|
[1] John Daugman, “How Iris Recognition Works”, IEEE Transactions on and system for video technology, vol. 14, NO.1 , January 2001, pp. 1-10. [2] Gerald O. Williams, “Iris Recognition Technology”, Iridian Technologies, Inc. [3] John Daugman, “Biometrics Decision Landscapes”, University of Cambridge, The computer laboratory, 2001, pp. 6-10. [4] John Daugman, “The importance of being random: statistical principles of iris recognition”, The Computer Laboratory, University of Cambridge, Cambridge CB3 0FD, UK, Received 21 December 2001, pp. 5-12. [5] National Instrument Vision Builder & IMAQ Concept Manual 2004, pp. 73-196. [6] Michael Negin, Thomas A.,”An Iris Biometric System for Public and Personal Use”, IEEE Computer Science, 2000, pp. 4-12. [7] Yong Zhu, Tieniu Tan and Yunhong Wang, “Biometrics Personal Identification Based on Iris Patterns”, National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences 1999, pp. 1-4. [8] John Daugman, “High Confidence Recognition of persons by Their Iris Patterns”, University of Cambridge, The Computer Laboratory, Cambridge CB2 3QG, U.K. 2001, pp. 9-17. [9] Christel-loïc TISSE, Lionel MARTIN, Lionel TORRES , Michel ROBERT, “Personal identification technique use human iris recognition”, Advanced System Technology STMicroelectronics – ZI Rousset – 13106 Rousset Cedex, France, 1999, pp. 2-5. [10] RICHARD P. WILDES, ”Iris Recognition: An Emerging Biometric Technology” proceeding of the IEEE, vol. 85, NO. 9, September 1997, pp. 4-6. [11] JOAQUIM DEMIRA JR., JOCELIMAYER, “Image Feature Extraction for Application of Biometric Identification of Iris-A Morphological Approach”, Proceedings of the XVI Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI’03), IEEE 2003, pp. 5-12. [12] Jain Jang, Kwiju Kim and Yillbyung Lee,”Efficient Algorithm of Eye Image Check Robust Iris Recognition System”, Division of Computer and Information Engineering, and of BERC, Yonsei University 2001, pp. 10-21. [13] Penny Khaw, “Iris Recognition Technology for Improved Authentication”, SANS Institute 2002, pp. 3-12. [14] John Daugman, “Iris recognition”, American Scientist, Volume 89, July 2001, pp. 1-7. [15] Aaron Lefohn, Brian Budge, and Peter Shirley,”An Ocularist’s Approach to Human Iris Synthesis”, IEEE Computer Society, 2003, pp. 2-10. [16] W. W. Boles ,”A Security System Based on Human Iris Identification Using Wavelet Transform”, IEEE, 1997, pp. 3-9. [16] http://en.wikipedia.org/wiki/Statistical_independence [18] http://home.t-online.de/home/manfred.bromba/biofaqe.htm [19] http://www.webvision.med.utah.edu/anatomy.html [20] Richard Caruso and Erik Reinhard, “An Ocularist’s Approach to Human Iris Synthesis”, Aaron Lefohn, Brian Budge, and Peter Shirley University of Utah, IEEE Computer Society, November/December 2003, pp. 1-7. [21] Shinyoung Lim , Kwanyong Lee, Okhwan Byeon, and Taiyun Kim, “Efficient Iris Recognition through Improvement of Feature Vector and Classifier”, ETRI Journal, Volume 23, Number 2, June 2001, pp. 1-8.
|