References
[1]. Aanjanadevi, S., Palanisamy, V., & Aanjankumar, S.
(2019, April). An improved method for generating
biometric-cryptographic system from face feature. In
2019, 3rd International Conference on Trends in
Electronics and Informatics (ICOEI) (pp. 1076-1079). IEEE. https://doi. org/10.1109/ICOEI.2019.8862741
[2]. Adamovic, S., Milosavljevic, M., Veinovic, M., Sarac,
M., & Jevremovic, A. (2016). Fuzzy commitment scheme
for generation of cryptographic keys based on iris
biometrics. IET Biometrics, 6(2), 89-96.
[3]. Afriyie, O. K., & Arkorful, V. (2019). Enhancing security
of automated teller machines using biometric
authentication: A case of a Sub-Saharan University.
Researchgate Publication, 9(7), 7-22. https://doi.org/10.
7176/IKM/9-7-02
[4]. Aggarwal, D., & Maurer, U. (2016). Breaking RSA
generically is equivalent to factoring. IEEE Transactions on
Information Theory, 62(11), 6251-6259. https://doi.org/10.
1109/TIT.2016.2594197
[5]. Barman, S., Samanta, D., & Chattopadhyay, S.
(2015). Fingerprint-based crypto-biometric system for
network security. EURASIP Journal on Information Security,
1, 1-17. https://doi.org/10.1186/s13635-015-0020-1
[6]. Chebotareva, A. A., Chebotarev, V. E., & Rozanov, A.
S. (2018). Communication society and security: current
t h r e a t s a n d l e g a l m a i n t e n a n c e. I n D i g i t a l
Communication Management. IntechOpen. https://doi.
org/10.5772/intechopen.75756
[7]. Dwivedi, R., Dey, S., Sharma, M. A., & Goel, A. (2019).
A fingerprint based crypto-biometric system for secure
communication. Journal of Ambient Intelligence and
Humanized Computing, 1-15. https://doi.org/10.1007/
s12652-019-01437-5
[8]. Jin, Z., Teoh, A. B. J., Goi, B. M., & Tay, Y. H. (2016).
Biometric cryptosystems: A new biometric key binding
and its implementation for fingerprint minutiae-based
representation. Pattern Recognition, 56, 50-62. https://
doi.org/10.1016/j.patcog.2016.02.024
[9]. Osho, O., Musa, F. A., Misra, S., Uduimoh, A. A.,
Adewunmi, A., & Ahuja, R. (2019, October). Absolute
secure: A tri-layered data security system. In International
Conference on Information and Software Technologies
(pp. 243-255). Springer, Cham. https://doi.org/10.1007/
978-3-030-30275-7_19
[10]. Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O.
(2014). A simple encryption and decryption system. In
Conference: International Conference on Science,
Technology, Education, Arts, Management and Social
Sciences (ISTEAMS), Ado-Ekiti, Nigeria (pp. 77-84).
[11]. Saad, A. M. S. E. (2019, November). A Systematical
review study to investigate the use of biometric security
techniques in automatic teller machines: Insight from the
st past 15 years. In 2019, 1 International Informatics and
Software Engineering Conference (UBMYK) (pp. 1-4). IEEE.
https://doi.org/10.1109/UBMYK48245.2019.8965494
[12]. Shenoy, K. M., & Shaikh, S. G. (2019, July). An
Approach to secure data transmission through the use of
cryptography and steganography. In 2019 International
Conference on Communication and Electronics Systems
(ICCES) (pp. 1039-1043). IEEE. https://doi.org/10.1109/
ICCES45898.2019.9002029