# Introduction ancelable biometrics involves in repeated distortion of biometric signals or features on the noninvertible transforms. This approach reduces the compromise of the stored templates [43] using the substitution of transformed version of an image instead of original. It is very useful when a person is contributed with various applications. These kinds of approaches are used for the authentication [44] and identification purposes [37] [7]. Biometric based applications guarantee numerous security risks [3]. The brute-force attacks [47] both the biometric based and password based systems [4]. Cancelable biometrics refers to an intentional and systematically repeatable distortion (transformations) of biometrics data for the purpose of protecting sensitive user-specific features. The principal objectives of cancellable biometrics templates are Diversity, Cancelability, Reusability, Non-invertability, and Performance [5]. Cancelable biometric provides a perfect secrecy [45], [50]. The rest of the paper comprises are as follows: section 2 lists and describes the related fields. In section 3, a novel method is proposed. Experimental studies are followed and they are expressed in section 4. Performance evaluations are described in section5. Section 6 concludes the paper. # II. # Related Work The related areas of cancelable biometric generation schemes were studied in prior and described in [7]. Summary of the study into different categories of cancelable systems are: a) Biometric Transformations This method is based on the transformations of biometric features. It is further categorized into two: Bio-Hashing (Salting) [8], [13], [15], [16], [19], [20], [21], [46], [48], [49] and Non-invertible approach [1]. Our proposed method falls under this category of Noninvertible transformation. # b) Biometric Crypto Systems In this approach, helper data are generated from the biometrics. Further, it is classified into two: Key-Binding biometric cryptosystem and Key-generation biometric crypto system [9], [10], [11], [12], [14], [17], [23], [27]. # c) Hybrid Approach It follows both the transformation and cryptosystems; and also fuzzy schemes [18], [22], [25], [26], [38], [49]. # III. # Proposed Method A novel method is proposed in this section. It is name as Reciprocated Complex Conjugate-Phase transform method. It includes the building blocks of phases such as preprocessing, minutiae extraction, post processing and cancelable and irrevocable template generation. The proposed method uses fingerprint biometric to generate cancelable template. Based on the significant properties such as persistence and individuality, the fingerprint features are widely used [6], [39]. Specifically our proposed method uses local features of fingerprints like bifurcations and endings [40] for the template generation. The System level design of the proposed method is given in figure 1. 1 ( D D D D D D D D ) Figure 1 : System Level Design The flow graph of the proposed method is given in figure 2 which includes main flow. Results of each stage are passed to the next level for further process. They are described in the following section. Before going to design a method, the requirements and principles must be set. There are two main principles: cancelability and irrevocability. To achieve those, some conditions are followed [1]: 1. The transformation should be even while changing minutia position before transmission which leads to a) Reciprocated Magnitude and Complex Conjugate Phase (RMCCP) Transform Method: Function Design The Reciprocated Complex Conjugate Phase transform is a proposed method which aims at the cancelability and irrevocability (One-way approach). To meet the objectives, various processing and minimal transformations are followed: 1. Initially the proposed method follows the N-bit shifting of an input fingerprint image as shown in eqn. 1. ( )1 Where n is a positive natural number. Shifting returns an image I(x,y) shifted by n bits. The Shn function shifts the pixel value of each coordinates of an image N times. 2. The next level is the preprocessing and an enhancement. Image enhancement can be carried out in spatial [28], [29], [30] or frequency domain [31], [32]. The proposed method focuses only frequency domain enhancement. The frequency values are obtained by applying the Fast Fourier Transformations on the shifted image using equations 2 and 3. FFT: ( Where ? is an Nth root of unity. The returned Fast Fourier Transformed image is enhanced. That is the frequency domain enhancement is made using the Log-Gabor filter [31], [32]. It is designed by associating two components such as: Cancelable and Irrevocable Biometric Template Generation a small change in the minutiae position of after transformation. 2. The transformation should not lead the correlation of minutiae before and after transformation. That is the minutiae before transformation should not be matched with the minutiae after transformation 3. There should be high complexity in minimal transformations. ( )2 Where r is the normalized radius from centre, is the normalized radius from centre of frequency plane corresponding to the wavelength. b) The angular Component: It controls the orientation that the filter responds to. ( ) N rf o5 Where is the angular filter component; it is obtained by calculating angular distance of sin and cosine. The Log-Gabor filter (see eqn. 6) is derived from the product of eqn. 4 and 5. # (6) Now, the filter is applied on the frequency domain for the enhancement as in eqn. 7. (7) Then, the Inverse Fast Fourier Transformation is performed to get back the original enhanced image using eqn. 8. (8) The x(j) is the function which returns an enhanced version of the shifted image. The output image is a complex image. By passing the enhanced cum shifted complex image to the next level, a new transformed version of an image is retrieved with the addition of reciprocated magnitude and the twin complex conjugate transposed phase image(see eqns. 9 and 10). Minutiae of the transformed version of an image are marked using Run-Length Coding method and performed post-processing. Then the RMCCP transformed minutiae (X, Y) of Terminations and Bifurcations only are extracted (9) (10) where is the magnitude and ?F is the phase value of an image; X` and Y` gets the reciprocated magnitude and complex conjugate phase transposed values. 3. In third step, two parameters such as shuffling and chaffing are used. That is the extracted RMCCP minutiae (X`, Y`) of bifurcations such as X coordinate with Y and vice versa are shuffled randomly; and chaff (synthetic) points are also added. The chaff points are generated by adding constant floating point along with the extracted shifted phase-minutiae value using the following equations (11) and (12). (11) (12) Where and are the X and Y coordinate points of bifurcations respectively; and are the different floating point constants; and n1, n2 are positive integers. 4. From third step, finalized cancelable and irrevocable biometric template is generated (see table 1). # Experimental Study and Results Sequence of experiments is followed to test the phenomenon of cancelability and irrevocability on the proposed method using benchmark databases such as FVC in 2000,2002,2004, and real time database. Each database contains 880(Set A: 100×8, Set: 10×8)) fingerprints and fifty different real time fingerprints are obtained from untrained volunteers. The same finger is needed to give 5 impressions. Experiment 1 : Performance impact on cancelability Cancelability leads multiplicity. The first criterion is cancelability of fingerprint. From the experiment, it is observed that the cancelability is trailed in the proposed method. The transformations are based on the cancelability of the biometrics. The transformed version of the image does not coincided with the original image. Multiple transformations are applied on it. No one is coincided with the original one. It seems that the product of multiple versions of the same image. The proposed RMCCP transform method starts the version transfer of an input fingerprint image at the entry level. That is the captured image is N-bit shifted primarily. Bit shifting causes the change of black pixels into white and vice versa due to the change of pixel value. So the shifted image gives a scattered pattern; additionally reciprocated magnitude and complex conjugate-phase of an image is derived. In association to that, chaff point and shuffling of the same are also implemented. Empirically it is found that there are more terminations and less bifurcation before shifting; but there are more bifurcations and very few, sometimes no terminations are found after performing N-bit shift on an image. This is because of scattering of ridge pixels (0's and 1's) as described in figure 4. # Experimental Result 1 It is observed that N-bit shifting causes scattered pattern as well as change of pixel values; if they are under RMCCP transform, then there is an occurrence of tremendous version transfer. Here, the reciprocal of the magnitude and the twin complex conjugate transpose makes a robust key for In summary of this experiment, the cancelable property of the proposed method is tested with the matching impact on intra fingerprints (8 impressions per person) and inter-fingerprints (8×10). It is found that there is no cross matching occurrence. Multiple transformations on single images are carried out and no one shows the similarity. It proves that one-into-many property. That is the single person's fingerprints are allowed to generate multiple transformed versions of the original image. Due to this property, a person's biometric can be used for more than one application. Hence, the cancelable property is proved. # Experiment 2 : Strength against an invertible attack Analyzing the strength of the invertible attack is the second criterion. Invertible attacks are impossible according to proposed method. Because it is aimed at one way approach that is non-invertible approaches. It extracts minutiae from the transformed version which is acquired from reciprocated magnitude and twin complex conjugate-phase combinations. The phase possesses very less sensitive information of an image. But the magnitude possesses all sensitive values (information) of an image. Our method focuses only on the reciprocated magnitude which results reciprocal of the original magnitude and twin complex conjugatephase minutiae which changes the sign value of each pixel. Here, the change of magnitude and sign makes major changes in properties of an image. For instance, the original magnitude 178 is reciprocated into 0.0056 and 0 into -0.0030; according to Phase value, 52 is changed into -52 and -90 into 90 etc. This property integrates robustness and irrevocability of original features from the stored RMCCP -minutiae templates. Moreover the template is accumulated with only two fields such as shifted and transformed locations: X and Y coordinate. While storing the coordinates, they are shuffled and added chaff points. This attempt also makes additional feature for the irrevocability. # Experimental Results 2 Figure 6 shows the attempt for an invertible attack against the original image at the entry level. It is clearly shown that the pixels after performing the reverse shifting do not match with pixels of original image. This is because of the compatible type conversion of an image occurred internally. This first attempt is made to prove the irrevocability at the entry level. The second attempt is to invert the stored biometric template to get back the original one. Though it is impossible to get original version of an image from the phase value as stated early, the stored biometric templates are used to revoke the original. Attempts are failed because of the insufficient parameters and shuffled chaff points. Experiments on reverse shifting are performed in order to get original image pattern; it results different pixels which are not coincided with the pixels of original image. The third constraint to be considered is distinctiveness of the templates which is checked by using the correlation factor and also matching scores. The transformed version of an image should not be correlated with the original one. The distinctiveness is proved in the experiments. That is to ensure whether the original fingerprint and the transformed version are correlated or not. To prove this phenomenon, we performed the transformations on the database sets individually and compared the original fingerprint image against transformed version; and also the test is extended on transformed versions of the inter fingerprint images. # Experimental Result 3 It is proved that the transformed versions are no more likely to match the original images. Thus, the uniqueness is proved. Correlation between the Original and transformed version of images (see fig. The choice of parameters always boosts the performance. Conjugate Twin transpose, Chaff points and shuffling minutiae are the parameters of the proposed method. The potency of the parameters leads both cancelability and irrevocability. The chaff points generated are derived from the addition of the floating point values with the extracted bit-shifted and complex conjugate transposed phase image randomly along with the shuffling parametric keys such as X and Y coordinates. Identification of chaff points is not easy in our case. The shuffled minutiae set contain both the synthetic and conjugate phase minutiae (see fig. 8). So the separation or filtering of true minutiae is not possible. Hence, the performance of the choice of parameters are strengthen and sensitive. # Performance Evaluation of Proposed Method The performance of the proposed RMCCP transform method is evaluated based on genuine (matching two benchmark templates of the same finger) and impostor (matching two benchmark templates originating from different fingers) attempts. They are performed to compute False Rejection Rate (FRR), False Acceptance Rate (FAR) and Genuine Accept Rate [33], [41] and hybrid method such as local and global based [42]. Minutiae based matching (through the visual difference and correlation) method is followed in our proposed work to match the cancelable templates Figure 9 shows the Receivers Operating Curve. The ROC is a graph that expresses the relationship between the Genuine Accept Rate (GAR) and the False Accept Rate (FAR), and the same can be used to report the performance of a biometric authentication system. Minimum number of samples is required to achieve confidence bands of desired width for the ROC curve [34]. GAR is calculated through FAR. GAR= (1-FAR). Normally more memory spaces are occupied by images. In order to decrease the memory usage of biometric fingerprint images, the proposed method generates only the template with dual fields such as X and Y coordinates. Since the cancelable template possesses selective minutiae point, it occupies very little space in memory than the raw image. The average ratio of memory space between biometric template and raw image is about 0.005 only. Table 2 reports the memory space required to store the original image and the cancelable biometric template of fingerprints. Figure 10 shows the space complexity chart. Table 2 : Memory space of an image and cancelable Performance of the method is measured in term of time complexity. The response time of the system is very important factor which integrates the performance of a system. An Average matching and template generation time is calculated (Intel i3 processor) which are reported in table 3. Preserving the stored template is a hotspot of the automatic biometric based authentication and identification systems. Preferably, biometric secrecy systems leak a negligible amount of information due to sending the helper data [35]. There is no helper data usage in the proposed method. The RMCCP transformation is performed only with the version transform of the existing features values; chaff point generation is also done with only the internal feature value transformation. It doesn't require any helper data externally. Thus, the secrecy and security are enforced. Biometric template security is an important issue. Enhancing the security of the biometric templates is essential [36]. The proposed method employs shifted and reciprocated magnitude with conjugated phase values. It creates a robust bond with one-way approach which will not be permitted the hackers to generate an original image from the transformed version's properties. The partial and transformed minutiae are helpless to derive an original image. Thus, the proposed method offers a robust and secured system. # VI. # Conclusions A novel method called Reciprocated Magnitude and Complex Conjugate-Phase transformation is proposed and implemented. It is a cancelable and irrevocable biometric template generating technique. It is assessed in different facets like Cancelability, Irrevocability and Security. In addition to that, the performance factors such as matching time and template memory usage are calculate and analyzed. The experimental results show that proposed RCCP transform gives a better performance and it is experienced as an efficient method. 2![Figure 2 : Flow graph of the proposed system](image-2.png "Figure 2 :") ![a) The Radial component: It controls the frequency band that the filter responds. Radial component of Log-Gabor function is:](image-3.png "") ![Fig 3 shows the ridge patterns and their orientations before and after bit-shifting and also the RMCCP transformed image. Novel Technique for Cancelable and Irrevocable Biometric Template Generation for Fingerprints](image-4.png "FA") 344![Figure 3 : Image comparison (a) Fingerprint image before shifting (b) N-bit Shifted image (c) Twin complex conjugate phase image (d) RCCP Transformed image](image-5.png "Figure 3 :Figure 4 :FAFigure 4 left") ![fingerprint features. Through the reciprocated magnitude, the originality of magnitude is affected and the same is combined with twin transposed phase where the sign of the phase is changed. That is, change of positive sign into negative and vice versa. So the phase value gets changed. This strategy further strengthens the cancelability. Figure5clearly shows the change of sign of individual pixels.](image-6.png "") 5![Figure 5 : Pixel regions of the RCCP transformation stages (a) Original image (b) Reciprocal magnitude (c) twin transposed (d) Final RCCP Transformed output](image-7.png "Figure 5 :FA") 6![Figure 6 : Comparisons of images according to shifting and reverse shifting process (a) Original gray image (b) Nbit Shifted gray image (c) Reverse shifting of (b) To get original image pattern (d) Original Binary image (e) N-bit shifted binary image (f) Reverse shifting of (e) To get original binary image (d). The pixel values of reverse shifting do not coincided with the same of the original image (compare (a) and (c) in gray image; and (d) and (f) in binary image)](image-8.png "Figure 6 :FA") ![7) shows the distinctiveness of both original image and its unique transformed version. If the two images are not same factor is zero or negative number otherwise 1.](image-9.png "") 7![Figure 7 : Correlation chart: correlation between Original and the transformed version of the same image a) Performance of the choice of parameters](image-10.png "Figure 7 :") 8![Figure 8 : (a) Extracted final shifted and RCCP-minutiae set (b) Chaff (synthetic) minutiae in association with RMCCPminutiae. Chaff points are indicated by circle and shifted conjugate phase-minutiae are indicated by square V.](image-11.png "Figure 8 :") ![Novel Technique for Cancelable and Irrevocable Biometric Template Generation for Fingerprints GAR). Fingerprint minutiae descriptors can be used to perform matching. There are two types of descriptors: Texture-based (orientations and Frequency values), Minutia-based (Local minutiae structures)](image-12.png "FA(") 9![Figure 9 : ROC on Cancelable transforms performance In addition to ROC analysis, the performance evaluations are carried out on proposed method in the following aspects too: 1. Space complexity (Maximum amount of memory) 2. Time Complexity 3. Security. a) Space Complexity](image-13.png "Figure 9 :") 10![Figure 10 : Space complexity: Maximum amount of memory is used by an image and less amount of memory by template b) Time Complexity](image-14.png "Figure 10 :") 11![Figure 11 : Average Matching Times of Template Generation and Matching](image-15.png "Figure 11 :") 2![Novel Technique for Cancelable and Irrevocable Biometric Template Generation for Fingerprints Novel Technique for Cancelable and Irrevocable Biometric Template Generation for Fingerprints 38. Salvador Mandujano and Rogelio Soto, Deterring Password Sharing: User Authentication via Fuzzy c-Means Clustering Applied to Keystroke Biometric Data, Proc. of the fifth Mexican International Conference in Computer Science (ENC'04), 2004.](image-16.png "FA 2 FA") 1generated from fingerprint 3time Image # * Generating Cancelable Fingerprint Templates KNalini SharatRatha JonathanHChikkerur RuudMConnell Bolle IEEE Transactions and Pattern Analysis and Machine Intelligence April 2007 29 * Impact of Artificial Gummy Fingers on Fingerprint Systems TMatsumoto HMatsumoto KYamada SHoshino Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV SPIE, Optical Security and Counterfeit Deterrence Techniques IV 2002 4677 * Access Control System with High Level Security using fingerprints YounheeGil SungbumDosung Ahn YongwhaPan Chung Proc. of the 32nd Applied Imagery Pattern Recognition Workshop (AIPR'03) of the 32nd Applied Imagery Pattern Recognition Workshop (AIPR'03) IEEE 2003 * MRuud JonathanHBolle NaliniKConnell Ratha Pattern Recognition 35 2727-2738, 2002 Elsevier * Handbook of Fingerprint Recognition DMaltoni DMaio AKJain SPrabhakar Springer * On the Individuality of Fingerprints SharathPankanti SalilPrbhakar AnilKJain IEEE Transactions on Pattern Analysis and Machine Intelligence 24 8 2002 * Cancelable Biometric Template Generation of Protection Schemes: a Review EChandra KKanagalakshmi Proceedings of ICECT-2011, Third International Conference on Electronics Computer Technology ICECT-2011, Third International Conference on Electronics Computer Technology 2011 5 Published by IEEE * Biometric Encryption using image processing CSoutar DRoberge AAstoinav BV KGilroy Kumar Proc. SPIE SPIE 1998 3314 * A fuzzy commitment schemes AJuels MWattenberg Proceedings of 6th ACM Conference on Computer and Communication Security 6th ACM Conference on Computer and Communication SecuritySingapore November 1999 * Password hardening based on keystroke dynamics FMonrose MKReiter SWetzel proceedings of the 6th ACM Conference on Computer and Communication security the 6th ACM Conference on Computer and Communication securitySingapore November 1999 * Cryptographic key-generation from voice FMonrose MKReiter QLi SWetzel Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy IEEE Computer Society Symposium on Research in Security and PrivacyUSA May 2001 * Biometric hash based on statistical features of online signatures CViellhauer RSteinmetz AMayyerhofer Proceedings of the International conference on Pattern Recognition the International conference on Pattern Recognition August 2002 1 * Computation of Cryptographic Keys from Face Biometrics AGoh DLNgo Proc. IFIP: Int'l Federation for information processing IFIP: Int'l Federation for information processing 2003 * NewSheilding Functions to enhance privacy and prevent misuse of biometric templates, Proc. Fourth Int'l cong. Audio and Videobased biometric person authentication JPLinnartz PTuyls 2003 * Cancelable biometric filters for face recognition MSavvides BV KVijayakumar PKKhosla Proc. Int'l Conf. Pattern Recognition Int'l Conf. Pattern Recognition 2004 * Biohashing: Two factor authentication featuring fingerprint data an tokenized random number ABTeoh DC LNgo AGoh Pattern Recognition 37 11 2004 * Biometric Crypto systems: issues and challenges UUludag SPankati SPrabhakar AKJain Proceedings of the IEEE 92 6 * Fuzzy extractor: how to generate strong keys from biometrics and other noisy data YDodis LReuzin ASmith Proceedings of International Conference of the Theory and Applications of cryptographic Techniques: Advances in Cryptology Lecture Notes in Computer Science International Conference of the Theory and Applications of cryptographic Techniques: Advances in CryptologySwitzerland May 2004 3027 * TConnie AB JTeoh MK OGoh DcLNgo Palm Hashing: A Novel approach for cancelable biometrics 2005 93 * Cancelable Key-based Fingerprint Templates RAng RSafav-Naini LMcaven Proc. 10th 10th * Australian Conf, Information Security and Privacy 2005 * A secure biometric authentication scheme based on robust hashing YSutcu HTSencar NMemon Proc. 7th Workshop Multimedia and Security 7th Workshop Multimedia and SecurityNew York 2005 * Practical biometric authentication with template protection PTuyls AHMakkermans TA MKevenaar GJSchrijen AMBazen RN JVeldhuis Proceedings of the 5th International Conference on Audio and Video based biometric person authentication Lecture Notes in Computer Science the 5th International Conference on Audio and Video based biometric person authenticationUSA July 2005 3546 * Combining crypto with biometrics effectively FHao RAnderson JDaugman IEEE Transactions on Computers 55 99 2006 * Provably secure remote truly three-factor authentication scheme with privacy Protection on biometrics Yi-HuiChun-I Fan Ane Lin IEEE Transactions on Information Forensics and Security 4 December 2009 * Parameterized geometric alignment for minutiae-based fingerprint template protection BianYang ChristophBusch Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems the 3rd IEEE international conference on Biometrics: Theory, applications and systemsWashington, DC, USA 2009 * A hybrid biometric cryptosystem for securing fingerprint minutiae templates AbhishekNagar KarthikNandakumar AnilKJain Pattern Recognition Letters 31 June 2010 Elsevier Science * Combining Crypto with Biometrics effectively FengHao RossAnderson JohnDaugman IEEE Transactions on Computers 55 9 2006 * Performance Evaluation of Filters in Noise Removal of Fingerprint Image KKanagalakshmi EChandra Proceedings of ICECT-2011, 3rd International Conference on Electronics and Computer Technology ICECT-2011, 3rd International Conference on Electronics and Computer Technology 2011 1 Published by IEEE * Noise Elimination in Fingerprint Images using Median Filter EChandra KKanagalakshmi Int. Journal of Advanced Networking and Applications 02 2011 * Noise Suppression Scheme using Median Filer in Gray and Binary Images EChandra KKanagalakshmi International Journal of Computer Applications 26 1 2011 * Frequency Domain Enhancement Filters for Fingerprint Images: A Performance Evaluation EChandra KKanagalakshmi CIIT International Journal of Digital Image Processing 3 16 2011 * Frequency Domain Enhancement algorithm based on Log-Gabor Filter in FFT Domain KKanagalakshmi EChandra European Journal of Scientific Research 74 4 2012 * Combining minutiae descriptors for fingerprint matching JianjiangFeng Pattern Recognition 41 2008 Elsevier * Validating a biometric authentication systems sample size requirements CSardt YongfangDass AnilKZhu Jain IEEE Transactions on pattern analysis and machine intelligence 2006 28 * Biometric Systems: Privacy and Secrecy Aspects TanyaIgnatenko MJFrans Willems IEEE Transactions on Information Forensics and security 4 4 2009 * Biometric Template Security KAnil KarthikJain AbhishekNandakumar Nagar EURASIP Journal on Advances in Signal Processing, Special issue on Biometrics Jan. 2008 * Biometric Recognition: Security and Privacy concerns SalilPrbhakar SharathPankanti AnilKJain IEEE Security and Privacy 1 2 2003 * JunGao Huo-MingDong Ding-GuoChen LongGan Wen-WenDong Research on Synergetic Fingerprint Classification and Matching, Proceedings of the Second International Conference on Machine Learning and Cybernetics 2003 * Sen Wang Wei WeiZhang Yang ShengWang Fingerprint Classification by Directional Fields, Proceedings of the fourth IEEE International Conference on Multimodal Interfaces (ICM'02) 2002 * On-line fingerprint Verification .KAnil HongLJain Bolle IEEE Trans. On Pattern Analysis and Machine Intelligence 19 4 1997 * KARoss Jain .JReisman Hybrid Fingerprint Matcher Pattern Recognition 36 7 2003 * A Hybrid Approach for Face Template Protection YCFeng PCYuen AKJain SPIE Defense and Security Symposium 2008 102 * A generic frame work for Three-Factor Authentication: Preserving security and privacy in distributed systems XinyiHuang YangXiang .AChonka JianyingZhou RDeng IEEE Transactions on Parallel and Distributed systems 22 8 2011 * Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching SHirata KTakahashi Lecture Notes in Computer Science 5558 2009 * AB JTeoh WKYip SYLee Cancellable Biometrics and Annotations on BioHash 41 6 2008 Elsevier -Pattern Recognition * Dictionary Attack on Functional Transform-Based Cancelable Fingerprint Templates SWShin M.-KLee DSMoon KYMoon ETRI Journal 31 5 2009 * Random Subspace for an improved BioHashing for Face authentication LNanni ALumini Pattern Recognition Letters 29 3 2008 Elsevier * An analysis of Biohashing and its variants BKong Pattern Recognition 39 7 2006 Elsevier * Alignment-Free Cancelable Fingerprint Templates Based on Local Minutia Information CHLee CYChoi KAToh IEEE Transactions on Systems, Man and Cybernetics 37 4 2007 Part B