of the International conference on Pattern Recognition}} the International conference on Pattern Recognition , year={August 2002} 1 } @incollection{b12, , title={{Computation of Cryptographic Keys from Face Biometrics}} , author={{ AGoh } and { DLNgo }} , booktitle={{Proc. IFIP: Int'l Federation for information processing}} IFIP: Int'l Federation for information processing , year={2003} } @book{b13, , title={{NewSheilding Functions to enhance privacy and prevent misuse of biometric templates, Proc. Fourth Int'l cong. Audio and Videobased biometric person authentication}} , author={{ JPLinnartz } and { PTuyls }} , year={2003} } @incollection{b14, , title={{Cancelable biometric filters for face recognition}} , author={{ MSavvides } and { BV KVijayakumar } and { PKKhosla }} , booktitle={{Proc. Int'l Conf. Pattern Recognition}} Int'l Conf. Pattern Recognition , year={2004} } @incollection{b15, , title={{Biohashing: Two factor authentication featuring fingerprint data an tokenized random number}} , author={{ ABTeoh } and { DC LNgo } and { AGoh }} , journal={{Pattern Recognition}} 37 11 , year={2004} } @incollection{b16, , title={{Biometric Crypto systems: issues and challenges}} , author={{ UUludag } and { SPankati } and { SPrabhakar } and { AKJain }} , journal={{Proceedings of the IEEE}} 92 6 } @incollection{b17, , title={{Fuzzy extractor: how to generate strong keys from biometrics and other noisy data}} , author={{ YDodis } and { LReuzin } and { ASmith }} , booktitle={{Proceedings of International Conference of the Theory and Applications of cryptographic Techniques: Advances in Cryptology}} , booktitle={{Lecture Notes in Computer Science}} International Conference of the Theory and Applications of cryptographic Techniques: Advances in CryptologySwitzerland , year={May 2004} 3027 } @incollection{b18, , author={{ TConnie } and { AB JTeoh } and { MK OGoh } and { DcLNgo }} , booktitle={{Palm Hashing: A Novel approach for cancelable biometrics}} , year={2005} 93 } @incollection{b19, , title={{Cancelable Key-based Fingerprint Templates}} , author={{ RAng } and { RSafav-Naini } and { LMcaven }} , booktitle={{Proc. 10th}} 10th } @book{b20, , title={{Australian Conf, Information Security and Privacy}} , year={2005} } @incollection{b21, , title={{A secure biometric authentication scheme based on robust hashing}} , author={{ YSutcu } and { HTSencar } and { NMemon }} , booktitle={{Proc. 7th Workshop Multimedia and Security}} 7th Workshop Multimedia and SecurityNew York , year={2005} } @incollection{b22, , title={{Practical biometric authentication with template protection}} , author={{ PTuyls } and { AHMakkermans } and { TA MKevenaar } and { GJSchrijen } and { AMBazen } and { RN JVeldhuis }} , booktitle={{Proceedings of the 5th International Conference on Audio and Video based biometric person authentication}} , booktitle={{Lecture Notes in Computer Science}} the 5th International Conference on Audio and Video based biometric person authenticationUSA , year={July 2005} 3546 } @incollection{b23, , title={{Combining crypto with biometrics effectively}} , author={{ FHao } and { RAnderson } and { JDaugman }} , journal={{IEEE Transactions on Computers}} 55 99 , year={2006} } @incollection{b24, , title={{Provably secure remote truly three-factor authentication scheme with privacy Protection on biometrics}} , author={{ Yi-HuiChun-I Fan Ane } and { Lin }} , journal={{IEEE Transactions on Information Forensics and Security}} 4 , year={December 2009} } @incollection{b25, , title={{Parameterized geometric alignment for minutiae-based fingerprint template protection}} , author={{ BianYang } and { ChristophBusch }} , booktitle={{Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems}} the 3rd IEEE international conference on Biometrics: Theory, applications and systemsWashington, DC, USA , year={2009} } @incollection{b26, , title={{A hybrid biometric cryptosystem for securing fingerprint minutiae templates}} , author={{ AbhishekNagar } and { KarthikNandakumar } and { AnilKJain }} , journal={{Pattern Recognition Letters}} 31 , year={June 2010} , publisher={Elsevier Science} } @incollection{b27, , title={{Combining Crypto with Biometrics effectively}} , author={{ FengHao } and { RossAnderson } and { JohnDaugman }} , journal={{IEEE Transactions on Computers}} 55 9 , year={2006} } @incollection{b28, , title={{Performance Evaluation of Filters in Noise Removal of Fingerprint Image}} , author={{ KKanagalakshmi } and { EChandra }} , booktitle={{Proceedings of ICECT-2011, 3rd International Conference on Electronics and Computer Technology}} ICECT-2011, 3rd International Conference on Electronics and Computer Technology , year={2011} 1 , note={Published by IEEE} } @incollection{b29, , title={{Noise Elimination in Fingerprint Images using Median Filter}} , author={{ EChandra } and { KKanagalakshmi }} , journal={{Int. Journal of Advanced Networking and Applications}} 02 , year={2011} } @incollection{b30, , title={{Noise Suppression Scheme using Median Filer in Gray and Binary Images}} , author={{ EChandra } and { KKanagalakshmi }} , journal={{International Journal of Computer Applications}} 26 1 , year={2011} } @incollection{b31, , title={{Frequency Domain Enhancement Filters for Fingerprint Images: A Performance Evaluation}} , author={{ EChandra } and { KKanagalakshmi }} , journal={{CIIT International Journal of Digital Image Processing}} 3 16 , year={2011} } @incollection{b32, , title={{Frequency Domain Enhancement algorithm based on Log-Gabor Filter in FFT Domain}} , author={{ KKanagalakshmi } and { EChandra }} , journal={{European Journal of Scientific Research}} 74 4 , year={2012} } @incollection{b33, , title={{Combining minutiae descriptors for fingerprint matching}} , author={{ JianjiangFeng }} , journal={{Pattern Recognition}} 41 , year={2008} , publisher={Elsevier} } @incollection{b34, , title={{Validating a biometric authentication systems sample size requirements}} , author={{ CSardt } and { YongfangDass } and { AnilKZhu } and { Jain }} , booktitle={{IEEE Transactions on pattern analysis and machine intelligence}} , year={2006} 28 } @incollection{b35, , title={{Biometric Systems: Privacy and Secrecy Aspects}} , author={{ TanyaIgnatenko } and { MJFrans } and { Willems }} , journal={{IEEE Transactions on Information Forensics and security}} 4 4 , year={2009} } @incollection{b36, , title={{Biometric Template Security}} , author={{ KAnil } and { KarthikJain } and { AbhishekNandakumar } and { Nagar }} , journal={{EURASIP Journal on Advances in Signal Processing, Special issue on Biometrics}} , year={Jan. 2008} } @incollection{b37, , title={{Biometric Recognition: Security and Privacy concerns}} , author={{ SalilPrbhakar } and { SharathPankanti } and { AnilKJain }} , journal={{IEEE Security and Privacy}} 1 2 , year={2003} } @book{b38, , author={{ JunGao } and { Huo-MingDong } and { Ding-GuoChen } and { LongGan } and { Wen-WenDong }} , title={{Research on Synergetic Fingerprint Classification and Matching, Proceedings of the Second International Conference on Machine Learning and Cybernetics}} , year={2003} } @book{b39, , author={{ Sen Wang Wei WeiZhang } and { Yang ShengWang }} , title={{Fingerprint Classification by Directional Fields, Proceedings of the fourth IEEE International Conference on Multimodal Interfaces (ICM'02)}} , year={2002} } @incollection{b40, , title={{On-line fingerprint Verification}} , author={{ .KAnil } and { HongLJain } and { Bolle }} , journal={{IEEE Trans. On Pattern Analysis and Machine Intelligence}} 19 4 , year={1997} } @incollection{b41, , title={{}} , author={{ KARoss } and { Jain } and { .JReisman } and { Hybrid Fingerprint } and { Matcher }} , journal={{Pattern Recognition}} 36 7 , year={2003} } @incollection{b42, , title={{A Hybrid Approach for Face Template Protection}} , author={{ YCFeng } and { PCYuen } and { AKJain }} , booktitle={{SPIE Defense and Security Symposium}} , year={2008} 102 } @incollection{b43, , title={{A generic frame work for Three-Factor Authentication: Preserving security and privacy in distributed systems}} , author={{ XinyiHuang } and { YangXiang } and { .AChonka } and { JianyingZhou } and { RDeng }} , journal={{IEEE Transactions on Parallel and Distributed systems}} 22 8 , year={2011} } @incollection{b44, , title={{Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching}} , author={{ SHirata } and { KTakahashi }} , booktitle={{Lecture Notes in Computer Science}} 5558 , year={2009} } @incollection{b45, , title={{}} , author={{ AB JTeoh } and { WKYip } and { SYLee }} , journal={{Cancellable Biometrics and Annotations on BioHash}} 41 6 , year={2008} , publisher={Elsevier -Pattern Recognition} } @incollection{b46, , title={{Dictionary Attack on Functional Transform-Based Cancelable Fingerprint Templates}} , author={{ SWShin } and { M.-KLee } and { DSMoon } and { KYMoon }} , journal={{ETRI Journal}} 31 5 , year={2009} } @incollection{b47, , title={{Random Subspace for an improved BioHashing for Face authentication}} , author={{ LNanni } and { ALumini }} , journal={{Pattern Recognition Letters}} 29 3 , year={2008} , publisher={Elsevier} } @incollection{b48, , title={{An analysis of Biohashing and its variants}} , author={{ BKong }} , journal={{Pattern Recognition}} 39 7 , year={2006} , publisher={Elsevier} } @incollection{b49, , title={{Alignment-Free Cancelable Fingerprint Templates Based on Local Minutia Information}} , author={{ CHLee } and { CYChoi } and { KAToh }} , journal={{IEEE Transactions on Systems, Man and Cybernetics}} 37 4 , year={2007} , note={Part B} }