1. Abate, A.F., M. Nappi, D. Riccio, and G. Sabatino. 2007. 2D and 3D face recognition: A survey. Pattern Recognition Letters 28(14): 1885–1906.
2. Abdullayeva, F., Imamverdiyev, V. Musayev, and J. Wayman. 2008. Analysis of security vulnerabilities in biometrics systems. Proceedings of the Second International Conference on “Problems of Cybernetics and Informatics”, September 10–12, Baku, Azerbaijan.
http://danishbiometrics.files.wordpress.com/2009/08/1-13.pdf
. Accessed 30 Jan 2010.
3. Adler, A. 2004. Images can be reconstructed from quantized biometric match score data. Proceedings of the Canadian Conference on Electrical and Computer Engineering, Niagara Falls, 469–472.
4. Antonelli, A., R. Cappelli, D. Maio, et al. 2006. Fake finger detection by skin distortion analysis. IEEE Transactions on Information Forensics and Security 1: 360–373.
5. Australian Government. Introducing SmartGate.
http://www.customs.gov.au/webdata/resources/files/BR_introSmrtGt0409.pdf
. Accessed 30 Jan 2010.