1. Acharya L, Kasprzyk T (2010) Biometrics and Government.
https://lop.parl.ca/Content/LOP/ResearchPublications/06-30-e.pdf
. Accessed 6 June 2018 (unavailable 6 Aug 2019)
2. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline.
http://ieeexplore.ieee.org/document/6117503/
. Accessed 7 Aug 2019
3. BI2 Technologies Biometric Intelligence & Identification Technologies.
http://www.bi2technologies.com/
. Accessed 7 Aug 2019
4. Biggio et al (2012) Security evaluation of biometric authentication under realistic spoofing attacks. p 5.
https://pralab.diee.unica.it/it/node/667
. Accessed 7 Aug 2019
5. Biometric Residents Permit.
https://www.gov.uk/biometric-residence-permits
. Accessed 18 Sept 2019