C. Vielhauer, Biometric User Authentication for IT Security: From Fundamentals to Handwriting, 2006.

C. Vielhauer, R. Steinmetz, and A. Mayerhoefer, Biometric hash based on statistical features of online signatures, Object recognition supported by user interaction for service robots, pp.123-126, 2002.
DOI : 10.1109/ICPR.2002.1044628

J. Galbally, R. Cappelli, A. Lumini, D. Maltoni, and J. Fierrez, Fake fingertip generation from a minutiae template, 2008 19th International Conference on Pattern Recognition, 2008.
DOI : 10.1109/ICPR.2008.4761456

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.2153

J. H. Holland, Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence, 1975.

M. Bishop, What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003.
DOI : 10.1109/MSECP.2003.1176998

R. Cappelli, A. Erol, D. Maio, and D. Maltoni, Synthetic fingerprint-image generation, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000, pp.475-478, 2000.
DOI : 10.1109/ICPR.2000.903586

A. Alawi and H. S. Acharya, A Fuzzy Commitment Scheme, Proc. IEEE International Conference on Advances in Computer Vision and Information Technology, 2007.

J. Galbally, J. Fierrez, M. Martinez-diaz, and J. Ortega-garcia, Synthetic generation of handwritten signatures based on spectral analysis, Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, 2009.
DOI : 10.1117/12.817928