*1.2.2 Fuzzy vault*

Juels and Sudan [16] propose a novel cryptographic construction scheme defined as a fuzzy vault. Alice is a player lock a secret value in a fuzzy vault and "lock" it, using a set of element A. using set B of the same length Bob will try to "unlock" the vault, he gets the secret only, if A and B overlap substantially [16].

Uludag et al. [17] explore the combination of fuzzy vault with the fingerprint minutiae data, which try to secure the important data using the fingerprint data, such that only the authorized user can access the secret by providing the valid fingerprint [17].

Nandakumar and Jain [18] use the fuzzy vault to secure a multi-biometric template derived from a person's templates. Exhibiting that a multi-biometric vault provides better recognition performance and higher security compared with a uni-biometric vault [18].

Khalil-Hani et al. [19] "propose a new chaff generation algorithm which is computationally fast and viable for hardware acceleration by employing simple arithmetic operations" [19].

You et al. [20] proposed cancelable fuzzy vault algorithm based on the user's transformed fingerprint features, which are used to generate a fuzzy vault [20].

#### *1.2.3 Combining cryptography with EEG signals*

DamaševiIius et al. [21] "combine an EEG based biometric with the fuzzy commitment scheme and BCH error correcting for person. Evaluating features that are covariance matrix of EEG data using EEG recorded from 42 subjects. The experimental results present that the system can generate up to 400 bits of cryptographic key from the EEG codes, while tolerating up to 87 bits of error [21]."
