1. Bolle RM, Connel JH, Ratha NK (2002) Biometric perils and patches. Pattern Recognit 35:2727–2738
2. Daugman J (2000) Biometric decision landscapes. Technical report no. TR482, Cambridge University Computer Laboratory, Cambridge, UK, p 482
3. Daugman J (2004) How iris recognition works. IEEE Trans Circuits Syst Video Technol 14(1):21–30
4. Bolle RM, Pakanti S, Ratha NK (2000) Evaluating techniques for biometrics based authentication systems (FRR). In: Proceedings of the 15th IAPR international conference on pattern recognition, Barcelona, Spain, September 2000, vol 2, pp 835–841
5. Luciano R (2002) Denial of access in biometrics-based authentication systems. In: Proceedings of the international conference on infrastructure security (InfraSec 2002), Bristol, UK, October 2002, pp 19–29