[1]
A. K. Jain and U. Uludag, Hiding Biometric Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, pp.1494-1498, (2003).
DOI: 10.1109/tpami.2003.1240122
Google Scholar
[2]
N. K. Ratha, J. H. Connell, and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM System Journal, vol. 40, pp.614-634, (2001).
DOI: 10.1147/sj.403.0614
Google Scholar
[3]
A. K. Jain, A. Ross, and S. Pankanti, Biometrics: a tool for information security, Information Forensics and Security, IEEE Transactions on, vol. 1, pp.125-143, (2006).
DOI: 10.1109/tifs.2006.873653
Google Scholar
[4]
M. M. Yeung and S. Pankanti, Verification watermarks on fingerprint recognition and retrieval, in Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, California, 1999, pp.66-78.
DOI: 10.1117/12.344704
Google Scholar
[5]
B. Gunsel, U. Uludag, and A. M. Tekalp, Robust watermarking of fingerprint images, Pattern Recognition, vol. 35, pp.2739-2747, (2002).
DOI: 10.1016/s0031-3203(01)00250-3
Google Scholar
[6]
M. Vatsa, R. Singh, A. Noore, and M. Houck, Robust biometric image watermarking for fingerprint and face template protection, IEICE Electronics Express, vol. 3, pp.23-28, (2006).
DOI: 10.1587/elex.3.23
Google Scholar
[7]
M. K. Khan, J. Zhang, and L. Tian, Chaotic secure content-based hidden transmission of biometric templates, Chaos, Solitons & Fractals, vol. 32, pp.1749-1759, (2007).
DOI: 10.1016/j.chaos.2005.12.015
Google Scholar
[8]
M. Faundez-Zanuy, M. Hagmüller, and G. Kubin, Speaker identification security improvement by means of speech watermarking, Pattern Recognition, vol. 40, pp.3027-3034, (2007).
DOI: 10.1016/j.patcog.2007.02.016
Google Scholar
[9]
M. Vatsa, R. Singh, and A. Noore, Feature based RDWT watermarking for multimodal biometric system, Image and Vision Computing, vol. 27, pp.293-304, (2009).
DOI: 10.1016/j.imavis.2007.05.003
Google Scholar
[10]
W. -g. Kim and H. Lee, Multimodal biometric image watermarking using two-stage integrity verification, Signal Processing, vol. 89, pp.2385-2399, (2009).
DOI: 10.1016/j.sigpro.2009.04.014
Google Scholar
[11]
R. C. Reininger and J. D. Gibson, Distributions of the two-dimensional DCT coefficients for images, IEEE Transactions on Communications, vol. 31 pp.835-839, (1983).
DOI: 10.1109/tcom.1983.1095893
Google Scholar
[12]
S. R. Smoot and L. A. Rowe, Study of DCT coefficient distributions, in Proceedings of the SPIE Symposium on Electronic Imaging, 1996, pp.403-411.
Google Scholar
[13]
H. Freeman, Computer processing of line-drawing images, ACM Computing Surveys (CSUR), vol. 6, pp.57-97, (1974).
DOI: 10.1145/356625.356627
Google Scholar