[1] Pankanti , S.,R.M.Bolle,A. K.Jain, 2000.and,Biometrics: The Future of Identification. IEEE Computer 33 46 -49
[2] Cappelli , R.,A.Lumini,D.Maio,D.Maltoni, .Fing-erprint Image Reconstruction From Standard Tem-plates,IEEE Trans. PAMI 29 1489 -1503
[3] Karthik N.,A.K.Jain,S.Pankanti, 2007.Fingerprint-Based Fuzzy Vault: Implementation and Performa-nce,IEEE Transactions on Information Forensics and Security -
[4] SarikaK.,P.C.Gupta,K.Mantri,:, 2013.Survey of Threats to the Biometric Authentication Systems and Solu-tions,International Journal of Computer 61 -
[5] Juels and M.,Sudan , A Fuzzy,VaultScheme, 2002.,Proc. IEEE International Symposium on Information Theory 408 -
[6] Nonozisokhi G. , Suharsono,G.A., 2017.Int-roduction of Hd3a gene in IPB CP1 potato cultivar through Agrobacterium tumefaciensmediated tra-nsformation under the control of use 35S CaMV promoter,Pak.J. Biotechnol 14 129 -134
[7] Cavoukian and A.,Stoianov, 2009.Biometrics: theory, methods and applications,Biometric Encryption: The New Breed of Untraceable Biometrics Ch 26 -
[8] Tomko , G.J.,C.Soutar,G. J.Schmidt, 1994.Fingerprint controlled public key cryptographic system,US Patent 5 -
[9] Clancy , T.C.,N.Kiyavash,D.J.Lin, 2003.Secure smart card-based fingerprint authentication,Proc. ACM SIGMM workshop on Biometrics methods and applications 45 52 -
[10] A fuzzy vault scheme,Des. Codes Cryptography 38 237 -257 2006
[11] Mohamed K.H. , M.N.,Marsono , R.,Bakhteri, 2013.Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm‖. Feature generation computer,Systems -
[12] George S. Eskander , Robert Soberin, Eric,Granger, 2014.A bio-cryptographic system based on offline signature images‖, Information sciences (, -
[13] Natthakorn W.,K.Nakkanong,C.Nualsri, 2017.Express-ion responses of pathogenesis-related proteins in tolerant and susceptible hevea brasiliensis clones to the white root disease,Pak. J. Biotechnol 14 141 -148
[14] V Evelyn,A.M Natarajan, 2012.Fingerprint and palm print based fuzzy vault‖,Journal of Biometrics and Biostatistics -
[15] Karthik N. anilK.,Jain, 2008.Multibiometric Template Security Using Fuzzy Vault,Biometrics: Theory, Appl-ications and Systems, BTAS-08. 2nd IEEE International Conference on 29 Sept -
[16] Abhisekh N.,K.N.Kumar,A.A.K.Jain, 2012.Multibiometric cryptosystem based on feature-level fusion‖,IEEE Transaction on information Forensics and Security -
[17] Archana K.C., 2011.Biometric Cryptosystem Using Fuzzy Vault For Iris,International J.of Multidispl. Research & Advcs. in Engg. (IJMRAE) 3 187 -192
[18] Rethna J. , Virgil,J,C.J.Jangid,:, 2013.Multibiometric Cryptosystem with Fuzzy Vault and Fuzzy Commitment by Feature-Level Fusion,International Journal of Emerging Technology and Advanced Engineering 3 -
[19] Li L.,J.Peng, 2014.Finger Multi biometric Cryptosystem using Feature-Level Fusion,International Journal of Signal Processing, Image Processing and Pattern Recognition 7 223 -236
[20] MeenakshiV.S.,G.Padmavathi, 2010.Security analysis of Password Hardened multimodal biometric fuzzy vault with combined feature point extracted from finger print, iris and retina for high security applications‖, science direct (, -