[1] Liu, S.; Silverman, M. “A Practical Guide to Biometric Security Technology,” IT Prof. 2001, 3(1), 27–32.##
[2] Wang, Q.; Zhang, X.; Li, M.; Dong, X.; Zhou, Q.; Yin, Y. “Adaboost and Multi-Orientation 2d Gabor-Based Noisy Iris Recognition,” Pattern Recognit. Lett. 2012, 33(8), 978–983.##
[3] Singh, G. “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,” Int. J. Comput. Appl. 2013, 67(19),33-38.##
[4] Wildes, R. P. “Iris Recognition: An Emerging Biometric Technology,” P. IEEE. 1997, 85(9), 1348–1363.##
[5] Kalpana, P.; Singaraju, S. “Data Security in Cloud Computing Using RSA Algorithm,” Int. J. Res. Comput. Commun. Technol. 2012, 278–5841.##
[6] Padmavathi, B.; Kumari, S. R. “A Survey on Performance Analysis of DES, AES And RSA Algorithm along with LSB Substitution,” Int. J. Sci. Res., India, 2013, 2(4), 170-174.##
[7] Abdullah, M. A. M.; Dlay, S. S.; Woo, W. L.; Chambers, J. A. “A Framework for Iris Biometrics Protection: A Marriage Between Watermarking and Visual Cryptography,” IEEE Access 2016, 4, 10180–10193.##
[8] Zare, A.; Aghagolzadeh, A.; Kazemitabar, S. J. “A Novel Metaheuristic Based Visual Cryptography”; Adv. Defence Sci. Technol. 2019, 10(3), 297-306 (In Persian).##
[9] Shamsafar, F.; Seyedarabi, H.; Aghagolzadeh, A. “Securing the Iris Database Using Visual Cryptography and Substitution” 21st Iranian Conf. Elec. Eng. 2013 (In Persian).##
[10] Abdullah, M. A. M. “Advancing Iris Biometric Technology.” Newcastle Univ. 2017.##
[11] Jin, Z.; Hwang, J. Y.; Lai, Y.-L.; Kim, S.; Teoh, A. B. J. “Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing,” IEEE Trans. Inf. Forensics Secur. 2017, 13(2), 393–407.##
[12] Dubey, R. B.; Madan, A. “Iris Localization Using Daugman’s Intero-Differential Operator,” Int. J. Comput. Appl. 2014, 93(3), 6–12.##
[13] Shah; S.; Ross, A. “Iris Segmentation Using Geodesic Active Contours,” IEEE Trans. Inf. Forensics Secur. 2009, 4(4), 824–836.##
[14] Proença H., Alexandre L.A., ICIAP 2005: Image Analysis and Processing – ICIAP 2005 pp 970-977.##
[15] Harakannanavar, S. S.; Prabhushetty, K. S.; Hugar, C.; Sheravi, A.; Badiger, M.; Patil, P. “IREMD: An Efficient Algorithm for Iris Recognition,” Int. J. Adv. Netw. Appl. 2018, 9, (5), 3580–3587.##
[16] Boukhari, A.; Chitroub, S.; Bouraoui, I. “Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm,” Int. J. Commun. Netw. Syst. Sci. 2011, 4(12), 778.##
[17] Zhao, D.; Fang, S.; Xiang, J.; Tian, J.; Xiong, S. “Iris Template Protection Based on Local Ranking,” Secur. Commun. Netw. 2018, 2018,1-9.##