1. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: Proceedings ACM SIGMM 2003 Multimedia, Biometrics Methods and Workshop, pp. 45–52 (2003)
2. Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric encryption using image processing. In: Proceedings of the SPIE - Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)
3. Roginsky, A.: A New Method for Generating RSA Keys. In: International Business Machines Consulting Group (2004)
4. Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through offline biometric identification. In: Proceedings of the IEEE Privacy and Security, pp. 148–157 (1998)
5. Davida, G.I., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an offline biometric based identification scheme. In: Proceedings Workshop Coding and Cryptography, pp. 129–138 (1999)