ГОСТ Р ИСО/МЭК 19795-1—2007
Библиография
[1]Fejfar. A. and Myers, J.W. The testing of three automatic identity verification techniques. Proceedings of the
IntematKjnal Conference on Crime Countermeasures. Oxford. July 1977
[2] Davies. D.W. and Price. W.L. Security for oomputer networks. Wiley. 1984. (Sections 7.10 & 7.11 review several
performance evaluations)
[3] Hotmes. J.P.. Wright. L.J.. and Maxwell. R.L. A performance evaluation of biometric identification devices. Sandia
report SAND91-0276. June 1991
[4] Bouchier. F.. Ahrens. J.S.. and Wells. G. Laboratory evaluation of the iriscan prototype biometric identifier. Sandia
report SAND96-1033. April 1996
[5] Rauss. P.. Phillips. P.J.. Hamilton. M.K. and DePersia, AT. FERET (face recognition technology) recognition
algorithms. Proceedings of Automatic Target Recognizer System and Technology Conference. July 1996
[6]Roethenbaugh. G. ICSA biometric certification. Biometric industry product buyer’s guide. ICSA. 1998, 27-31
[7] BIOIS Comparative study of biometric identification systems: Public final report. Study by Fraunhofer-IGD for BSl
(German Information Security Agency) and BKA (German Federal Police Agency). May 2000
[8]Blackburn. D.. Bone. M. and Phillips. J. Facial recognition vendor test 2000. February 2001
[9] Mansfield. A.J.. Kelly. G.P.. Chandler. D.J. and Kane. J. Biometric product testing final report Report for CESG and
Biometrics Working Group, March 2001
[10] Маю. D.. Mattoni. D.. Cappelli. R.. Wayman. J.L. and Jain. A.K. FVC2000: Fingerprint verification competition. IEEE
Trans. РАМ I, 2002. 24(3). 402-412
[11] Phillips. P.J.. Grother. P„ Michaels. R.J.. Blackburn. D M.. Tabassi. E. and Bone. M. Face recognition vendor test
2002 Evaluation Report. NIST IR 6965. 2003
[12] Mansfield. A.J. and Wayman. J.L. (2002) Best Practices in Testing and Reporting Performance of Biometric Devices.
Version 2.01. NPL Report CMSC 14/02
[13] Doddington. G.R.. Przybocki. MA . Martin. A.F. and Reynolds. DA The NIST speakerrecognition evaluation: Overview
methodology, systems, results, perspective. Speech Communication. 2000. 31(2-3), 225-254
[14] Phillips. P.J., Martin. A . Wilson. C.L. and Przybocki. M. An introduction to evaluating biometric systems. Computer.
(Feb 2000). 56-63
[15] Hennessy. J.L. and Patterson. D.A. Computer Architecture: A Quantitative Approach. 2nd ed., Morgan Kaufman.
San Francisco. 1996
[16] Doddington. G.. Liggett. W.. Martin. A.. Przybocki. M. and Reynolds. D. Sheep, goats, lambs and wolves: A statistical
analysis of speaker performance in the NIST 1998 speaker recognition evaluation. ICSLP. November 1998
[17] Wayman. J.L. Multi-finger penetration rate and ROC variability for automatic fingerprint identification systems.
National Biometric Test Center. May 1999
[18] ISO/IEC19794-4. Information technology — Biometric data interchange formats — Part 4: Finger image data
[19] ISO/IEC19794-5. Information technology — Biometric data interchange formats — Part 5: Face image data
[20] ISO/IEC19794-6. Information technology — Biometric data interchange formats — Part 6: Iris image data
[21] Cox. R. Three new speech coders from the ITU cover a range of applications. IEEE Communications Magazine.
1997. 35(9 — special issue on standardisation and characterisation of G729). 40-47
[22] Wayman. J.L. Technical testing and evaluation of biometric identification devices. Biometrics: Personal identification
in networked society, edited by A.K. Jain, et si., KJuwer. 2000. 345-368
[23] Godfrey. J.. Graff. D. and Martin. A. Public databases for speaker recognition and verification. ESCA Workshop on
Automatic Speaker Recognition. Identification and Verification. 1994
[24] Wayman. J.L. Confidence interval and test size estimation for biometric data. Proceedings of the IEEE AutolD
Conference, 1999
[25] Newman. H.H.. Freeman. F.N. and Hotzmger. J.K. Twins. Chicago University Press. 1937. Results on fingerprint
similanty between identical twins cited in [31. table 10.20.1]
[26] Daugman. J. and Downing. C. Epigenetic randomness, complexity, and singularityof human iris patterns. Proceeding
of the Royal Socrety Biological Sciences. 2001. 268. 1737-1740
[27] Jain. A.K.. Prabhakar. S. and Pankanti. S. On the similarity of identical twin fingerprints. Pattern Recognition. 2002,
35(11). 2653—2663
[28] Louis. T.A. Confidence intervals for a binomial parameter after observing no successes. The American Statistician.
1981. 35(3), 154
129] Hanley. JA. and Lippman-Hand. A. If nothing goes wrong, is everything all right? Interpreting zero numerators.
Journal of the American Medical Association. 1983. 249(13). 1743-1745
[30] Jovanovic. B.D. and Levy. P.S. A look at the rule of three. The American Statistician. 1997. 51(2). 137-139. [31]
Snedecor. G.W. and Cochran. W.G. Statistical methods. Iowa State University Press. 1967 (Sixth edition) [32]
Efron. B. and Tibshirani. R.J. An introduction to the bootstrap. Chapman and Hall. 1997
[33] Diegert. K.V. Estimating performance characteristics of biometric identifiers. Proceedings of Biometrics Consortium
Conference. San Jose. CA. June 1996
49