1DAUGMAN J G, High confidence visual recognition of persons by a test of statstica independence[J]. Tran Pattern Analysis and Machine Intelligence. 1915(11): 1148-116
2MA Li, TAN Tieniu, WANG Yunhong, Efficient iris recognition by characterizing key local variations[J], IEEE Transactions on Image Processing, 2004., 13(6)739-750
3BOLES W W, BOASHASH B. A human identification technique using images of the iris and wavelet transform[J]. IEEE Transon Signal Processing. 1998,46(4): 1185-1188
4WILDS B P, Iris recogntion: an emerging biometric technology[A]. Proceedings of the IEEE[C].Sanjuan Puertorico, 1997
2[1]J.G.Daugman.Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression[J].IEEE Transactions on Acoustics,Speech and Signal Processing,1988,36:169-1179.
3[3]J.G.Daugman.High confidence visual recognition of persons by a test of statistical independence.IEEE Transactions on Pattern Analysis and Machine Intelligence,1993,L5:1148-1161.
4[5]A.Teuner,B.J.Hosticka.Adaptive Gabor transformation for image processing[J].IEEE Transactions on Signal Processing,1993.
5Luo Xiping, Tian Jie. Fingerprint Image Enhancement Based on Curve Simulation. The 2000 International Conference on Imaging Science.Systems, and Technology (CISST2000), Las Vegas, USA, 2000.
6Wu Yan, Tian Jie, Wang Xingming. A fingerprint Image Compression Algorithm Based on Wavelet Analysis and Classification Vector Quantization. Submitted to 4th International Conference on Advances in Pattern Recognition and Digital Techniques, 1999.
7Luo Xiping, Tian Jie. A Minutia Matching Algorithm in Fingerprint Verification. Barcelona, Spain: Proceeding of the 15th International Conference on Pattern Recognition(1CPR 2000),2000,4:833-836.
8Ratha N K, Karu K, Chen S, et al. A Real-time Matching System for Large Fingerprint Databases. IEEE Trans. Pattern Analysis and Machine Intelligence, 1996,18(8): 799-813.
9Lin Hong. Automatic Personal Identification Using Fingerprints,[PH.D]. Thesis of Michigan State University, 1998.
10Frankel Y, MacKenzie P, Yung M. Robust Efficient Distributed RSA Key Generation, STOC, 1998:663-672.