Biometric User Authentication for IT Security: From Fundamentals to Handwriting, 2006. ,
Biometric hash based on statistical features of online signatures, Object recognition supported by user interaction for service robots, pp.123-126, 2002. ,
DOI : 10.1109/ICPR.2002.1044628
Fake fingertip generation from a minutiae template, 2008 19th International Conference on Pattern Recognition, 2008. ,
DOI : 10.1109/ICPR.2008.4761456
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.2153
Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence, 1975. ,
What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003. ,
DOI : 10.1109/MSECP.2003.1176998
Synthetic fingerprint-image generation, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000, pp.475-478, 2000. ,
DOI : 10.1109/ICPR.2000.903586
A Fuzzy Commitment Scheme, Proc. IEEE International Conference on Advances in Computer Vision and Information Technology, 2007. ,
Synthetic generation of handwritten signatures based on spectral analysis, Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, 2009. ,
DOI : 10.1117/12.817928