[1] ROSS A A, NANDAKUMAR K, JAIN A K. Handbook of Multibiometrics[M]. Springer, US, 2006.
[2] JAIN A K, ROSS A, PANKANTI S. Biometrics: A Tool for Information Security[M]. IEEE Press, 2006.
[3] OGORMAN L. Comparing passwords, tokens, and biometrics for user authentication[J]. Proceedings of the IEEE, 2003,91(12):2021-2040.
[4] LAWTON G. Biometrics: A new era in security[J]. Computer, 2002,31(8):16-18.
[5] ROSS A, JAIN A. Information fusion in biometrics[J]. Pattern Recognition Letters, 2003,24(13):2115-2125.
[6] SCHUCKERS S A C. Spoofing and anti-spoofing measures[J]. Information Security Technical Report, 2002,7(4):56-62.
[7] JAIN A K, PANKANTI S, PRABHAKAR S, et al. Biometrics: A grand challenge[J]. International Conference on Pattern Recognition, 2004,2(4):935-942.
[8] GRAGNANIELLO D, POGGI G, SANSONE C, et al. Local contrast phase descriptor for fingerprint liveness detection[J]. Pattern Recognition, 2015,48(4):1050-1058.
[9] FAUNDEZ-ZANUY M. Biometric security technology[J]. IEEE Aerospace & Electronic Systems Magazine, 2006,21(6):15-26.
[10]CHIRILLO J, BLAUL S. Implementing Biometric Security[M]. Indianapolis Wiley, 2003.
[11]KWAN P W, WELCH M C, FOLEY J J. A knowledge-based decision support system for adaptive fingerprint identification that uses relevance feedback[J]. Knowledge-Based Systems, 2015,73:236-253.
[12]ALI M M H, MAHALE V H, YANNAWAR P, et al. Fingerprint recognition for person identification and verification based on minutiae matching[C]// 2016 IEEE 6th International Conference on Advanced Computing. 2016:332-339.
[13]DING C, TAO D. Robust face recognition via multimodal deep face representation[J]. IEEE Transactions on Multimedia, 2015,17(11):2049-2058.
[14]HU G, YANG Y, YI D, et al. When face recognition meets with deep learning: An evaluation of convolutional neural networks for face recognition[C]// Proceedings of IEEE International Conference on Computer Vision Workshops. 2015:142-150.
[15]MADANE M, THEPADE S. Score level fusion based bimodal biometric identification using Thepade’s sorted n-ary block truncation coding with variod proportions of iris and palmprint traits[J]. Procedia Computer Science, 2016,79:466-473.
[16]DAUGMAN J. New methods in iris recognition[J]. IEEE Transactions on Systems Man Cybernetics-System, 2007,37(5):1167-1175.
[17]THALHEIM L, KRISSLER J, ZIEGLER P M. Body Check[J/OL]. Translated by SMITH R W.(2002-02-11). http://www.heise.de/ct/english/02/11/114.
[18]ALTER F, DURAND S, FROMENT J. Adapted total variation for artifact free decompression of JPEG images[J]. Journal of Mathematical Imaging & Vision, 2005,23(2):199-211.
[19]TAKASHI M, KEIICHI T, TAKAO K. Imposture using synthetic speech against speaker verification based on spectrum and pitch[C]// Proceedings of International Conference on Semiconductor Laser and Photonics. 2000:302-305.
[20]LEON P L D, APSINGEKAR V R, PUCHER M, et al. Revisiting the security of speaker verification systems against imposture using synthetic speech[C]// IEEE International Conference on Acoustics Speech and Signal Processing. 2010:1798-1801.
[21]MEYER H. Six biometric devices point the finger at security[J]. Computers and Security, 1998,17(5):410-411.
[22]JIN Q, TOTH A R, BLACK A W, et al. Is voice transformation a threat to speaker identification?[C]// IEEE International Conference on Acoustics, Speech and Signal Processing. 2008:4845-4848.
[23]CHINGOVSKA I, ANJOS A, MARCEL S. On the effectiveness of local binary patterns in face anti-spoofing[C]// IEEE International Conference of the Biometrics Special Interest Group(BIOSIG). 2012:1-7. |