References
[1]. Samir Nanavati, Michael Thieme, Raj Nanavati,
(2002). “Biometrics: Identity Verification in a Networked
World”, John wiley & sons Publishers, ISBN-13: 978-0-471-
09945-1.
[2]. Champod, Christophe, Chris J. Lennard, Pierre
Margot, and Milutin Stoilovic (2004). Fingerprints and
other Ridge Skin Impressions, CRC press.
[3]. Ross, Arun A., Karthik Nandakumar, and Anil K. Jain
(2006). Handbook of Multibiometrics, Vol. 6, Springer
Science & Business Media.
[4]. Berrin Yanikoglu and Alisher Kholmatov Sabanci
University, (2004). “Combining Multiple Biometrics to
Protect Privacy”, Proceedings of ICPR- BCTP Workshop,
Cambridge, U.K.
[5]. E. Camlikaya, A. Kholmatov, and B. Yanikoglu,
(2008). “Multi-biometric Templates using Fingerprint and
Voice,” Proceedings of SPIE, Vol. 69440I, pp. 1-9.
[6]. A. Ross and A. Othman, (2011). “Mixing Fingerprints for
th Template Security and Privacy,” Proceedings of 19
European Signal processing Conference (EUSIPCO),
Barcelona, Spain.
[7]. A. Othman and A. Ross, (2011). “Mixing Fingerprints for
Generating Virtual Identities,” Proceedings of IEEE
International Workshop on Information Forensics and
Security (WIFS), Foz do Iguacu, Brazil.
[8]. S. Li and A. C. Kot, (2011). “A Novel System for
th Fingerprint Privacy Protection,” Proceedings of 7
International Conference of Information Assurance and
Security (IAS), pp. 262–266.
[9]. S. Li, A. C. Kot, (2013). “Fingerprint Combination for
Privacy Protection”, IEEE Transactions on Information
Forensics and security, Vol. 8, No. 2, pp. 350-360.
[10]. Othman, Asem, and Arun Ross (2013). "On Mixing
Fingerprints”. IEEE Transactions on Information Forensics
and Security, Vol. 8, No. 1, pp. 260-267.
[11]. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar
st (2003). Handbook of Fingerprint Recognition, 1 edition
New York, Berlin Heidelberg: Springer-Verlag.
[12]. Dmitry O. Gorodnichy. “Evolution and evaluation of
biometric systems”, Publised in CISDA’09 Proceedings of
the 2nd IEEE International Conference on Computational
Intelligence for Security and Defence Applications, pp.
318-325.
[13]. Simson L. Garfinkel (2005). “Design Principles and
Pattern for Computer Systems that are Simultaneously
Secure and Usable”. Ph.D. Dissertion. MIT Cambridge,MA,
pp.56-66.
[14]. Manju, M., and V. Kavitha (2013). “Survey on
Fingerprint Enhancement Techniques”. International
Journal of Computer Applications, Vol. 62, No. 4 , pp. 41-
47.
[15]. Alonso-Fernandez, Fernando, Josef Bigun, Julian
Fierrez, Hartwig Fronthaler, Klaus Kollreider, and Javier
Ortega-Garcia (2009). “Fingerprint Recognition”. Guide
to Biometric Reference Systems and Performance
Evaluation, pp. 51-88. Springer London.
[16]. D. R. Ashbaugh (1999). Quantitative-Qualitative
Friction Ridge Analysis. Boca Raton, FL: CRC Press.
[17]. Jain, Anil K., Arun Ross, and Salil Prabhakar (2004). “An introduction to Biometric Recognition”. IEEE
Transactions on Circuits and Systems for Video
Technology, Vol.14, No. 1, pp. 4-20.
[18]. Alonso-Fernandez, Fernando, Josef Bigun, Julian
Fierrez, Hartwig Fronthaler, Klaus Kollreider, and Javier
Ortega-Garcia (2009). “Fingerprint Recognition”. Guide
to Biometric Reference Systems and Performance
Evaluation, pp. 51-88. Springer London.
[19]. Liu, Manhua, Xudong Jiang, and Alex Chichung Kot
(2005). "Fingerprint Reference-Point Detection." EURASIP
Journal of Advance Signal Processing, No. 4, pp. 498-
509.