[1] J. G. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 15, No. 11, pp. 1148-1161, Nov. 1993.
[2] J. G. Daugman, “High Confidence Recognition of Persons by Iris Patterns,” IEEE Conference on Security Technology, pp. 254-263, 2001.
[3] R. P. Wildes, J. C. Asmuth, G. L. Green, S. C. Hsu, R. J. Kolczynski, J. R. Matey, S. E. McBride, “A Machine-Vision System for Iris Recognition,” Machine Vision and Applications, pp. 1-8, Spr. 1996.
[4] G. O. Williams, “Iris Recognition Technology,” IEEE Aerospace and Electronics Systems Magazine, vol. 12, pp. 23-29, Apr. 1997.
[5] R. S. Reillo, C. S. Avila, and A. G. Marcos, “Improving Access Control Security Using Iris Identification,” IEEE Conference on Security Technology, pp. 56-59, 2000.
[6] S. Lim, K. Lee, O. Byeon, and T. Kim, “Efficent Iris Recognition through Improvement of Feature Vector and Classifier,” ETRI Journal, vol. 23, No. 2, pp. 61-70, Jun. 2001.
[7] Y. Zhu, T. Tan, and Y. Wang, “Biometric Personal Identification based on Iris Patterns,” Pattern Recognition, vol. 2, pp. 801-804, 2000.
[8] W. W. Boles, and B. Boashash, “A Human Identification Technique Using Image of the Iris and Wavelet Transform,” IEEE Trans. on Signal Processing, vol. 46, No. 4, pp. 1185-1188, Apr. 1998.
[9] R. S. Germain, A. Califano, and S. Colville, “Fingerprint Matching Using Transformation Parameter Clustering,” IEEE Computational Science and Engineering, vol. 4, pp. 42-49, Oct.-Dec. 1997.
[10]W. Shen, M. Surette, and R. Khanna, “Evaluation of Automated Biometrics-Based Identification and Verification Systems,” Proceedings of the IEEE, vol. 85, pp. 1464-1478, Sep. 1997.
[11]J. P. Campbell, “Speaker Recognition: A Tutorial,” Proceedings of the IEEE, vol. 85, No. 9, pp. 1437-1462, Sep. 1997.
[12]F. Prokoski, “History, Current Status, and Future of Infrared Identification,” IEEE Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications, pp. 5-14, 2000.
[13]N. K. Ratha, K. Karu, S. Chen, and A. K. Jain, “A Real-Time Matching System for Large Fingerprint Databases,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 18, pp. 799-813, Aug. 1996.
[14] B. Miller, “Vital Signs of Identity,” IEEE Spectrum, vol. 31, pp. 22-30, Feb. 1994.
[15]A. K. Jain, and R. Bolle and S. Pankanti, Biometrics Personal Identification in Networked Society, Kluwer Academic Publishers, 1998.
[16]N. Sarkar, and B. B. Chaudhuri, “An Efficient Differental Box-Counting Approach to Compute Fractal Dimension of Image,” IEEE Trans. on Systems, Man, and Cybernetics, vol. 24, No. 1, pp. 115-120, Jan. 1994.
[17] S. Sufei, Jing’ao, and C. Anni, “Fractal based Texture Analysis for Retrieval of Image Data,” Communications, APCC/OECC ''99. Fifth Asia-Pacific Conference on ... and Fourth Optoelectronics and Communications Conference, vol. 2, pp. 845-48, 1999.
[18]C. C. Chen, J. S. Daponte, and M. D. Fox, “Fractal Feature Analysis and Classification in Medical Imaging,” IEEE Trans. on Medical Imaging, vol. 8, pp. 133-142, Jun. 1989.
[19]J. You, S. Hungnahally, and A. Sattar, “Fractional Discrimination for Texture Image Segmentation,” Proceedings, International Conference on Image Processing, vol. 1, pp. 220-223, 1997.
[20]A. Z. Kouzani, F. He, and K. Sammut, “Fractal Face Representation and Recognition,” Proceedings, International Conference on Image Processing, vol. 1, pp. 220-223, 1997.
[21]Y. Y. Tang, B. F. Li, H. Ma, and J. Liu, “Ring-Projection-Wavelet-Fractal Signatures: A Novel Approach to Feature Extraction,” IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 45, pp. 1130-1134, Aug. 1998.
[22]Y. Y. Tang and Y. Tao, “Feature Extraction by Fractal Dimensions,” ICDAR ''99. on Document Analysis and Recognition, pp. 217-220, 1999.
[23]Y. Lin and Y. Li, “Image Feature Extraction and Segmentation Using Fractal Dimension,” ICICS on Information, Communications and Signal Processing, vol. 2, pp. 975-979, 1997.
[24]Y. Tao, E. C M. Lam, and Y. Y. Tang, “Extraction of Fractal Feature for Pattern Recognition,” Pattern Recognition, vol. 2, pp. 527-530, 2000.
[25]P. S Addison, Fractal and Chaos an Illustrated Course, Institute of Physics Publishing Ltd., 1997.
[26]J. Feder, Fractals, Plenum Press, 1989.
[27]R. R. Coifman, and N. Saito, “The Local Karhunen-Loeve Bases,” IEEE-SP International Symposium on Time-Frequency and Time-Scale Analysis, pp. 129-132, 1996.
[28]M. Fleury, A. C. Downton, and A. F. Cleark, “Karhunen-Loeve Transform: An Exercise in Simple Image Processing Parallel Pipelines,” Proc. EuroPar''97 Conference: Lecture Notes in Computer Science, vol. 1300, pp.815-819, Spr. 1997.
[29]C. Ta, C. T. Chiang, and Y. H. Chen, “Efficient KLT based on Overlapped Subframes for Speaker Identification,” IEEE Third Workshop on Signal Processing Advances in Wireless Communications, pp. 376-379, 2000.
[30]A. Levy and M. Lindenbaum, “Sequential Karhunen-Loeve basis Extraction and Its Application to Images,” IEEE Trans. on Image Processing, vol. 9, pp. 1371-1374, Aug. 2000.
[31]S. Theodoridis and K. Koutroumbas, Pattern Recognition, Academic Press Ltd., 1998.
[32]吳成柯、戴善榮、程湘君和雲立實譯,“數位影像處理”,儒林圖書,1996。
[33]繆紹網編著,“數位影像處理活用-Matlab”,全華圖書,1999。
[34]袁上元著,“建構於碎形維之自動人眼虹膜辨識系統”,逢甲大學電機工程研究所碩士論文,2000。[35]陳志堅和黃俊豪著,“大量語者不特定語句環境下語者辨識系統之特徵設計”,國立中山大學電機工程學系研究所碩士論文,中華民國89年。
[36]張兆旭譯,“Fractal導論”,松崗。