1. Zheng, F., Askar, R., Wang, R.Y., Li, L.T.: Overview of biometric recognition technology. J. Inf. Secur. Res. 2(1), 12–26 (2016)
2. Huo, H.W., Xia, T.N., Feng, J.: Security analysis on biometrics system. Stand. Res. 4, 48–51 (2013)
3. Lecture Notes in Computer Science;NK Ratha,2001
4. Ao, S., Ma, J., Tang, S.L.: Safety analysis and reflection on biometrics system. Microcomput. Inf. 23(1–2), 288–290 (2007)
5. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (CCCS), pp. 28 − 36. ACM, New York (1999)