Multimedia Tools and Applications

, Volume 75, Issue 23, pp 16333–16361 | Cite as

Biometric template protection using cancelable biometrics and visual cryptography techniques



Wide spread use of biometric based authentication implies the need to secure biometric reference data. Various template protection schemes have been introduced to prevent biometric forgery and identity thefts. Cancelable biometrics and visual cryptography are two recent technologies introduced to address the concerns regarding privacy of biometric data, and to improve public confidence and acceptance of biometric systems. Cancelable biometrics is an important technique that allows generation of revocable biometric templates. As the number of biometric instances are limited and once compromised they are lost forever. Cancelable biometrics allows templates to be cancelled and revoked like passwords innumerable times. Recently, various approaches that utilize visual cryptography to secure the stored template and impart privacy to the central databases have been introduced. This work attempts to summarize the existing approaches in literature making use of these two technologies to protect biometric templates.


Biometric template protection Cancelable biometrics Biometric salting Non-invertible transforms Visual cryptography Visual secret sharing 


  1. 1.
    Ang R, Safavi-Naini R, McAven L (2005) Cancelable key-based fingerprint templates. In: Information Security and Privacy. Springer, pp 242–252Google Scholar
  2. 2.
    Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1):143–161MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Belguechi R, Cherrier E, El Abed M, Rosenberger C (2011) Evaluation of cancelable biometric systems: Application to finger-knuckle-prints. In: 2011 International Conference on Hand-Based Biometrics (ICHB). IEEE, pp 1–6Google Scholar
  4. 4.
    Belguechi R, Cherrier E, Rosenberger C (2012) Texture based fingerprint biohashing: Attacks and robustness. In: 2012 5th IAPR International Conference on Biometrics (ICB). IEEE, pp 196– 201Google Scholar
  5. 5.
    Bolle RM, Connell JH, Ratha NK (2002) Biometric perils and patches. Pattern Recog 35(12):2727–2738CrossRefMATHGoogle Scholar
  6. 6.
    Boult T Vision and Security Technology Lab.
  7. 7.
    Boult TE, Scheirer WJ, Woodworth R (2007) Revocable fingerprint biotokens: Accuracy and security analysis. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07. IEEE, pp 1–8Google Scholar
  8. 8.
    Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2007) Optimal iris fuzzy sketches. In: First IEEE international conference on biometrics: theory, applications, and systems, 2007. BTAS 2007. IEEE, pp 1–6Google Scholar
  9. 9.
    Bringer J, Chabanne H, Kindarji B (2008) The best of both worlds: Applying secure sketches to cancelable biometrics. Sci Comput Program 74(1):43–51MathSciNetCrossRefMATHGoogle Scholar
  10. 10.
    Bringer J, Chabanne H, Kindarji B (2009) Anonymous identification with cancelable biometrics. In: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, ISPA 2009. IEEE, pp 494–499Google Scholar
  11. 11.
    Chen X, Bai X, Tao X, Pan X (2013) Chaotic random projection for cancelable biometric key generation. In: Intelligent Science and Intelligent Data Engineering. Springer, pp 605–612Google Scholar
  12. 12.
    Cheung KH, Kong A, Zhang D, Kamel M, You JT, Lam HW (2005a) An analysis on accuracy of cancelable biometrics based on biohashing. In: Knowledge-Based Intelligent Information and Engineering Systems. Springer, pp 1168–1172Google Scholar
  13. 13.
    Cheung KH, Kong AWK, You J, Zhang D (2005b) An analysis on invertibility of cancelable biometrics based on biohashing. In: CISST, vol 2005, pp 40–45Google Scholar
  14. 14.
    Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcard based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications. ACM, pp 45–52Google Scholar
  15. 15.
    Connie T, Teoh A, Goh M, Ngo D (2005) Palmhashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5MathSciNetCrossRefGoogle Scholar
  16. 16.
    de Paula Canuto AM, Fairhurst MC, Pintro F (2013) Ensemble systems and cancellable transformations for multibiometric-based identification. IET Biom 3 (1):29–40CrossRefGoogle Scholar
  17. 17.
    Dey N, Nandi B, Dey M, Biswas D, Das A, Chaudhuri SS (2013) Biohash code generation from electrocardiogram features. In: 2013 IEEE 3rd International Advance Computing Conference (IACC). IEEE, pp 732–735Google Scholar
  18. 18.
    Divya C, Surya E (2012) Visual cryptography using palm print based on dct algorithm. International Journal of Emerging Technology and Advanced Engineering 2(12):2250–2459Google Scholar
  19. 19.
    Fan TY, Chieu BC, Chao HC (2012) Robust copyright-protection scheme based on visual secret sharing and bose–chaudhuri–hocquenghem code techniques. Journal of Electronic Imaging 21(4):043,018–043,018CrossRefGoogle Scholar
  20. 20.
    Farooq F, Bolle RM, Jea TY, Ratha N (2007) Anonymous and revocable fingerprint recognition. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07. IEEE, pp 1–7Google Scholar
  21. 21.
    Feng H, Choong Wah C (2002) Private key generation from on-line handwritten signatures. Inf Manag Comput Secur 10(4):159–164Google Scholar
  22. 22.
    Feng Q, Xiao Y, Su F, An CAI (2008) Cancelable fingerprint fuzzy vault scheme. J Comput Appl 7 :060MATHGoogle Scholar
  23. 23.
    Feng Y, Yuen PC, Jain AK (2008) A hybrid approach for face template protection. In: SPIE Defense and Security Symposium, International Society for Optics and Photonics, pp 694,408–694,408Google Scholar
  24. 24.
    Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security 5(1):103–117CrossRefGoogle Scholar
  25. 25.
    Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw. Secur 11(2):61–69Google Scholar
  26. 26.
  27. 27.
    Goh A, Ngo DC (2003) Computation of cryptographic keys from face biometrics. In: Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. Springer, pp 1– 13Google Scholar
  28. 28.
    Hämmerle-Uhl J, Pschernig E, Uhl A (2009) Cancelable iris biometrics using block re-mapping and image warping. In: Information Security. Springer, pp 135–142Google Scholar
  29. 29.
    Hao F, Anderson R, Daugman J (2006) Combining crypto with biometrics effectively. IEEE Trans Comput 55(9):1081–1088. IEEECrossRefGoogle Scholar
  30. 30.
    Hirano T, Hattori M, Ito T, Matsuda N, Mori T (2012) Homomorphic encryption based cancelable biometrics secure against replay and its related attack. In: 2012 International Symposium on Information Theory and its Applications (ISITA), IEEE, pp 421–425Google Scholar
  31. 31.
    Hirata S, Takahashi K (2009) Cancelable biometrics with perfect secrecy for correlation-based matching. Springer, pp 868–878Google Scholar
  32. 32.
    Hu CM, Tzeng WG (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45Google Scholar
  33. 33.
    Ilavarsan K, Malvika R (2012) A multiple level visual cryptography scheme for biometric privacy without pixel expansion. International Journal of Communications and Engineering 4(4):59–63Google Scholar
  34. 34.
    Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE 14:4–20Google Scholar
  35. 35.
    Jain AK, Nandakumar K, Nagar A, et al. (2008) Biometric template security. EURASIP Journal on Advances in Signal Processing 2008Google Scholar
  36. 36.
    Jeong M, Lee C, Kim J, Choi JY, Toh KA, Kim J (2006) Changeable biometrics for appearance based face recognition. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, pp 1–5Google Scholar
  37. 37.
    Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security. ACM, pp 28–36Google Scholar
  38. 38.
    Kanak A, Sogukpınar I (2009) Classification based revocable biometric identity code generation. In: Biometric ID Management and Multimodal Communication. Springer, pp 276–284Google Scholar
  39. 39.
    Kim Y, Toh KA (2007) A method to enhance face biometric security. In: Biometrics: 2007 First IEEE International Conference on Theory, Applications, and Systems, BTAS 2007. IEEE, pp 1–6Google Scholar
  40. 40.
    Kuan YW, Teoh AB, Ngo DC (2007) Secure hashing of dynamic hand signatures using wavelet-fourier compression with biophasor mixing and 2 n discretization. EURASIP Journal on Applied Signal Processing 2007(1):32–32MathSciNetMATHGoogle Scholar
  41. 41.
    Kümmel K, Vielhauer C (2010) Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting. In: Proceedings of the 12th ACM workshop on Multimedia and security. ACM, pp 67– 72Google Scholar
  42. 42.
    Lacharme P, Cherrier E, Rosenberger C, et al. (2013) Preimage attack on biohashing. In: International Conference on Security and Cryptography (SECRYPT)Google Scholar
  43. 43.
    Lalithamani N, Soman S (2009) An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics. In: 2009 International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom’09. IEEE, pp 47–52Google Scholar
  44. 44.
    Lee C, Kim J (2010) Cancelable fingerprint templates using minutiae-based bit-strings. J Netw Comput Appl 33(3):236–246CrossRefGoogle Scholar
  45. 45.
    Lee Y, Lee Y, Chung Y, Moon K (2007) One-time templates for face authentication. In: 2007 International Conference on Convergence Information Technology. IEEE, pp 1818–1823Google Scholar
  46. 46.
    Lee Y, Chung Y, Moon K (2009) Inverse operation and preimage attack on biohashing. In: Computational Intelligence in Biometrics: 2009 IEEE Workshop on Theory, Algorithms, and Applications, CIB 2009. IEEE, pp 92–97Google Scholar
  47. 47.
    Leng L, Zhang J, Khan M, Bi X, Ji M (2010) Cancelable palmcode generated from randomized gabor filters for palmprint protection. In: 2010 25th International Conference of Image and Vision Computing New Zealand (IVCNZ). IEEE, pp 1–6Google Scholar
  48. 48.
    Li C, Hu J (2013) Attacks via record multiplicity on cancelable biometrics templates. Concurrency and Computation: Practice and ExperienceGoogle Scholar
  49. 49.
    Li H, Wang L (2012) Chaos-based cancelable palmprint authentication system. Procedia Engineering 29(0):1239–1245CrossRefGoogle Scholar
  50. 50.
    Li Q, Chang EC (2006) Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th workshop on Multimedia and security. ACM, pp 56–61Google Scholar
  51. 51.
    Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recognit 40(3):1057–1065CrossRefMATHGoogle Scholar
  52. 52.
    Maiorana E, Campisi P, Fierrez J, Ortega-Garcia J, Neri A (2010) Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 40(3):525–538CrossRefGoogle Scholar
  53. 53.
    Maiorana E, Campisi P, Neri A (2011a) Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system. In: 2011 IEEE International Systems Conference (SysCon). IEEE, pp 495–500Google Scholar
  54. 54.
    Maiorana E, Campisi P, Neri A (2011b) Cancellable biometrics for on-line signature recognition. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software, p 290Google Scholar
  55. 55.
    Martinez-Diaz M, Fierrez-Aguilar J, Alonso-Fernandez F, Ortega-Garcia J, Siguenza J (2006) Hill-climbing and brute-force attacks on biometric systems: A case study in match-on-card fingerprint verification. In: Proceedings 2006 40th Annual IEEE International Carnahan Conferences Security Technology. IEEE, pp 151–159Google Scholar
  56. 56.
    Monoth T, Anto PB (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Computer Science 2:143–148CrossRefGoogle Scholar
  57. 57.
    Muhammed RP (2011) A secured approach to visual cryptographic biometric template. International Journal on Information Technology 1(2)Google Scholar
  58. 58.
    Nagar A, Jain AK (2009) On the security of non-invertible fingerprint template transforms. IEEE, pp 81–85Google Scholar
  59. 59.
    Nakajima M, Yamaguchi Y (2002) Extended visual cryptography for natural imagesGoogle Scholar
  60. 60.
    Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4):744–757CrossRefGoogle Scholar
  61. 61.
    Nanni L, Lumini A (2006) Empirical tests on biohashing. Neurocomputing 69(16):2390–2395CrossRefGoogle Scholar
  62. 62.
    Nanni L, Lumini A (2010) Cancellable biometrics: problems and solutions for improving accuracy. Biometrics: Methods, Applications and AnalysesGoogle Scholar
  63. 63.
    Naor M, Shamir A (1995) Visual cryptography. In: Advances in CryptologyEUROCRYPT’94. Springer, pp 1–12Google Scholar
  64. 64.
    Othman A, Ross A (2011) Mixing fingerprints for generating virtual identities. In: 2011 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6Google Scholar
  65. 65.
    Pabitha M, Latha L (2013) Efficient approach for retinal biometric template security and person authentication using noninvertible constructions. Int J Comput Appl 69(4)Google Scholar
  66. 66.
    Patel VM, Chellappa R, Tistarelli M (2010) Sparse representations and random projections for robust and cancelable biometrics. In: 2010 11th International Conference on Control Automation Robotics & Vision (ICARCV). IEEE, pp 1–6Google Scholar
  67. 67.
    Paul PP, Gavrilova M (2012a) Multimodal biometric approach for cancelable face template generation. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, pp 84,070H–84,070HGoogle Scholar
  68. 68.
    Paul PP, Gavrilova ML (2012b) A novel cross folding algorithm for multimodal cancelable biometrics. International Journal of Software Science and Computational Intelligence (IJSSCI) 4(3):20–37CrossRefGoogle Scholar
  69. 69.
    Paul PP, Gavrilova M, Klimenko S (2013) Situation awareness of cancelable biometric system. Vis Comput:1–9Google Scholar
  70. 70.
  71. 71.
    Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: 2008 International Symposium on Computer Science and Computational Technology, ISCSCT’08, vol 2. IEEE, pp 572–575Google Scholar
  72. 72.
    Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable biometrics: A case study in fingerprints. In: 2006 18th International Conference on Pattern Recognition, ICPR 2006, vol 4. IEEE, pp 370– 373Google Scholar
  73. 73.
    Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634Google Scholar
  74. 74.
    Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4):561–572CrossRefGoogle Scholar
  75. 75.
    Rathgeb C, Busch C (2014) Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters. Computers & SecurityGoogle Scholar
  76. 76.
    Revenkar P, Anjum A, Gandhare W (2010) Secure iris authentication using visual cryptography. arXiv preprint arXiv:
  77. 77.
    Roberts C (2007) Biometric attack vectors and defences. Computers & Security 26(1):14–25CrossRefGoogle Scholar
  78. 78.
    Ross A, Othman A (2011a) Mixing fingerprints for template security and privacy. In: Proceedings of the 19th Eur. Sign. Proc. Conf.(EUSIPCO)Google Scholar
  79. 79.
    Ross A, Othman A (2011b) Visual cryptography for biometric privacy. IEEE transactions on information forensics and security 6(1):70–81CrossRefGoogle Scholar
  80. 80.
    Ross A, Othman AA (2010) Visual cryptography for face privacy. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, pp 76,670B–76,670BGoogle Scholar
  81. 81.
    Rust C (2009) Turbine: Trusted revocable biometric identities. Biometric Technology Today 17(2):8–10CrossRefGoogle Scholar
  82. 82.
    Savvides M, Kumar BV, Khosla PK (2004) Cancelable biometric filters for face recognition. In: 2004 Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, vol 3. IEEE, pp 922–925Google Scholar
  83. 83.
    Schneier B (1999) Biometrics: uses and abuses. Commun ACM 42(8):58CrossRefGoogle Scholar
  84. 84.
    SECURICS INC Colorado springs, co.
  85. 85.
    Shin SW, Lee MK, Moon D, Moon K (2009) Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI j 31(5)Google Scholar
  86. 86.
    Siew Chin C, Beng Jin AT, Chek Ling DN (2006) High security iris verification system based on random secret integration. Comp Vision Image Underst 102(2):169–177CrossRefGoogle Scholar
  87. 87.
    Simoens K, Yang B, Zhou X, Beato F, Busch C, Newton EM, Preneel B (2012) Criteria towards metrics for benchmarking template protection algorithms. In: 2012 5th IAPR International Conference on Biometrics (ICB). IEEE, pp 498–505Google Scholar
  88. 88.
    Sinduja R, Sathiya R, Vaithiyanathan V (2012) Sheltered iris attestation by means of visual cryptography (sia-vc). In: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp 650–655Google Scholar
  89. 89.
    Sohn H, Ro YM, Plataniotis KN (2009) Biometric authentication using augmented face and random projection. In: 2009 Biometrics: IEEE 3rd International Conference on Theory, Applications, and Systems BTAS’09. IEEE, pp 1–6Google Scholar
  90. 90.
    Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV (1998) Biometric encryption using image processing. In: Photonics West’98 Electronic Imaging, International Society for Optics and Photonics, pp 178–188Google Scholar
  91. 91.
    Soutar C et al (2002) Biometric system security. White Paper, Bioscrypt,
  92. 92.
    Suryadevara S, Naaz R, Kapoor S, Sharma A, et al. (2011) Visual cryptography improvises the security of tongue as a biometric in banking system. In: 2011 2nd International Conference on Computer and Communication Technology (ICCCT). IEEE, pp 412–415Google Scholar
  93. 93.
    Sutcu Y, Sencar HT, Memon N (2005) A secure biometric authentication scheme based on robust hashing. In: Proceedings of the 7th workshop on Multimedia and security. ACM, pp 111– 116Google Scholar
  94. 94.
    Sutcu Y, Li Q, Memon N (2007) Protecting biometric templates with sketch: Theory and practice. IEEE Transactions on Information Forensics and Security 2(3):503–512CrossRefGoogle Scholar
  95. 95.
    Takahashi K, Hirata S (2011) Parameter management schemes for cancelable biometrics. In: 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM). IEEE, pp 145–151Google Scholar
  96. 96.
    Takur V, Jaiswal R, Sonawane S, Nalavade R, et al. (2012) Biometric data security using recursive visual cryptography. In: Information and Knowledge Management, vol 2, pp 32–36Google Scholar
  97. 97.
    Teoh ABJ, Ngo DCL (2006) Biophasor: Token supplemented cancellable biometrics. In: 2006 9th International Conference on Control, Automation, Robotics and Vision, ICARCV’06. IEEE, pp 1–5Google Scholar
  98. 98.
    Teoh A, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 37(5):1096–1106CrossRefGoogle Scholar
  99. 99.
    Teoh AB, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recog 41(6):2034–2044CrossRefMATHGoogle Scholar
  100. 100.
    Teoh ABJ, Ngo DCL, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog 37(11):2245–2255Google Scholar
  101. 101.
    Teoh A, Jin B, Connie T, Ngo D, Ling C (2006) Remarks on biohash and its mathematical foundation. Inf Process Lett 100(4):145–150MathSciNetCrossRefMATHGoogle Scholar
  102. 102.
    Tulyakov S, Farooq F, Govindaraju V (2005) Symmetric hash functions for fingerprint minutiae. In: Pattern Recognition and Image Analysis. Springer, pp 30–38Google Scholar
  103. 103.
    Tuyls P, Hollmann HD, Van Lint JH, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37(1):169–186MathSciNetCrossRefMATHGoogle Scholar
  104. 104.
    Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(6):948–960CrossRefGoogle Scholar
  105. 105.
    Vielhauer C, Steinmetz R, Mayerhöfer A (2002) Biometric hash based on statistical features of online signatures. In: Proceedings of the 16th international conference on pattern recognition, 2002, vol 1. IEEE, pp 123–126Google Scholar
  106. 106.
    VeinID Hitachi.
  107. 107.
    Wang Y, Plataniotis K (2007) Face based biometric authentication with changeable and privacy preservable templates. In: 2007 Biometrics Symposium. IEEE, pp 1–6Google Scholar
  108. 108.
    Wu X, Qi N, Wang K, Zhang D (2008) An iris cryptosystem for information security. In: IIHMSP’08 international conference on intelligent information hiding and multimedia signal processing, 2008. IEEE, pp 1533–1536Google Scholar
  109. 109.
    Xu D, Wang X (2010) A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence. In: 2010 International Conference on Mechatronics and Automation (ICMA). IEEE, pp 329–332Google Scholar
  110. 110.
    Xu W, Cheng M (2008) Cancelable voiceprint template based on chaff-points-mixture method. In: Proceedings of the 2008 International Conference on Computational Intelligence and Security-Volume 02, IEEE Computer Society, pp 263–266Google Scholar
  111. 111.
    Xu W, He Q, Li Y, Li T (2008) Cancelable voiceprint templates based on knowledge signatures. In: 2008 International Symposium on Electronic Commerce and Security. IEEE, pp 412–415Google Scholar
  112. 112.
    Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security. Springer, pp 81–91Google Scholar
  113. 113.
    Zhu HH, He QH, Li YX (2012) A two -step hybrid approach for voiceprint-biometric template protection. In: 2012 International Conference on Machine Learning and Cybernetics (ICMLC), vol 2, pp 560–565.  10.1109/ICMLC.2012.6358984
  114. 114.
    Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: 2008 19th International Conference on Pattern Recognition, ICPR 2008. IEEE, pp 1–4Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.PDPM Indian Institute of Information Technology, Design and ManufacturingJabalpurIndia

Personalised recommendations