[1] American
National Standard Institute ANSI. Fingerprint
Identification
Data Format for Information Interchange.
New
York,1986.
[2] J.N.
Bradley and C..M. Brislaw. “The
Wavelet/Scalar
Quantization
Standard for Digital
Fingerrprint Image
Compression”. In Proc. Of the ISCAS, volume 3
pagina 205-208, 1994.
[3] G.T.
Candela. PCASYS – “A Pattern-Level Classification
Automation
System for Fingerprints”. Technical Report
NISTI5647,
August 1995.
[4] L.
Coetzee and E. C. Botha. “Fingerprint Recognition In Low
Quality Images”. Pattern Recognition,
26
(10):1441-1460, 1993.
[5] C.E.
Chapel. Fingerprinting –
“A
Manual of Identification.” Coward McCann, New York, 1941.
[6] Francis
Galton. “Finger Prints.” Macmillan, London, 1892.
[7] A.
Grasselli. “On the Automatic Classification of Fingerprints-
Pictures.” In Methodologies of Pattern Recognition,
Academic.
S. Watanabe Ed., New York, 1969.
[8] R.C.
Gonzales and R.E. Woods. “Digital Image Processing.
Reading.” Addison
Wesley, 1992.
[9] L.
Hong and A.K. Jain. “On-Line Fingerprint Verification”.
In
Proc. of the ICPR, pagine
596-600, 1996.
[10] A.K.
Hrechack and J.T. McHugh. “Automated Fingerprint
Recognition,
23(8):893-904, 1990.
[11] T.
Kanade, “Computer Recognition
of Human Faces”,
Basel and Stuttgart, Birkauser, 1997
[12] D.Reifeld, Y. Yeshurun, “Robust Detection of Facial Features
by
Generalized Symmetry”, Proceedings of 11th
[13] T.
Sakai, M. Nagao, S. Fujibayashi, “Line
Extraction and
Pattern
Recognition in a photograph”, Pattern Recognition,
1, 1969
[14] S.
Yamamoto, H. Yokohuchi, e T. Suzuki,
"Image Processing and Automatic Diagnosis of
Color Fundus Photographs",
Proceedings 2nd International Joint
Conference on Pattern Recognition,
Copenhagen, pp. 268-269, Agosto 13-15, 1974.
[15] H.
Yokouchi, S. Yamamoto, T. Suzuki, M. Matsui, e K.Kato,
and Biological Engineering, Vol. 12, N. 3, pp. 123-130, Giugno 1974.
[16] F.H. Adler, "Physiology
of the Eye", St. Louis, MO; Mosby, 1965
[17] A.L. Kroeber, "Anthropology",
New York, Harcourt Brace Jovanovich, 1948
[18] M.S. Obaidat e B.
Sadoun, "Verification of Computer users
using Keystroke Dynamics,"
IEEE Trans. on System,
Man and Cybernetics, Vol. 27, N. 2, pp. 261-269, Aprile 1997.
[19] M.S. Obaidat, "A
Methodology for Improving Computer Access Security,"
Computer & Security,Vol. 12, pp. 657-662, 1993.
[20] M.S. Obaidat e D.T.
Macchairolo, "An On-line Neural Network System
for Computer Access Security," IEEE Trans. Industrial Electronics,
Vol. 40, N. 2, pp. 235-241, Aprile 1993.
[21] S. Bleha e M.S.
Obaidat, "Dimensionality Reduction and Feature Extraction
and Cybernetics, Vol. 21, N. 2, Marzo/Aprile 1991.
[22] D. Umphress e G.
Williams, "Identity Verification Through keyboard
Characteristics," International Journal Man-Machine Studies, Vol. 23, pp.263-273,
Academic Press, 1985.
[23] W.L. Bryan e N. Halter,
"Studies in the Physiology and Psychology
of the Telegraphic Language," The Psychology of Skill: Three Studies,
(E.H. Gardener and J.K. Gardener, editors), pp. 35-44, NY Time Co., NY 1973.
[24] S. Card, T. Moran, e
A. Newell, "The Keystroke Level Model
for User Performance Time with Interactive Systems,"
Communications of ACM,Vol. 23, pp. 396-410, 1980.
[25] R. Mammone, X. Zhang,
e R. Ramachandran, "Robust Speaker
Recognition-A Feature-based Approach", IEEE Signal Processing Magazine,
Vol. 13, N. 5,
pp. 58-71, 1996.
[26] D. Reynolds and R.
Rose, "Robust Text-Independent Speaker
on Speech and Audio Processing, Vol. 3, N° 1, pp
72-83, 1995
[27] "A Performance Evaluation of Biometric
Identification Devices, Technical Report",
SAND91-0276, Sandia
National Laboratories, Albuquerque, NM and Livermore,
CA
for the United States Department of Energy under Contract DE-AC04-76DP00789,
1991