1. Modi, S.K.: Biometrics in Identity Management: Concepts to Applications. Artech House, ISBN:978-1-60807-017-6 (2011)
2. Adler, A.; Schuckers, S.: Biometric vulnerabilities, overview. In: Encyclopedia of Biometrics. Springer, US, pp. 271–279. doi: 10.1007/978-1-4899-7488-4_65 . ISBN 978-1-4899-7488-4
3. Woodward, J.D.; Webb, K.W.; Newton, E.M.: Biometrics: a technical primer, army biometrics applications: identifying and addressing sociocultural concerns. Appendix A. A RAND/MR-1237-A. Santa Monica, CA: RAND (2001)
4. Jana R., Mandal S., Chhaya K.: Offline signature verification for authentication. Int. J. Comput. Appl. 126(6), 20–23 (2015)
5. Abernethy, M.: User authentication incorporating feature level data fusion of multiple biometric characteristics. Doctoral Dissertation, Murdoch University. (2011). http://core.ac.uk/download/pdf/11241073.pdf