1. Jain AK, Ross A (2008) “Introduction to biometrics”, in handbook of biometrics. Springer, New York, pp 1–22
2. Rathgeb C, Uhl A (2010) Attacking iris recognition: an efficient hill-climbing technique. In: Proceeding IEEE/IAPR 20th international conference pattern recognition (ICPR), Aug 2010, pp 1217–1220
3. Yaduwanshi S, Khemariya A (2022) Literature review on Iris segmentation and classification based on deep learning. In: International research journal of modernization in engineering technology and science, vol 04(08):1729–1736 Aug-2022. https://doi.org/10.56726/IRJMETS29453permitted
4. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: Proceeding international conference biometrics special interest group (BIOSIG), pp 1–7
5. Erdogmus N, Marcel S (2013) Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect. In: Proceeding IEEE 6th international conference biometrics, theory, application system (BTAS), Sep/Oct 2013, pp 1–6