1Prins C.Biometric technology law [J].Computer Law and Security Reports, 1998; 14(3) : 159-165. 被引量:1
2Anil Jain,LinHong,Sharath Pankanti.Biometric Identification[J].Communications of the ACM,2000;43(2):90-98. 被引量:1
3Jain A K,Hong L,Bolle R.On-line fingerprint verification[J].IEEE Trans Pattern Analysis and Machine Intelligence, 1997 ; 19(4) :302-313. 被引量:1
4Ashboum J.Practical implemention of biometrics based on hand geometry[C].In:IEEE Colloquium Electronics Division Colloquium on Image Processing for Biometric Measurement,London, 1994 : 1-5. 被引量:1
5Boles W W,Chu S Y T.Personal identification using image of human palm[C].In :IEEE TENCON Speech and Image Techologies for Computing and Telecommunications, 1997 : 295-298. 被引量:1
6Chellappa R,Wilson C L,Sirohey S.Human and machine recognition of faces:A Survery[C].In:Proceedings of the IEEE,1995;83(5):705-740. 被引量:1
7Wildes,Richard P.Iris recognition :an emerging biometric technology [J].Proceedings of the IEEE, 1997 ;85(9) : 136-142. 被引量:1
8Prokoski F J,Riedel R B,Coffin J S.Identification of individuals by means of facial themography[C].In:Proceedings of the IEEE 1992 ICCST:Crime Countermeasures,IEEE,Atlanta, 1992. 被引量:1
9Furui S.Recent advances in speaker recognition[J].Proceeding of the IEEE, 1997; 18(9). 被引量:1
10Nalwa V S.Automatic on-line signature verification[J].Proceeding of the IEEE,1997;85(2) :215-239. 被引量:1