Author:
Karthika K.,Priya R. Devi
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Shankar, K., Elhoseny, M., Dhiravida Chelvi, E., Lakshmanaprabu, S.K., Wanqing, Wu.: An efficient optimal key based chaos function for medical image security. IEEE Access 6, 77145–77154 (2018)
2. Joshi, M.R., Renuka, R.A.: Network security with cryptography. Int. J. Comput. Sci. Mob. Comput. IJCSMC. 4(1), 201 (2015)
3. Ankit, K., Rekha, J.: Biometrics as a cryptographic method for network security. Indian J. Sci. Technol. 9(22), 1–6 (2016)
4. Gaddam, S.V., Lal, M.: Efficient cancelable biometric key generation scheme for cryptography. IJ Netw. Secur. 11(2), 61–69 (2010)
5. Kim, Y.G., Shin, K.Y., Lee, E.C., Park, K.R.: Multimodal biometric system based on the recognition of face and both irises. Int. J. Adv. Rob. Syst. 9(3), 65 (2012)