1CLARKE R.Human identification in information systems:management challenges and public policy issues[J].Information Technology & People,1994,7(4):6-37.
2DAVIES S G.Touching big brother:how biometric technology will fuse flesh and machine[J].Information Technology & People,1994,7(4):60-69.
4JAIN A K,BOLLE R,PANKANTI S.Biometrics:personal identification in networked society[M].Norwell,USA:Kluwer Academic Publishers,1999.
5PHILLIPS P J,GROTHER P,MICHEALS R J,et al.FRVT 2002:Evaluation Report[EB/OL].(2003-03-15)[2008-08-16].http://www.frvt.org/FRVT2002/documents.htm.
6SU Guangda,ZHANG Cuiping,DING Rong,et al.MMP-PCA face recognition method[J].Electronics Letters,2002,38(25):1654-1656.
7DU Cheng,SU Guangda.Eyeglasses removal from facial images[J].Pattern Recognition Letters,2005,26(14):2215-2220.
8PHILLIPS P J,SCRUGGS W T,O'TOOLE A J,et al.FRVT 2006 and ICE 2006 Large-Scale Results[EB/OL].(2007-03-10)[2008-08-16].http://www.frvt.org/FRVT2006/docs/FRVT2006andICE2006LargeScaleReport.pdf.
9Cootes T, Taylor C, Cooper D, et al. Active shape models- their training and application[J]. Computer vision and im- age understanding, 1995,61(1) :38 - 59.
10Tan X, Triggs B. Enhanced local texture feature sets for face recognition under difficult lighting conditions[J]. IEEE trans image processing, 2010,19 (6) : 1635 - 1650.