S. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacre´taz, and B. Dorizzi, “Three factor scheme for biometric-based cryptographic key regeneration using iris,” in The 6th Biometrics Symposium 2008 (BSYM2008), September 2008.
 A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of Multibiometrics, ser. International Series on Biometrics. Springer, 2006. [OpenAIRE]
 K. Nandakumar and A. K. Jain, “Multibiometric template security using fuzzy vault,” in IEEE Second International Conference on Biometrics: Theory, Applications and Systems, 2008. [OpenAIRE]
 J. Daugman, “The importance of being random: Statistical principles of iris recognition,” Pattern Recognition, vol. 36, no. 2, pp. 279-291, February 2003.
 A. Cavoukian and A. Stoianov, “Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy,” Information and privacy commissioner of Ontario, White Paper, March 2007.
 M. Savvides, B. V. Kumar, and P. Khosla, “Cancelable biometric filters for face recognition,” in Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), vol. 3, August 2004, pp. 922-925.
 N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, April 2007.
 A. Lumini and L. Nanni, “An improved biohashing for human authentication,” Pattern Recognition, vol. 40, no. 3, pp. 1057-1065, March 2007.
 T. E. Boult, W. J. Scheirer, and R. Woodworth, “Revocable fingerprint biotokens: Accuracy and security analysis,” in IEEE Conference on Computer Vision and Pattern Recognition, June 2007, pp. 1-8.
 S. Kanade, D. Petrovska-Delacre´taz, and B. Dorizzi, “Cancelable Iris Biometrics and Using Error Correcting Codes to Reduce Variability in Biometric Data,” in IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 2009.
 F. Monrose, M. Reiter, and R. Wetzel, “Password hardening based on keystroke dynamics,” in Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS), 1999, pp. 73-82.
 F. Monrose, M. Reiter, Q. Li, and S. Wetzel, “Cryptographic key generation from voice,” in Proceedings of the IEEE Symposium on Security and Privacy, May 2001, pp. 202-213.
 C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. Kumar, “Biometric encryption,” in ICSA guide to Cryptography. McGrawHill, 1999.
 A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS), 1999, pp. 28-36.
 F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively,” IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, 2006.