A. Adler, Biometric system security. Handbook of biometrics, 2007.
DOI : 10.1007/978-0-387-71041-9_19

URL : http://www.sce.carleton.ca/faculty/adler/publications/2007/adler-2007-biometrics-system-security.pdf

R. Belguechi, C. Rosenberger, and S. A. Aoudia, Biohashing for securing minutiae template, Proceedings of the 20th International Conference on Pattern Recognition, pp.1168-1171, 2010.
DOI : 10.1109/icpr.2010.292

R. Belguechi, A. Hafiane, E. Cherrier, and C. Rosenberger, Comparative study on texture features for fingerprint recognition: application to the biohashing template protection scheme, Journal of Electronic Imaging, vol.25, issue.1, pp.13033-013033, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01269208

R. M. Bolle, J. H. Connell, and N. K. Ratha, Biometric perils and patches, Pattern Recognition, vol.35, issue.12, pp.2727-2738, 2002.
DOI : 10.1016/s0031-3203(01)00247-3

J. Bringer, H. Chabanne, M. Favre, A. Patey, T. Schneider et al., Gshade: faster privacy-preserving distance computation and biometric identification, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pp.187-198, 2014.

H. Chabanne, J. Bringer, G. Cohen, B. Kindarji, and G. Zemor, Optimal iris fuzzy sketches, IEEE first conference on biometrics BTAS, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00269913

S. Santanu-chatterjee, A. Roy, S. Kumar-das, N. Chattopadhyay, A. Kumar et al., Secure biometricbased authentication scheme using chebyshev chaotic map for multiserver environment, IEEE Transactions on Dependable and Secure Computing, 2016.

S. Hoory, A. Magen, S. Myers, and C. Rackoff, Simple permutations mix well, Theor. Comput. Sci, vol.348, issue.2-3, pp.251-261, 2005.
DOI : 10.1007/978-3-540-27836-8_65

URL : http://www.cs.ubc.ca/~shlomoh/papers/kwise05.pdf

A. Jain, K. Nandakumar, and A. Nagar, Biometric template security, In EURASIP Journal on Advances in Signal Processing, 2008.

Z. Jin, J. Y. Hwang, Y. L. Lai, S. Kim, and A. B. Teoh, Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing, IEEE Transactions on Information Forensics and Security, vol.13, issue.2, pp.393-407, 2018.
DOI : 10.1109/tifs.2017.2753172

URL : http://arxiv.org/pdf/1703.05455

A. Juels and M. Sudan, A fuzzy vault scheme. Des. Codes Cryptography, vol.38, pp.237-257, 2006.
DOI : 10.1007/s10623-005-6343-z

A. Juels and M. Wattenberg, A fuzzy commitment scheme, ACM conference on Computer and communication security, pp.28-36, 1999.
DOI : 10.1145/319709.319714

URL : http://www.rsalabs.com/rsalabs/staff/ajuels/papers/fuzzycommit.ps

A. Kong, K. H. Cheung, D. Zhang, M. Kamel, and J. You, An analysis of biohashing and its variants, Pattern Recognition, vol.39, 2005.
DOI : 10.1016/j.patcog.2005.10.025

URL : http://hdl.handle.net/10397/20801

A. Lumini and L. Nanni, Empirical tests on biohashing. NeuroComputing, vol.69, pp.2390-2395, 2006.

D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2003.

A. Nagar, K. Nandakumar, and A. K. Jain, Biometric template transformation: A security analysis, Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII, 2010.
DOI : 10.1117/12.839976

M. Vishal, . Patel, R. Nalini-k-ratha, and . Chellappa, Cancelable biometrics: A review, IEEE Signal Processing Magazine, vol.32, issue.5, pp.54-65, 2015.

. Jaishanker-k-pillai, M. Vishal, R. Patel, . Chellappa, and . Ratha, Sectored random projections for cancelable iris biometrics, Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on, pp.1838-1841, 2010.

D. Maio, R. Cappelli, A. Lumini, and D. Maltoni, Fingerprint image reconstruction from standard templates, IEEE Transactions on Pattern Analysis Machine Intelligence, vol.29, pp.1489-1503, 2007.

K. Nalini, J. H. Ratha, R. M. Connell, and . Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM systems Journal, vol.40, issue.3, pp.614-634, 2001.

N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, Generating cancelable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intell, vol.29, issue.4, pp.561-572, 2007.
DOI : 10.1109/tpami.2007.1004

N. K. Ratha, J. H. Connelle, and R. Bolle, Enhancing security and privacy in biometrics-based authentication system, IBM Systems J, vol.37, issue.11, pp.2245-2255, 2001.
DOI : 10.1147/sj.403.0614

C. Rathgeb, F. Breitinger, C. Busch, and H. Baier, On application of bloom filters to iris biometrics, IET Biometrics, vol.3, issue.4, pp.207-218, 2014.
DOI : 10.1049/iet-bmt.2013.0049

C. Rosenberger, Evaluation of biometric template protection schemes based on a transformation, International Conference on Information Systems Security and Privacy (ICISSP), 2018.
DOI : 10.5220/0006550502160224

URL : https://hal.archives-ouvertes.fr/hal-01620968

N. Saini and A. Sinha, Soft biometrics in conjunction with optics based biohashing, Optics Communications, vol.284, issue.3, pp.756-763, 2011.
DOI : 10.1016/j.optcom.2010.10.007

K. Simoens, C. Chang, and B. Preneel, Privacy weaknesses in biometric sketches, 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/sp.2009.24

URL : https://www.cosic.esat.kuleuven.be/publications/article-1205.pdf

A. B. Teoh, Y. Kuanb, and S. Leea, Cancellable biometrics and annotations on biohash. Pattern recognition, vol.41, pp.2034-2044, 2008.
DOI : 10.1016/j.patcog.2007.12.002

A. B. Teoh, D. Ngo, and A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern recognition, p.40, 2004.

A. Teoh and . Ngo, Cancellable biometrics realization through biophasoring, Proceedings of 9th IEEE International Conference on Control, Automation, Robotics and Vision (ICARCV'06), 2006.

L. Zhang, L. Zhang, and D. Zhang, Finger-knuckle-print verification based on band-limited phase-only correlation, International Conference on Computer Analysis of Images and Patterns, pp.141-148, 2009.
DOI : 10.1007/978-3-642-03767-2_17

URL : http://www4.comp.polyu.edu.hk/~cslzhang/paper/conf/CAIP09_ZL.pdf

X. Zhou, S. D. Wolthusen, C. Busch, and A. Kuijper, Feature correlation attack on biometric privacy protection schemes, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.1061-1065, 2009.
DOI : 10.1109/iih-msp.2009.237