6Weis S A,Sarma S,Rivest R,et al.Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C] //The 1st International Conference on Security in Pervasive Computing,volume 2802 of Lecture,2004,2802:201-212.
7Lee T S.Image representation using 2-d Gabor wavelets[J].IEEETransaction On Pattern Analysis Pattern Analysis and Machine Intelli-gence,1996,18(10):959-971.
8Kwang I K,Keechul J,Hang J K.Face recognition using kernel princi-pal components analysis[J].IEEE Signal Processing Letters,2002,9(2):40-42.
9Nefian A V,Hayes M H.Face detection and recognition using HiddenMarkov Models[J].International Conference on Image Processing,2002(1):141-145.
10Othman H,Aboulnasr T.A separable low complexity 2D HMM with ap-plication to face recognition[J].IEEE Trans.on Pattern Analysis andMachine Intelligence,2003,25(10):1229-1238.