This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
N. S. Nourabadi, K. G. Dizaji, and S. A. Seyyedsalehi. “Face pose normalization for identity recognition using 3D information by means of neural networks,” 5th Conference on Information and Knowledge Technology, 2013, pp. 432 – 437, doi: 10.1109/IKT.2013.6620106.10.1109/IKT.2013.6620106Search in Google Scholar
C. Ching-Kun, L. Chun-Liang, L. Shyan-Lung Lin, C. Yen-Ming, and C. Cheng-Tang. “A Chaotic Theorectical Approach to ECG-Based Identity Recognition,” IEEE Computational Intelligence Magazine, 2014, vol. 9, pp. 53 – 63, doi: 10.1109/MCI.2013.2291691.10.1109/MCI.2013.2291691Search in Google Scholar
L. Jiwen Lu, W. Gang Wang, and P. Moulin. “Human Identity and Gender Recognition From Gait Sequences With Arbitrary Walking Directions,” IEEE Transactions on Information Forensics and Security, 2014, vol. 9, pp. 51 – 61, doi: 10.1109/TIFS.2013.2291969.10.1109/TIFS.2013.2291969Search in Google Scholar
L. Feng Liu, D. Zhang and G. Zhenhua. “Distal-Interphalangeal-Crease-Based User Authentication System,” IEEE Transactions on Information Forensics and Security, 2013, vol. 8, pp. 1446 – 1455, doi: 10.1109/TIFS.2013.2272787.10.1109/TIFS.2013.2272787Search in Google Scholar
M. S. Umar and M. Q. Rafiq. “Select-to-Spawn: A novel recognition-based graphical user authentication scheme,” 2012 IEEE International Conference on Signal Processing, Computing and Control, 2012, pp. 1 – 5, doi: 10.1109/ISPCC.2012.6224382.10.1109/ISPCC.2012.6224382Search in Google Scholar
A. Drosou, D. Tzovaras, K. Moustakas, and M. Petrou. “Systematic Error Analysis for the Enhancement of Biometric Systems Using Soft Biometrics,” IEEE Signal Processing Letters, 2012, vol. 19, pp. 833 – 836, doi: 10.1109/LSP.2012.2221701.10.1109/LSP.2012.2221701Search in Google Scholar
P. Tsai, M. K. Khan, J. Pan, and B, Liao. “Interactive Artificial Bee Colony Supported Passive Continuous Authentication System,” Systems Journal, 2014, pp. 395 – 405, doi: 10.1109/JSYST.2012.22 08153.Search in Google Scholar
N. Erdogmus, N and J. L. Dugelay. “3D Assisted Face Recognition: Dealing With Expression Variations,” IEEE Transactions on Information Forensics and Security, 2014, vol. 9, pp. 826 – 838, doi: 10.1109/TIFS.2014.2309851.10.1109/TIFS.2014.2309851Search in Google Scholar
S. J. Elliott, S. A. Massie, and M. J. Sutton. “The Perception of Biometric Technology: A Survey,” 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007, pp. 259 – 264, doi: 10.1109/AUTOID.2007.380630.10.1109/AUTOID.2007.380630Search in Google Scholar
R. A. Rashid, N. H. Mahalin, M. A. Sarijari, and A. A. Abdul. “Security system using biometric technology: Design and implementation of Voice Recognition System (VRS),” International Conference on Computer and Communication Engineering, 2008, pp. 898 – 902, doi: 10.1109/ICCCE.2008.4580735.10.1109/ICCCE.2008.4580735Search in Google Scholar
L. Simon and M. Silverman. “A practical guide to biometric security technology,” IT Professional, 2001, vol. 3, pp. 27 – 32, doi: 10.1109 /6294.899930.10.1109/6294.899930Search in Google Scholar
D. C. Leonard, A. P. Pons, and S. S. Asfour. “Realization of a Universal Patient Identifier for Electronic Medical Records Through Biometric Technology,” IEEE Transactions on Information Technology in Biomedicine, 2009, vol. 13, pp. 494 – 500, doi: 10.1 109/TITB.2008.926438.10.1109/TITB.2008.92643819273015Search in Google Scholar
M. C. Fairhurst. “Signature verification revisited: promoting practical exploitation of biometric technology,” Electronics & Communication Engineering Journal, 1997, vol. 9, pp. 273 – 280, doi: 10.104 9/ecej:19970606.10.1049/ecej:19970606Search in Google Scholar
M. Zaied, O. Jemai, and C. Ben Amar. “Training of the Beta wavelet networks by the frames theory: Application to face recognition,” Workshops on Image Processing Theory, Tools and Applications, 2008, pp. 1 - 6, doi: 10.1109/IPTA.2008.4743756.10.1109/IPTA.2008.4743756Search in Google Scholar
B. Knight B and A. Johnston. “The role of movement in face recognition,” IEEE Transactions on Pattern Analysisand Machine Intelligence, 1994, vol. 4, pp. 265 – 273.10.1080/713756764Search in Google Scholar
T. F. Cootes, G. J. Edwards, and C. J. Taylor. “Active Appearance Models,” Proceedings of the European Conference on Computer Vision, 1998, vol. 2, pp. 484 – 498.10.1007/BFb0054760Search in Google Scholar
I. T. tJolliffe. “Principal Component Analysis (2nd Hd.)” Springer, 2002.Search in Google Scholar
T. Jing Yi, Y. H. Tay, and L. Phooi Yee Lau. “One-dimensional Grey-level Co-occurrence Matrices for texture classification,” International Symposium on Information Technology, 2008, vol. 3, pp. 1 – 6, doi: 10.1109/ITSIM.2008.4631992.10.1109/ITSIM.2008.4631992Search in Google Scholar
A. Juraiza Ishak, M. M. Mustafa, and A. Hussain. “Gradient Field Distribution and Grey Level Co-occurrence Matrix techniques for automatic weed classification,” International Symposium on Mechatronics and Its Applications, 2008, pp. 1 – 5, doi: 10.1109/ISM A.2008.4648846.Search in Google Scholar
S. A. Banday, A. H. Mir, and F. Khursheed. “Multi-unit iris biometric fusion using gray level co-occurrence matrix features,” International Conference on Advanced Electronic Systems, 2013, pp. 225 – 229, doi: 10.1109/ICAES.2013.6659397.10.1109/ICAES.2013.6659397Search in Google Scholar
G.Sengupta, T.A.Win, C.Messom, S.Demidenko and S.C. Mukhopadhyay, “Defect analysis of grit-blasted or spray printed surface using vision sensing technique”, Proceedings of Image and Vision Computing NZ, Nov. 26-28, 2003, Palmerston North, pp. 18-23.Search in Google Scholar
Yanmin LUO, Peizhong LIU and Minghong LIAO, AN ARTIFICIAL IMMUNE NETWORK CLUSTERING ALGORITHM FOR MANGROVES REMOTE SENSING, IMAGE,International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648Search in Google Scholar
G. Sen Gupta, S.C. Mukhopadhyay, S. Demidenko and C.H. Messom, “Master-slave Control of a Teleoperated Anthropomorphic Robotic Arm with Gripping Force Sensing”, IEEE Transactions on Instrumentation and Measurement, Vol. 55, No. 6, pp. 2136-2145, December 2006.Search in Google Scholar
Daode Zhang et al., RESEARCH ON CHIPS’ DEFECT EXTRACTION BASED ON IMAGE-MATCHING, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp.321 – 336, 2014.10.21307/ijssis-2017-658Search in Google Scholar