ГОСТ Р 54412— 2011/1SO/IEC/TR 24741:2007
Библиография
[1]Alderman. Е. and Kennedy, С. (1995). The Right to Privacy. New York: Vintage
[2]Baker. L.R.. (2000). Persons and Bodies: A Constitution View Cambridge: Cambridge University Press
[3]Beavan, C. (2001). Fingerprints New York: Hyperion
[4] Biometric Systems Lab University of Bologna. Pattern Recognition and Image Processing Laboratory. Michigan
State University. Biometric Test Center SanJose StateUniversity (2000 — 2006). Fingerprint Verification Competition
(FVC). Available at
http://bias.csr.unibo.it/fvc2004/default.asp.
(Date of access: 15 Nov 2006)
[5] Blackburn. D.. Bone. M.. Grother. P. and f^hiffips. P.J. (2001). Facial Recognition Vendor Test 2000: Evaluation
Report. Available at
http://www.frvt.org
.(Date of access: 15 Nov 2006)
[6] Bledsoe. W.W. (1966). Man-machine Facial Recognition: Report on a Large-scale Experiment. Panoramic
Research, Inc. Palo Alto. CA.
[7] Bouchier. F„ Ahrens. J. and Wells. G. (1996). Laboratory Evaluation of the IriScan Prototype Biometric Identifier.
Available on-line at
http://infoserve.library.sandia.gOv/sand_doc/1996/961033.pdf.
(Date of access: 15 Nov 2006)
[8]BSI Germany (2003) BioP I
[9]BSI Germany (2005) BioP II
[10]Chang. S.H.. PiW, G.E., and Essignmann. M.W (1951). Representations of Speech Sounds and Some of Their
Statistical Properties. Proc. Institute of Radio Engineers. 147
[11]CoJe. S. (2001). Suspect Identities. Cambridge: Harvard University Press
[12] Daugman. J. (1993). High confidence visual recognition of persons by a test of statistical independence. Trans, on
Pattern Analysis and Machine Intelligence 15. 1148—1161 Available on-line at
http://wvAv.cl.cam.ac.uk/users/
jgd10-00/PAMI93.pdf. (Date of access: 15 Nov 2006)
[13] Faulds, H. (1880). On the Skin Furrows of the Hand. Nature. 22. 605 Available on-line at http:/Avww.scafo.org/
library/100101.html (Date of access: 15 Nov 2006) Fejfar. A. and Myers. J.W. (1977). The testing of three automatic
identity verification techniques. Proc. International Conference On Crime Countermeasures. Oxford
[14] Fejfar. A. (1978). Combining Techniques to Improve Security in Automated Entry Control. Carnahan Conference
On Crime Countermeasures
[15]Flom. L. and Safir. A. (1987). Iris recognition system. U.S. Patent 4. 641. 349
[16] Galton. F. (1888). On Personal Identification and Description. Nature 21/28. 201—202 Available on-line at
http://www.scafo.org,l1ibrary/100801.html.
(Date of access: 15 Nov 2006)
[17] Goldstein. A.J.. Harmon. L.D. and Lesk. A.B. (1971). Identification of Human Faces. Proc. Institute of Electrical and
Electronic Engineers. 59, 748—760
[18]Herschel. W.J. (1880). Skin Furrows of the Hand. Nature. 23. 76
[19] IBM (1970). The Considerations of Data Security in a Computer Environment. Report G 520—2169. White
Plains. NY.
[20] International Biometric Group (2005). Independent Testing of Iris Recognition Technology. Available on-line at
http://www.biometricgroup.com/reports/publ-ic/reports/ITIRT_report-htm.
(Date of access: 15 Nov 2006)
[21] Kent. S.T. and Milett, L.I. (2003). Who Goes There? Authentication Through the Lens of Privacy. Washington. D C.:
National Academies Press Available on-line at
http://books.nap.edu/htrnt/whoqo&s,1
. (Date of access: 15 Nov
2006)
[22] Locke. J. (1690). An Essay Concerning Human Understanding. Book 2. Chapter 27. Available on-tine at http://
www.ilt.columbia.edu/publications/locke_underst3nding.html
. (Date of access: 15 Nov 2006)
[23] Lummis, R.C., and Rosenberg. A. (1972). Test of an ASV method with intensively trained professionalmimics.
Journal of the Acoustical. Society of America 51. 131
[24]Mansfield. A.J. and Wayman. J.L. (2002). Best Practices for Testing and Reporting Biometric Device Performance.
Issue 2.0. U.K. Biometrics Working Group. Available on-line at http:/Avww.cesg.gov.uk/site/ast/biometncs/media/
BestPractice.pdf. (Date of access: 15 Nov 2006)
[25] Mansfield. A.J.. Kelly. G., Chandler. D. and Kane. J. (2000). Biometric product testing final report. Available on-line
at
http://wvAV.cesg.gov.uk/site/ast/biometrics/media/BiometricTestReportpt
1.pdf. (Date of access: 15 Nov 2006)
[26] Matsumoto. T, Matsumoto, H.. Yamada. K., and Hoshino, S. (2002). Impact of Artificial ’Gummy-Fingers on
Fingerprint Systems. Proceedings SPIE. 4677
[27] Messner. W.K.. Cleciwa. C.A.. Kibbler, G.O.T.H. and Parlee. W.L. (1974). Research and Development of Personal
Identity Verification Systems. Proceedings 1974 Carnahan and International Crime Countermeasures Conference.
University of Kentucky
[28] National Bureau of Standards (1977). Guidelines for EvaluationofTechniquesfor Automated Personal Identification.
Federal Information Processing Standard Publication
[29] National Institute of Standards and Technology (1996—2006). Speaker Recognition Evaluation. Available on-line
at
http://www.nist.gov/speech/tests/spk/index.htm.
(Date of access: 15 Nov 2006)
[30] National Institute of Standards and Technology (1993—1997). Facial Recognition Technology (FERET) Database
Evaluation. Available on-line at
http://www.itl.nist.gov/iad/humanid/feret/perf/eval.html
. (Date of access: 15 Nov
2006)
48