1Clarke R. Human identification in information systems: Management challenges and publit policy issues.Information Technology and People, 1994, 7(4 ) : 6-37.
2Davies S G. Touching big brother:How biometric technology will fuse flesh and machine. Information Technology and People, 1994, 7(4):60-69.
3Campbell J,Alyea J L, Dunn J. Biometric security:Government applications and operations, http://www.vitro.bloomington.in. us:8080/~BC/, 1996.
4Miller B. Vital signs of identity. IEEE Spectrum, 1994, 31(2) :22-30.
5Newham E, The biometric report. New York: SJB ,Services. 1995.
6Arnit Y, Gernea D. A computational model for visual Selection. Neural Comp. 1999, 11:1691-1715.
7Daugman j G. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern .Anal and Machine Intell, 1993, 15(11):1148-1161.
8Campbell Jr J. Speaker recognition: A tutorial. Proceedings of IEEE, 1997, 85(9):1437-1462.
9Nalwa V. Automatic online signature verification. Proceedings of IEEE. 1997, 85(2) :213 -239.
10TRS. Technology Recognition systems homepage:http://www.betac.com/trs/.