177 http://doi.org/10.17993/3ctecno.2020.specialissue4.159-179
3C Tecnología. Glosas de innovación aplicadas a la pyme. ISSN: 2254 – 4143 Edición Especial Special Issue Marzo 2020
Hurley, D. J., Arbab-Zavar, B., & Nixon, M. S. (2008). The ear as a biometric. In Jain A.
K., Flynn P., Ross A. A. (eds) Handbook of Biometrics. Springer, Boston, MA, 131- 150.
https://doi.org/10.1007/978-0-387-71041-9_7
Juels, A., & Sudan, M. (2006). A fuzzy vault scheme. Designs, Codes and Cryptography, 38(2),
237-257.
Kacar, U., & Kirci, M. (2018). ScoreNet: deep cascade score level fusion for unconstrained
ear recognition. IET Biometrics, 8(2), 109-120. https://doi.org/10.1049/iet-
bmt.2018.5065
Koptyra, K., & Ogiela, M. R. (2015). Fuzzy vault schemes in multi-secret digital
steganography. In 2015 10th International Conference on Broadband and Wireless
Computing, Communication and Applications (BWCCA). IEEE. https://doi.org/10.1109/
BWCCA.2015.87
Lakshmanan, L. (2013). Ecient person authentication based on multi-level fusion of
ear scores. IET biometrics, 2(3), 97-106. https://doi.org/10.1049/iet-bmt.2012.0049
Lee, Y. J., Park, K. R., Lee, S. J., Bae, K., & Kim, J. (2008). A new method for generating
an invariant iris private key based on the fuzzy vault system. IEEE Transactions on
Systems, Man, and Cybernetics, Part B (Cybernetics), 38(5), 1302- 1313. https://doi.
org/10.1109/TSMCB.2008.927261
Nandakumar, K., Jain, A.K., & Pankanti, S. (2007). Fingerprint-based fuzzy vault:
Implementation and performance. IEEE transactions on information forensics and security,
2(4), 744-757. https://doi.org/10.1109/TIFS.2007.908165
Pug, A., & Busch, C. (2012). Ear biometrics: a survey of detection, feature extraction
and recognition methods. IET biometrics, 1(2), 114-129. https://doi.org/10.1049/iet-
bmt.2011.0003
Rathgeb, C., Pug, A., Wagner, J., & Busch, C. (2016). Eects of image compression
on ear biometrics. IET Biometrics, 5(3), 252-261. https://doi.org/10.1049/iet-
bmt.2015.0098