[1] Glossary of biometrics terms [R].1998,Association for biometrics(AfB),Intemational Computer Security Association(ICSA).[2] R Chellappa,et al.Humnan and machine recognition of face:a survey[J].Proc.IEEE,1995,83(5):705-740.[3] R Brunelli,T Poggio.Face recognition:features versus templates [J].IEEE Trans.PAMI,1993,15(10):1042-1052.[4] D L Swets,J Weng.Using discriminant eigenfeatures for image retrieval[J].IEEE Trans.PAMI,1996,18(8):831-836.[5] B Moghaddam,et al.Probabilistic visual recognition for object recognition [J].IEEE Trans.PAMI,1997,19(7):696-710.[6] S Y Lee,et al.Recognition of humman front faces using knowledgebased feature extraction and neunofuzzy algorithm [J].Pattern Recognition,1996,29(11):1863-1876.[7] S Lawtonce,et al.Face recognition:a convolutional neural-network approach [J].IEEE Trans.NN,1997,8(1):98-113.[8] 周洁,卢春雨,等.人脸自动识别方法综述[J].电子学报,2000,28(4):102-106.[9] J Zhang,et al.Face recognition:eigenface,elastic matching,and neural nets [J].Proc.IEEE,1997,85(9):1422-1435.[10] L Wiskott,et al.Face recognition by elastic bunch graph matching [J].IEEE Trans.PAMI.1997,19(6):775-779.[11] N Ratha,et al.A real-time matching system for large fingerprint database [J].IEEE Trans.PAMI,1996,18(8):799-813.[12] D Maio,D Maltoni.Direct gray-scale minutiae detection in fingerprint[J].IEEE Trans.PAMI,1997,19(1):27-40.[13] A Jain,et al.An identity authentication system using fingerprints [J].Proc.IEEE,1997,85(9):1365-1388.[14] L Hong,A K Jain.Classification of fingerprint image [A].Procendings of 11th SCIA [C],June,1999.[15] M Kawagoe,A Tojo.Fingerprint pattern classification [J].Pattem Recognition,1984,17(3):295-303.[16] A Jain,et al.On-line fingerprint verification [J].IEEE Trans.PAMI,1997,19(4):302-314.[17] S Prabhaker,A Jain.Decision-level fusion in biometric verification[J].IEEE Trans.PAMI.2000.[18] J G Dangman.High confidence visual recognition of persons by a test of statistical independence [J].IEEE Trans.PAMI,1993,13(11):1148-1161.[19] J G Daugman.Recognizing persons by their iris pattems.Biometrics:Personal Identification in Networked Society [M].Amsterdam:Kluwer Academic Publsher,1999:103-121.[20] R P Wildes,et al.A machine vision system for iris recognition [J].Machine Vision Application,1996,9:1-8.[21] J G Daugman.Demodulation,predictive coding,and spatial vision [J].J.Opt.Soc.Am,1995,12(4):641-660.[22] R P Wildes.Iris recognition:an emerging biometric technology [J].Proceedings of IEEE,1997,85(9):1348-1363.[23] R S Reillo,et al.Biometric identification through hand geometry measurernents [J].IEEE Trans.PAMI,2000,22(10):1168- 1171.[24] A K Jain,et al.A prototype hand geometry-based verification system[A].2nd Int'l Conference on Audio-and Video-based Biometric Person Authentication[C],Washington D.C.March 1999.[25] A K Jain,N Duta.Defomable matching of hand shapes for verification[A].Proceedings of IEEE ICIP,Oct,1999.[26] D Zhang,W Shu.Two novel characteristics in palmprint verification:datum point invariance and line feature matching [J].Pattern Recognition,1999,32(2):691-702.[27] N Duta,et al.Matching of palmprints [J].Pattem Recognition Letters,2001.[28] N Duta,et al.Automatic construction of 2D shape model [J].IEEE Trans.PAMI,2000.[29] P Besl,N Mckay.A method for registration of 3-D shapes [J].IEEE Trans.PAMI,1992,14(2):239-256.[30] V S Nalwa.Automatic on-line signature verification [J].Proceedings of IEEE,1997,85(2):215-239.[31] K Huang,H Yan.On-line signature verification based on dynamic segmentation and global and local matching [J].Optical Engineering,1995,34(12):3480-3487.[32] L L Lee,et al.Reliable on-line human signature based on dynamic segmentation and global and local matching [J].IEEE Trans.PAMI,1996,18(6):643-647.[33] G Gupta.A studv of shape in dynamic handwritten signature verification[R].James Cook University.of North Queensland,1997.[34] L Yang,et al.Applicaion of hidden markov models for signature verification [J].Pattem Recognition,1995,28(2):161-170.[35] J Dolfing,et al.On-line signature verification with hidden markov moodels [A].ICPR [C],1998,2:1309-1312.[36] G Rigoll,A Kosmala.A systematic comparison between on-line and offline methods for signature verification with hidden makov models [A].Proceedings of ICPR [C],1998,2:1755-1757.[37] Q Z Wu,et al.On-line signature verification using lpc cepstrum and neural networks [J].IEEE Trans.On Systems,Man,Cybernetics and Part B:Cybernetics,1997,27(2):148-153.[38] Q z Wu,et al.On-line signature verification based on logarithmic spectrum [J].Pattem Recognition,1998,31(12):1865-1871.[39] R Tucker.Voice activity detection using a periodicity measure [J].IEEProc.1992,139(4):377-380.[40] P Ramachandran,et al.A comparative study of robust linear predictive analysis methods with applications to speaker identification [J].IEEE Trans.Speech,and Audio Processing,1995,3(2):117-125.[41] H Gish,M Schmidt.Text independent speaker identification [J].IEEE Signal Proeessing Magazine,1994,11(4):18-32.[42] H Gish,M Schmidt.Text independent speaker identification [J].IEEE Signal Processing Mgagazine,1994,11(4):18-32.[43] D A Reynolds,et al.Robust text independent speaker identification using gaussian mixture speaker models [J].IEEE Trans.ASSP,1995,3(1):72-83.[44] S B Davis,P Mermelstein.Comparison of parametric representation for monosyllable word recognition in continuously spoken sentences [J].IEEE Trans.ASSP,1980,28:357-366.[45] J P Campbell.Speaker recognition:a tutorial [J].Proceedings IEEE,1997,85(9):1436-1461.[46] D A Reynolds,R C Rose.Robust text independent speaker idenlification using gaussian mixture speaker models [J].IEEE Trans.ASSP,1995,3(1):72-83.[47] L Rabiner.A tutorial on HMM and selected applications in speech recognition [J].Proc.IEEE,1989,77(2):257-286.[48] K Yu,et al.Speaker recognition using hidden narkov models,dynamic time warping,and vector quantisation [A].lEE Proc.Vision,lmage,and Signal Processing,1995,142(5):313-318.[49] K Farrell.Speaker recognition using neural networks and conventional classifiers [J].IEEE Trans.SAP,1994,2(1):part Ⅱ.194-205.[50] A K Jain,et al.Biometrics:Promising frontiers for emerging identification market [J].Communication ACM,2000,2:91-98.[51] J Kittler,et al.On combining classifier [J].IEEE Trans.PAMI.1998,20(3):226-239.[52] L Hong,A Jain.Integrating faces and fingerprints for personal identification [J].IEEE Trans.PAMI,1998,20(12):1295-1306.[53] A Jain,et al.A multimodal biometric system using fingerprints,face and speech [A].2nd lnt'l Conference on Audio-and Video-based Biometric Person Authentication [C],Washington D.C.,March 1999:182- 187. |