1. International Organization for Standardization (ISO), International Electrotechnical Commission (IEC): ISO/IEC CD 19792: Information technology – Security techniques – Security evaluation of biometrics (2006)
2. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial ’Gummy’ Fingers on Fingerprint Systems. In: Optical Security and Counterfeit Deterrence Techniques IV, Proc. SPIE, vol. 4677, pp. 275–289 (2002)
3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
4. Miura, N., Nagasaka, A., Miyatake, M.: Feature Extraction of Finger Vein Patterns Based on Iterative Line Tracking and its Application to Personal Identification. IEICE Trans. Inf. & Syst (Japanese edn.) J-86-D-II, 678–687 (2003)
5. Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: SHEEP, GOATS, LAMBS and WOLVES: A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation. In: Proc. ICSLP, vol. 98, pp. 1351–1354 (1998)