1. Bartlett, M. S., Movellan, J. R., & Sejnowski, T. J. (2002). Face recognition by independent component analysis. IEEE Transactions on Neural Networks, 13(6), 1450–1464.
2. Buciu, I., & Pitas, I. (2008). Understanding complex systems. In Organic computing (pp. 303–320). Berlin: Springer. ISBN 978-3-540-77656-7.
3. Burton, A. M., Jenkins, R., Hancock, P. J. B., & White, D. (2005). Robust representations for face recognition: the power of averages. Cognitive Psychology, 51(3), 256–284.
4. Chang, Y.-J., Zhang, W., & Chen, T. (2004). Biometrics-based cryptographic key generation. In IEEE international conference on multimedia and expo, 2004. ICME 2004 (Vol. 3, pp. 2203–2206).
5. Chen, C., Veldhuis, R. N. J., Kevenaar, T. A. M., & Akkermans, A. H. M. (2007). Multi-bits biometric string generation based on the likelihood ratio. In First IEEE international conference on biometrics: theory, applications, and systems, BTAS.