IEEE SIGNAL PROCESSING MAGAZINE, VOL. X, NO. X, MONTH 20XX 23
[25] S. Hirata and K. Takahashi, “Cancelable biometrics with perfect secrecy for correlation-based matching,” in Advances in
Biometrics, ser. Lecture Notes in Computer Science, M. Tistarelli and M. Nixon, Eds. Springer Berlin Heidelberg, 2009,
vol. 5558, pp. 868–878.
[26] E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri, “Cancelable templates for sequence-based biometrics
with application to on-line signature recognition,” IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems
and Humans, vol. 40, no. 3, pp. 525–538, May 2010.
[27] C. Rathgeb, F. Breitinger, C. Busch, and H. Baier, “On the application of bloom filters to iris biometrics,” IET Journal on
Biometrics, vol. 3, no. 4, pp. 207–218, 2014.
[28] C. Rathgeb and C. Busch, “Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters,” Computers
& Security, vol. 42, no. 0, pp. 1 – 12, 2014.
[29] C. Rathgeb, F. Breitinger, and C. Busch, “Alignment-free cancelable iris biometric templates based on adaptive bloom
filters,” in IAPR International Conference on Biometrics, June 2013, pp. 1–8.
[30] W. Xu, Q. He, Y. Li, and T. Li, “Cancelable voiceprint templates based on knowledge signatures,” in International
Symposium on Electronic Commerce and Security, Aug 2008, pp. 412–415.
[31] J. Camenisch and M. Stadler, “Efficient group signature schemes for large groups,” in International Cryptology Conference
on Advances in Cryptology. London, UK, UK: Springer-Verlag, 1997, pp. 410–424.
[32] A. B. J. Teoh and C. T. Yuang, “Cancelable biometrics realization with multispace random projections,” IEEE Transactions
on Systems, Man, and Cybernetics, Part B, vol. 37, no. 5, pp. 1096–1106, 2007.
[33] A. B. Teoh, Y. W. Kuan, and S. Lee, “Cancellable biometrics and annotations on biohash,” Pattern Recognition, vol. 41,
no. 6, pp. 2034 – 2044, 2008.
[34] T. Connie, A. Teoh, M. Goh, and D. Ngo, “Palmhashing: a novel approach for cancelable biometrics,” Information
Processing Letters, vol. 93, no. 1, pp. 1 – 5, 2005.
[35] A. Teoh, D. N. C. Ling, and A. Goh, “Biohashing: two factor authentication featuring fingerprint data and tokenised random
number,” Pattern Recognition, vol. 37, no. 11, pp. 2245 – 2255, 2004.
[36] A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, “An analysis of biohashing and its variants,” Pattern Recognition,
vol. 39, no. 7, pp. 1359 – 1368, 2006.
[37] L. Leng and J. Zhang, “Palmhash code vs. palmphasor code,” Neurocomputing, vol. 108, no. 0, pp. 1 – 12, 2013.
[38] L. Leng, A. B. J. Teoh, M. Li, and M. K. Khan, “Analysis of correlation of 2dpalmhash code and orientation range suitable
for transposition,” Neurocomputing, vol. 131, no. 0, pp. 377 – 387, 2014.
[39] J. Zuo, N. Ratha, and J. Connell, “Cancelable iris biometric,” International Conference on Pattern Recognition, pp. 1–4,
2008.
[40] F. Farooq, R. Bolle, T.-Y. Jea, and N. Ratha, “Anonymous and revocable fingerprint recognition,” in IEEE Conference on
Computer Vision and Pattern Recognition, June 2007, pp. 1–7.
[41] T. Boult, “Robust distance measures for face-recognition supporting revocable biometric tokens,” in International
Conference on Automatic Face and Gesture Recognition, April 2006, pp. 560–566.
[42] T. Boult, W. Scheirer, and R. Woodworth, “Revocable fingerprint biotokens: accuracy and security analysis,” in IEEE
Conference on Computer Vision and Pattern Recognition, June 2007, pp. 1–8.
[43] B. Yang, D. Hartung, K. Simoens, and C. Busch, “Dynamic random projection for biometric template protection,” in IEEE
International Conference on Biometrics: Theory Applications and Systems, Sept 2010, pp. 1–7.
May 14, 2015 DRAFT