1. Ratha NK (2010) Privacy protection in high security biometrics applications. In: Kumar A, Zhang D (eds) Ethics and policy of biometrics, ser. Lecture notes in computer science. Springer, Berlin Heidelberg. vol. 6005, pp 62–69
2. Hirata S, Takahashi K (2009) Cancelable biometrics with perfect secrecy for correlation-based matching. In: Tistarelli M, Nixon M (eds) Advances in biometrics, ser. Lecture notes in computer science. Springer, Berlin Heidelbergvol. 5558, pp 868–878
3. Bolle RM, Connel JH, Ratha NK (2002) Biometrics perils and patches. Pattern Recogn 35(12):2727–2738
4. Sutcu Y, Li Q, Memon (2007) Protecting biometric templates with sketch: theory and practice. IEEE Transact Inform Forens Secur 2(3):503–512
5. Hmmerle-Uhl J, Pschernig E, Uhl A (2009) Cancelable iris biometrics using block re-mapping and image warping. In: Samarati P, Yung M, Martinelli F, Ardagna C (eds) Information security, ser. Lecture notes in computer science. Springer, Berlin Heidelbergvol. 5735, pp 135–142