1. Handbook of Fingerprint Recognition;Maltoni,2003
2. An identity-authentication system using fingerprints;Jain;Proc. IEEE,1997
3. Improving biometrics authentication performance from the user quality;Kumar;IEEE Trans. Instrum. Meas.,2010
4. C. Soutar, G.J. Tomko, Secure private key generation using a fingerprin, in: Proceedings of CardTech/SecurTech Conference, vol. 1, 1996, pp. 245–252.
5. C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V.K.V. Kumar, Biometric encryption using image processing, in: Proceedings of Optical Security and Counterfeit Deterrence Techniques II, San Jose, CA, vol. 3341, 1998, pp. 178–188.