ГОСТ Р 54412— 2011/ISO/IEC/TR 24741:2007
[31]National Institute of Standardsand Technology(2003). Fingerprint Vendor TechnologyEvaluation (FpVTE). Available
on-line at
http://fpvte.nist.gov/.
(Date of access: 15 Nov 2006)
[32] National Institute of Standards and Technology (2000—2006). Face Recognition Vendor Test (FVT). Available
on-line at
http://face.nist.gov/frvb’
. (Date of access: 15 Nov 2006)
[33] National Institute of Standards and Technology (2004—2006). Fingerprint Software Development Kit Testing.
Available on-line at
http://finger-print.nist.gov/sdk/.
(Date of access: 15 Nov 2006)
[34] National Institute of Standards and Technology (2004—2006). Performance and Interoperability of the INCITS 378
Fingerprint Template. Available online at
http://fingerprint.nist.gov/minex04/
. (Date of access: 15 Nov 2006)
[35] National Institute of Standards and Technology (2005—2006). Iris Challenge Evaluation. Available on-line at
http://ris.nist.gov/.
(Date of access: 15 Nov 2006)
[36]Osborn. S. (1929). Questioned Documents. Chicago: Nelson-Hall
[37] Phillips. P.J., Martin. A.. Wilson. C.L. and Przybocki, M. (2000). An introduction to evaluating biometric systems.
Computer. 33. 56—63. Available online at http;//
www.frvt.org/DLs/FERET7.pdf
. (Date of access: 15 Nov 2006)
[38]Potter. R.K., Kopp. G.A.. and Green. H.C. (1947). Visible Speech. New York: van Nostran Co.
[39] Pruzansky. S. (1963). Pattern-matching procedure for automatic talker recognition. Journal of the Acoustical Society
of America. 26. 403—406
[40]Raphael. D.E. and Young. J.R. (1974). Automated Personal Identification. Palo Alto: SRI. International
[41] Rodriguez. J.R.. Bouchier. F.. and Ruehie. M. (1993). Performance Evaluation of Biometric Identification Devices.
Sandia National Laboratory Report SAND 93—1930. Albuquerque
[42] Roethenbaugh. G. (Ed) (1998). Biometrics Explained. ICSA Commercial Biometric Developers Consortium. NOTE
Parts of this tutorial are based, with permission, on text in this publication
[43]Seildarz. J. (1998). Letter to the Editor. Philadelphia Inquirer April 6
[44] Simon, C. and Goldstein. I. (1935). A New Scientific Method of Identification. New York State Journal of Medicine.
35. 901—906
[45] Thalheim. L„ Krissler. J. and Ziegler. P. (2002). Biometric Access Protection Devices and their Programs Put to the
Test. C’T Magazine 11. Available on-line at
http://www.heise.de/ct/english/02/11/114
. (Dale of access 15 Nov 2006)
Trauring. M. (1963a). On the automatic comparison of finger ridge patterns. Nature. 197, 938—940
[46]Trauring. M. (1963). Automatic comparison of finger ridge patterns. Hughes Research Laboratory Report. 190.
Malibu
[47]Twain. M. (1893). Pudd’nhead Wilson. The Century, serialized 47(2) — 48(2). New York: The Century Company
[48]van der Putte. T. and Keuning. J. (2000). Biometrical Fingerpnnt Recognition: Don’t Get Your Fingers Burned.
IFIP TC8/WG.8., Fourth Working Group Conference on Smart Card Research and Advanced Applications.
289—303. See
http://www.keuning.com/biometry/Biometrical_Fingerprint_Recogni-tion.pdf
(Date of access:
15 Nov 2006)
[49]Warren. S. and Brandeis. L. (1890). The Right of Privacy. Harvard Law Review. 4. (193) Available on-line at http://
www.lawrence.edu/fast/boardmaw/Priv3cy_brand_warr2.html
. (Date of access: 15 Nov 2006)
[50]Watson. C.l. and Wilson. C.L (2005). Effect of Image Size and Compression on One-to-One Fingerprint Matching.
NISTIR 7201, Feb. 2005. available on-line at
ftp://sequoyah.nist.gov/pub/nistjntemal_reports/ir_7201.pdf.
(Date
of access: 15 Nov 2006)
[51]Wayman. J.L. (2000). Evaluation of the INSPASS Hand Geometry Data. In J.L. Wayman (Ed.). U.S. National
Biometric Test Center Collected Works: 1997—2000. San Jose: San Jose State University
[52]Wegstein. J. (1970). Automated Fingerprint Identification. National Bureau of Standards. Technical Note. 538
[53]Westin. A. (1967). Privacy and Freedom. Boston: Atheneum
49