A. Adler, Biometric system security. Handbook of biometrics, 2007.
DOI : 10.1007/978-0-387-71041-9_19

URL : http://www.sce.carleton.ca/faculty/adler/publications/2007/adler-2007-biometrics-system-security.pdf

R. Belguechi, C. Rosenberger, and S. A. Aoudia, Biohashing for securing minutiae template, Proceedings of the 20th International Conference on Pattern Recognition, pp.1168-1171, 2010.
DOI : 10.1109/icpr.2010.292

R. Belguechi, A. Hafiane, E. Cherrier, and C. Rosenberger, Comparative study on texture features for fingerprint recognition: application to the biohashing template protection scheme, Journal of Electronic Imaging, vol.25, issue.1, pp.13033-013033, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01269208

R. M. Bolle, J. H. Connell, and N. K. Ratha, Biometric perils and patches, Pattern Recognition, vol.35, issue.12, pp.2727-2738, 2002.
DOI : 10.1016/s0031-3203(01)00247-3

J. Bringer, H. Chabanne, M. Favre, A. Patey, T. Schneider et al., Gshade: faster privacy-preserving distance computation and biometric identification, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pp.187-198, 2014.

H. Chabanne, J. Bringer, G. Cohen, B. Kindarji, and G. Zemor, Optimal iris fuzzy sketches, IEEE first conference on biometrics BTAS, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00269913

S. Santanu-chatterjee, A. Roy, S. Kumar-das, N. Chattopadhyay, A. Kumar et al., Secure biometricbased authentication scheme using chebyshev chaotic map for multiserver environment, IEEE Transactions on Dependable and Secure Computing, 2016.

S. Hoory, A. Magen, S. Myers, and C. Rackoff, Simple permutations mix well, Theor. Comput. Sci, vol.348, issue.2-3, pp.251-261, 2005.
DOI : 10.1007/978-3-540-27836-8_65

URL : http://www.cs.ubc.ca/~shlomoh/papers/kwise05.pdf

A. Jain, K. Nandakumar, and A. Nagar, Biometric template security, In EURASIP Journal on Advances in Signal Processing, 2008.

Z. Jin, J. Y. Hwang, Y. L. Lai, S. Kim, and A. B. Teoh, Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing, IEEE Transactions on Information Forensics and Security, vol.13, issue.2, pp.393-407, 2018.
DOI : 10.1109/tifs.2017.2753172

URL : http://arxiv.org/pdf/1703.05455

A. Juels and M. Sudan, A fuzzy vault scheme. Des. Codes Cryptography, vol.38, pp.237-257, 2006.
DOI : 10.1007/s10623-005-6343-z

A. Juels and M. Wattenberg, A fuzzy commitment scheme, ACM conference on Computer and communication security, pp.28-36, 1999.
DOI : 10.1145/319709.319714

URL : http://www.rsalabs.com/rsalabs/staff/ajuels/papers/fuzzycommit.ps

A. Kong, K. H. Cheung, D. Zhang, M. Kamel, and J. You, An analysis of biohashing and its variants, Pattern Recognition, vol.39, 2005.
DOI : 10.1016/j.patcog.2005.10.025

URL : http://hdl.handle.net/10397/20801