[1]S. Prabhakar, S. Pankanti and A. K. Jain, “Biometric recognition: security and privacy concerns,” IEEE Trans. on Security & Privacy, vol. 1, no. 2, pp. 33-42, 2003.
[2]“Harmonized Biometric Vocabulary,” ISO/IEC JTC1 SC37, standing document 2, version 8, 2007.
[3]S. Nanavati, M. Thieme, and R. Nanavati, Biometrics: Identity Verification in a Networked World, John Wiley & Sons, 2002.
[4]http://www.ibgweb.com/, Homepage of International Biometric Group.
[5]http://www.iridiantech.com/solutions.php, Homepage of Iridian Technologies.
[6]M. Negin, T. A. Chmielewski Jr., M. Salganicoff, U. M. von Seelen, P. L. Venetainer and G. G. Zhang, “An iris biometric system for public and personal use,” IEEE Trans. on Computer, vol. 33, no. 2, pp. 70-75, 2000.
[7]L. Flom and A. Safir, “Iris recognition system,” U.S. Patent, no. 4641349, 1987.
[8]J. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 15, No. 11, pp. 1148-1161, 1993.
[9]J. Daugman, “Biometric personal identification system based on iris analysis,” United States Patent, No. 5291560, 1994.
[10]J. Daugman, “How iris recognition works,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, 2004.
[11]W. Boles and B. Boashash, “A human identification technique using images of the iris and wavelet transform,” IEEE Trans. on Signal Processing, vol. 46, no. 4, pp. 1185-1188, 1998.
[12]C. Sanchez-Avila, R. Sanchez-Reillo and D. de Martin-Roche, “Iris-based biometric recognition using dyadic wavelet transform,” IEEE Aerospace Electron. System Magazine, vol. 17, no. 10, pp. 3-6, Oct. 2002.
[13]R. P. Wildes, “Automated, non-invasive iris recognition system and method,” United States Patent, no. 5572596, 1994.
[14]R. P. Wildes, “Iris recognition: an emerging biometric technology,” Proc. of the IEEE, vol. 85, no. 9, pp. 1348-1363, 1997.
[15]S. Lim et al., “Efficient iris recognition through improvement of feature vector and classifier,” ETRI Journal, vol. 23, no. 2, pp. 61-70, 2001.
[16]L. Ma, T. Tan, Y. Wang and D. Zhang, “A human identification technique using images of the iris and wavelet transform,” IEEE Trans. on Image Processing, vol. 13, no. 6, pp. 1185-1188, 2004.
[17]L. Ma, T. Tan, Y. Wang and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 12, pp. 1519-1533, 2003.
[18]D. M. Monro and D. Zhang, “An effective human iris code with low complexity,” Proc. of the IEEE Int. Conf. on Image Processing, vol. 3, pp. 277-280, 2005.
[19]D.M. Monro, S. Rakshit and D. Zhang, “DCT-based iris recognition,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 586-595, 2007.
[20]林永淋,建構於圓規維與KL轉換之自動人眼虹膜辨識系統,國立暨南國際大學,碩士論文,民國91年。[21]池坤徽,以凌波轉換為基礎的虹膜辨識系統,國立暨南國際大學,碩士論文,民國93年。[22]蔡博仁,多重特徵萃取與支持向量器為基礎的虹膜辨識技術,國立暨南國際大學,碩士論文,民國94年。[23]張順訓,虹膜辨識系統之影像擷取機構設計與虹膜影像品質估計之研究,國立暨南國際大學,碩士論文,民國94年。[24]曹駿,利用序列虹膜影像進行辨識與抗偽造之研究,國立暨南國際大學,碩士論文,民國95年。[25]Hugo Proenca and L. A. Alexandre. UBIRIS: A noisy iris image database, http://iris.di.ubi.pt/.
[26]R. C. Gonzalez and R. E. Woods, Digital Image Processing, 2nd Edition, Prentice-Hall, New Jersey, 2002.
[27]J. R. Parker, Algorithms for Image Processing and Computer Vision, John Wiley & Sons, 1996.
[28]繆紹綱,數位影像處理-運用MATLAB,東華書局,台北市,民國94年。
[29]A. A. Rad, K. Faez and N. Qaragozlou, “Fast circle detection using gradient pair Vectors,” Proc. VIIth Digital Image Computing: Techniques and Applications, 2003.
[30]J. S. Jang, “Data clustering and pattern recognition,” (in Chinese) available at the links for on-line courses at the author's homepage at http://www.cs.nthu.edu.tw/~jang.
[31]R. A. Fisher, “The use of multiple measures in taxonomic problems,” Ann. Eugenics, vol. 7, pp. 179-188, 1936.
[32]J. Yang and J. Y. Yang, “From image vector to matrix: A straightforward image projection technique—IMPCA vs. PCA,” Pattern Recognition, vol. 35, no. 9, pp. 1997-1999, 2002.
[33]J. Yang, D. Zhang, A. F. Frangi and J. Y. Yang. “Two-dimensional PCA: a new approach to appearance-based face representation and recognition,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 26, no. 1, pp. 131-137, 2004.
[34]J. Yang and C. Liu, “Horizontal and vertical 2DPCA-based discriminant analysis for face verification on a large-scale database,” IEEE Trans. on Information Forensics and Security, vol. 2, no. 4, pp. 781-792, 2007.
[35]M. Li and B. Yuan, “2D-LDA: A novel statistical linear discriminant analysis for image matrix,” Proc. of the IEEE Int. Conf. on Signal Processing, vol. 2, no. 31, pp. 1419-1422, 2002.
[36]J. Yang, A. F. Frangi and D. Zhang, “Uncorrelated projection discriminant analysis and its application to face image feature extraction,” Int. J. of Pattern Recognition and Artificial Intelligence, vol. 17, no. 8, pp. 1325-1347, 2003.
[37] J. Yang and D. Zhang, “Two-dimensional discriminant transform for face recognition,” Pattern Recognition, vol. 38, no.7, pp. 1125-1129, 2005.
[38]J. Yang and C. Liu, “On image matrix based feature extraction algorithms,” IEEE Trans. on Systems, Man and Cybernetics-PART B: Cybernetics, vol. 36, no. 1, pp. 194-197, 2006.