[1] Anderson R.J.; “Security Engineering: A Guide to Building Dependable Distributed Systems”. New York: Wiley, (2001)
[2] Barros, J, French, J and Martin, W.; “Indexing Multi-Spectral Images for Content-Based Retrieval”, University of Virginia Technical Report, CS-94-40, (1994)
[3] Barros, J., French, J. et al.; “System for Indexing Multi-Spectral Satellite Images for Efficient Content-Based Retrieval”, Storage and Retrieval for Image and Video database, SPIE Vol. 2420, pp. 228-237, (1995)
[4] Barry C. and Ritter N.; Database of 120 Grayscale Eye Images. Lions Eye Institute, Perth Western Australia.
[5] Anoop Ms; “Public key Cryptography-applications Algorithms and Mathematical Explanations”. India: Tata Elxsi, (2007)
[6] Boles W. and Boashash B. “A Human Identification Technique Using Images of the Iris and Wavelet Transform”, IEEE Transactions on Signal Processing, Vol. 46, No. 4, (1998)
[7] Burt P. and Adelson E. “The Laplacian Pyramid as A Compact Image Code”. IEEE Transactions on Communications, Vol. 31, No. 4, (2004)
[8] C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. Kumar; “Biometric Encryption Using Image Processing”, in Proc. SPIE Optical Security and Counterfeit Deterrence Techniques II, R. L. van Renesse, Ed., Vol. 3314, No. 1, (2006)
[9] Noh S., Pae K., Lee C. and Kim J. “Multiresolution Independent Component Analysis for Iris Identification”,. International Technical Conference on Circuits/Systems, Computers and Communications, Phuket, Thailand, (2002)
[10] Clancy T., Kiyavash N., and Lin D. “Secure Smartcard-based Fingerprint Authentication,” in Proceedings ACM Multimedia 2003 Workshop on Biometric Methods and Applications, Berkeley, USA, (2003)
[11] Clancy T.C., Kiyavash N., and Lin D.J., “Secure Smart Card-Based Fingerprint Authentication”, ACM SIGMM Workshop Biometrics Methods and Application (WBMA), (2003)
[12] Connie T., Teoh A., Goh M., and Ngo D. “Palmhashing: A Novel Approach for Cancelable Biometrics”, Information Processing Letters, Vol. 93, No. 1, (2005)
[13] Duagman J., Anderson R. and Hao F. “Combining Crypto with Biometrics Effectively’’ IEEE Transactions on Computers, Vol. 55, No. 9, (2006)
[14] Ferguson N., Schneier B. “Practical Cryptography’’. Wiley. ISBN 0-471-22357-3, (2003)
[15] Field D.; “Relations between The Statistics of Natural Images And The Response Properties of Cortical Cells”. Journal of the Optical Society of America, (2005)
[16] Goh A. and Ngo C.; “Computation of Cryptographic Keys” Lecture Notes in Computer Science, Vol. 2828, (2003)
[17] Goh A. and Ngo D.C. L.; “Computation of Cryptographic Keys from Face Biometrics”, Proc. Int’l Federation for Information Processing 2003, pp. 1-13, (2003)
[18] Hao F. and Chan C.W.; “Private Key Generation from On-Line Handwritten Signatures”, Information Management & Computer Security, Vol. 10, No. 2, pp. 159-164, (2002)
[19] Hao F., Anderson R., and Daugman J. “Combining Cryptography with Biometrics Effectively”, University of Cambridge Computer Laboratory, Tech. Rep, (2005)
[20] Juels A. and Sudan M. “A Fuzzy Vault Scheme”, Proc. IEEE Int’l Symp. Information Theory, (2002)
[21] Kass M., Witkin A., Terzopoulos D. “Snakes: Active Contour Models”, International Journal of Computer Vision, (2005)
[22] Katz J., Lindell Y.; Introduction to Modern Cryptography, CRC Press. ISBN 1-58488-551-3, (2007)
[23] Lee T. “Image Representation Using 2d Gabor Wavelets”. IEEE Transactions of Pattern Analysis and Machine Intelligence, Vol. 18, No. 10, (2006)
[24] Lim S., Lee K., Byeon O. and Kim T. “Efficient Iris Recognition through Improvement of Feature Vector and Classifier”. ETRI Journal, Vol. 23, No. 2, Korea, (2001)
[25] Ma L., Wang Y. and Tan T. “Iris Recognition Using Circular Symmetric Filters”. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, (2002)
[26] Chinese Academy of Sciences–Institute of Automation. Database of 756 Grayscale Eye Images. http://www.sinobiometrics.com Version 1.0, (2003)
[27] O'Gorman L., “Seven Issues with Human Authentication Technologies”, AutoID, (2002)
[28] CASIA iris image database, in http://www.sinobiometrics.com, Chinese Academy of Sciences Institute of Automation.
[29] MMU iris image database, in http://pesona.mmu.edu.my/~ccteo, Multimedia University.
[30] Prabhakar S. , Pankanti S., Jain A. K. “Biometric Recognition: Security and Privacy Verification Competition” in Proc. Int. Conf. Pattern Recognition (ICPR), Quebec City, QC, Canada, pp. 744-747, (2003)
[31] Soutar C., Roberge D., Stoianov A., Gilroy R., and Vijaya Kumar B.V.K. “Biometric Encryption”, ICSA Guide to Cryptography, McGraw-Hill, (1999)
[32] Soutar C., Roberge D., Stoianov A., Gilroy R., and Kumar B. V. “Biometric Encryption Using Image Processing”, in Proc. SPIE Optical Security and Counterfeit Deterrence Techniques II, R. L. van Renesse,Ed., Vol. 3314, No. 1. SPIE, pp. 178–188, (1998)