@incollection{, 489683EDA2E6130698F8507178AC5333 , author={{Dr.P.M.Gomathi} and {Anna University, Coimbatore}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}11115358 } @incollection{b0, , title={{Combining crypto with biometrics effectively}} , author={{ FHao } and { RAnderson } and { JDaugman }} , journal={{IEEE Transactions on Computers}} 55 , year={2006} } @incollection{b1, , title={{Iris feature extraction using independent component analysis}} , author={{ KBae } and { SNoh } and { JKim }} , booktitle={{Proceedings of the 4th International Conference on Audio-and Video-Based Biometric Person Authentication (AVBPA '03)}} the 4th International Conference on Audio-and Video-Based Biometric Person Authentication (AVBPA '03)Guildford, UK , year={June 2003} 2688 } @incollection{b2, , author={{ SandipDutta } and { AvijitKar } and { NCMahanti } and { BNChatterji }} , booktitle={{Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems}} the 10th International Conference on Advanced Concepts for Intelligent Vision Systems , year={2008} } @incollection{b3, , title={{Enhancement of Multimodal Biometric Verification Using a Combination of Fusion Methods}} , author={{ FAlsaade } and { MZahrani }} , booktitle={{SETIT 2009 5th International Conference: Sciences of Electronic, Technologies of In formation and Telecommunications}} , year={March 22-26, 2009} } @incollection{b4, , title={{Biometric Identification Through Hand Geometry Measurements}} , author={{ RSanchez-Reillo } and { CSanchez-Avila } and { AGonzalez-Marcos }} , journal={{IEEE Trans. on PAMI}} 22 10 , year={October 2000} } @incollection{b5, , title={{Secure biometrickey generation with biometric helper}} , author={{ JinABeng } and { Kar-AnnTeoh } and { Toh }} , booktitle={{proceedings of 3rd IEEE Conference on Industrial Electronics and Applications}} 3rd IEEE Conference on Industrial Electronics and ApplicationsSingapore , year={June 2008} } @incollection{b6, , title={{Enhancing security and privacy in biometricsbased authentication systems}} , author={{ NKRatha } and { JHConnell } and { RMBolle }} , journal={{IBM Systems Journal}} 40 3 , year={2001} } @incollection{b7, , title={{Evaluation techniques for biometrics based authentication systems (FRR)}} , author={{ RMBolle } and { SPankanti } and { NKRatha }} , booktitle={{Proceedings 15th International Conference on Pattern Recognition}} 15th International Conference on Pattern Recognition , year={2000} 2 } @incollection{b8, , title={{A biometrics based security solution for encryption and authentication in tele-healthcare systems}} , author={{ GHZhang } and { CC YPoon } and { YTZhang }} , booktitle={{ISABEL 2009, 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies}} , year={2009} } @incollection{b9, , author={{ ZhenhuaWu }} , booktitle={{International Symposium on Electronic Commerce and Security}} , year={2008} } @incollection{b10, , title={{Biometric System by Foot Pressure Change Based on Neural Network}} , author={{ ,SHong Ye } and { YKobashi } and { KHata } and { KTaniguchi } and { Asari }} , booktitle={{39th International Symposium on Multiple-Valued Logic}} , year={2009} , note={ISMVL '0} } @incollection{b11, , title={{A New Method for Response Integration in Modular Neural Networks using Type-2 Fuzzy Logic for Biometric Systems}} , author={{ JUrias } and { DHidalgo } and { PMelin } and { OCastillo }} , booktitle={{IJCNN 2007, International Joint Conference on Neural Networks}} , year={2007} } @incollection{b12, , title={{Biometric security system based on signature verification using neural networks}} , author={{ DRShashikumar } and { KBRaja } and { RKChhotaray } and { SabyasachiPattanaik }} , booktitle={{IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)}} , year={2010} } @incollection{b13, , title={{Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack}} , author={{ ARajeswari Mukesh } and { VDamodaram } and { Subbiah } and { Bharathi }} , journal={{IJCSNS International Journal of Computer Science and Network Security}} 8 10 , year={2008} } @book{b14, , title={{Global Journal of Computer Science and Technology Volume XI Issue XI Version I}} , year={2011} }