Open Access
MATEC Web of Conferences
Volume 42, 2016
2015 The 3rd International Conference on Control, Mechatronics and Automation (ICCMA 2015)
Article Number 06003
Number of page(s) 5
Section Image processing and Applications
Published online 17 February 2016
  1. Vaclav Matyas and Zdenek Rha “Biometric Authentication Security and Usability”, 3rd ed. IEEE.
  2. Selina Oko and Jane Oruh “Enhanced ATM Security System using Biometrics,”, 3rd ed. International Journal of Computer Science Issues, Vol. 9, Issue 5, No 3, September (2012) ISSN (Online): 1694–0814.
  3. William Stallings, “Cryptography and Network Security Principles and Practice”, Prentice Hall.
  4. D. Kenny “Energy Efficiency Analysis and implementation of AES on an FPGA”, Waterloo, Ontario, Canada, (2008).
  5. Shuo Zhang, Ruhua Cai and Yingchun Jiang, “An Image Encryption Algorithm Based on Multiple Chaos and Wavelet Transform”, (2009) IEEE pp. 178–188.
  6. Po-Yueh Chen and Hung Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering.
  7. Fumiko Hayashi, Richard Sullivan, and Stuart Weiner “ A Guide to the ATM and Debit Card Industry Payments System” Research Department Federal Reserve Bank of Kansa City, Kansas City, Missouri, USA (2003).
  8. Le Hoang Thai and Ha Nhat Tam “Fingerprint recognition using standardized fingerprint model ” IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 7, May (2010).
  9. Long Bao, Yicong Zhou, and C. L. Philip Chen, “Image Encryption in the Wavelet Domain”, Mobile Multimedia/Image Processing, Security, and Applications (2013).
  10. J. V. Dyken and J. G. Delgado-Frias. “FPGA schemes for minimizing the power-throughput trade-off in executing the Advanced Encryption Standard algorithm” School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA 99164–2752, USA, Available online 16 December (2009)