[1]
K. Ruth Ramya, S. Saahithi, T. Gnaneswar, and S. Afsar Jaha, “A survey on biometric based crypto techniques”, IJET, vol. 7, no. 2.7, pp. 1091–1095, Mar. 2018, doi: 10.14419/ijet.v7i2.7.12234.