References
- W. Yang, J. Hu, J. Yang, S. Wang, and L. Shu, "Biometrics for Securing Mobile Payments:Benefits, Challenges and Solutions," Image and Signal Processing Vol. 2, 2013.
- C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP Journal on Information Security 2011.1, pp. 1-25, 2011.
- S. Rane, Y. Wang, S.C. Draper, and P. Ishwar, "Secure Biometrics: Concepts, Authentication Architectures & Challenges," Signal Processing Magazine, Vol. 30, No. 5, pp. 51-64, 2013.
- M. Hassinen, K. Hypponen, and E. Trichina, "Utilizing National Public-key Infrastructure in Mobile Payment Systems," Electronic Commerce Research and Applications, Vol. 7, No. 2, pp. 214-231, 2008. https://doi.org/10.1016/j.elerap.2007.03.006
- J.T. Isaac, and S. Zeadally, "Secure Mobile Payment Systems," IT Professional, Vol. 16, No.3, pp. 36-43, 2014. https://doi.org/10.1109/MITP.2014.40
- S. Elfakharany, A.F. Amin, and M. Zaki, Secure Mobile Payment Protocol using Asymmetric Encryption for Authorization," Journal of Network Communications and Emerging Technologies, Vol. 2, 2015.
- T. Dahlberg, J. Guo, and J. Ondrus," A critical review of mobile payment research," Electronic Commerce Research and Applications, Vol. 14, No. 5, pp.265-284, 2015. https://doi.org/10.1016/j.elerap.2015.07.006
- A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Information Theory, Lausanne, Switzerland, pp. 408, 2002.
- W.J. Scheirer and T.E. Boult, "Cracking Fuzzy vaults and Biometric Encryption," Biometrics Symposium, 2007.
- F. Benhammadi and K.B. Bey, "Password hardened fuzzy vault for fingerprint authentication system," Image and Vision Computing, Vol. 32. No. 8, pp. 487-496, 2014. https://doi.org/10.1016/j.imavis.2014.04.014
- M. Khalil-Hani, M. N. Marsono, and R. Bakhteri, "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, Vol. 29, No. 3, pp. 800-810, 2013. https://doi.org/10.1016/j.future.2012.02.002
- T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," IET Biometrics, Vol. 4, No. 1, pp. 29-39, 2015. https://doi.org/10.1049/iet-bmt.2014.0026
- T. K. Dang, Q. C. Truong, T. T. B. Le, and H. Truong, "Cancellable fuzzy vault with periodic transformation for biometric template protection," Biometrics, IET, pp. 1-7, 2016.
- M.T. Nguyen, Q.H. Truong, and T.K. Dang. "Enhance fuzzy vault security using nonrandom chaff point generator," Information Processing Letters, Vol. 116, No.1, pp. 53-64, 2016. https://doi.org/10.1016/j.ipl.2015.08.012
- R. Bansal, P. Sehgal and P. Bedi. "Minutiae Extraction from Fingerprint Images - a Review," International Journal of Computer Science Issues, Vol.8, Issue 5, No. 3, pp.74-85, 2011.
- C.I. Watson, M.D. Garris, E. Tabassi, C.L. Wilson, R.M. McCabe, S. Janet and K.Ko, "User's Guide to NIST Biometric Image Software" National Institute of Standards and Technologies. 2007.
- Wu Zhili, "Fingerprint Recognition," M.S. thesis, Department of Computer Science, Hong Kong Baptist University, Hongkong, 2002.
- A. K. Jain, A. Ross, and S. Prabhakar. "An introduction to biometric recognition," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, pp. 4-20, 2004. https://doi.org/10.1109/TCSVT.2004.839484
- A. Jain, P. Flynn, and A. A. Ross. Handbook of Biometrics. Springer Science & Business Media, 2007.
- Robert Fazan, "SourceAFIS - Fingerprint recognition toolkit," Jun. 2016;http://www.sourceafis.org/blog/sourceafis-1-7/
- Wu Zhili, "Fingerprint Recognition," Jun. 2016;http://www.comp.hkbu.edu.hk/-vincent/resPaper.htm