1. Soutar, C., et al.: Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)
2. Soutar, C., et al.: Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, pp. 24–35 (1998)
3. Soutar, C., et al.: Biometric encryption. In: Nichols, R.K. (ed.) ICSA Guide to Cryptography. McGraw-Hill, New York (1999)
4. Juels, A., Sudan, M.: Proc. of IEEE Intl. Symp. on Info. Theory, Lausanne, Switzerland, p. 408 (2002)
5. Uludag, U., et al.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K., et al. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)