[1]赵向欣. 中华指纹学[M]. 北京: 群众出版社, 1997[2]Specifications overview[EBOL].[20151215]. https:fidoalliance.orgspecificationsoverview[3]Jain A K, Chen Y. Pores and ridges: Highresolution fingerprint matching using level 3 features[J]. IEEE Trans on Pattern Analysis and Machine Intelligence, 2007, 29(1): 1527[4]Ashbaugh D R. QuantitativeQualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology[M]. Boca Raton: CRC Press, 1999[5]Jain A K, Chen Y. High resolution fingerprint matching using level 3 features[EBOL].[20151215]. http:biometrics.nist.gov cs_links latent workshop06procP19_Jain_Chen_NISTLevel3.pdf[6]Pankanti S, Prabhakar S, Jain A. On the individuality of fingerprints[J]. IEEE Trans on PAMI, 2002, 24(8): 10101025[7]Open category: Average results over all databases[EBOL].[20151215]. http:bias.csr.unibo.itfvc2006resultsOpen_resultsAvg.asp[8]Prabhakar S. Fingerprint classification and matching using a filterbank[D]. Michigan: Michigan State University, 2001[9]He Y, Kohno R, IMAI H. A fast automatic fingerprint identification method based on a weightedmean of binary image[J]. IEICE Trans Foundmentals, 1993, E76A(9): 14691481[10]Grycewicz T J. Techniques to improve binary joint transform correlator performance for fingerprint recognition[J]. Optical Engineering, 1999, 38(1): 114119[11]Lal A, Zang S Y, Millerd J. Laserdiodebased joint transform correlator for fingerprint identification[J]. Optical Engineering, 1999, 38(1): 6975[12]Soifer V, Kotlyar V, Khonina S, et al. Opticaldigital methods of fingerprint identification[J]. Optics and Lasers in Engineering, 1998, 29(45): 351359[13]Stoianov A, Soutar C, Graham A. Highspeed fingerprint verification using an optical correlator[J]. Optical Engineering, 1999, 38(1): 99107[14]Lee C J, Wang S D. Fingerprint feature extraction using Gabor filters[J]. Electronics Letters, 1999, 35(4): 288290[15]Moayer B, Fu K S. A tree system approach for fingerprint pattern recognition[J]. IEEE Trans on PAMI, 1986, PAMI8(3): 376387[16]Rao K, Balck K. Type classification of fingerprints: A syntactic approach[J]. IEEE Trans on PAMI, 1980, PAMI2(3): 223231[17]Chong M S, Gay K L, Tan H N, et al. Automatic representation of fingerprints for data compression by Bspline functions[J]. Pattern Recognition, 1992, 25(10): 11991210[18]Chong M S, NGEE T H, Jun L, et al. Geometric framework for fingerprint image classification[J]. Pattern Recognition, 1997, 30(9): 14751488[19]Roddy A R, Stosz J D. Fingerprint features—Statistical analysis and system performance estimates[J]. Proceedings of the IEEE, 1997, 85(9): 13901421[20]Cappelli R, Lumini A, Maio D, et al. Fingerprint classification by directional image partitioning[J]. IEEE Trans on PAMI, 1999, 21(5): 402421[21]Karu K, Jain A K. Fingerprint classification[J]. Pattern Recognition, 1996, 29(3): 389404[22]Srinivasan V S, Murthy N N. Detection of singular points in fignerprint images[J]. Pattern Recognition, 1992, 25(2): 139153[23]Kawagoe M, Tojo A. Fingerprint pattern classification[J]. Pattern Recognition, 1984, 17(3): 295303[24]Fitz A P, Green R J. Fingerprint classification using a hexagonal fast fourier transform[J]. Pattern Recognition, 1996, 29(10): 15871597[25]Maio D, Maltoni D. Direct grayscale minutiae detection in fingerprints[J]. IEEE Trans on PAMI, 1997, 19(1): 2740[26]Farina A, KovacsVajna Z M, Leone. Fingerprint minutiae extraction from skeletonized binary images[J]. Pattern Recognition, 1999, 32(5): 877889[27]Gorman L O. Fingerprint verification[G] Biometrics Personal Identification in Networked Society. Boston: Kluwer Academic Publishers, 1999: 4364[28]Hong L, Wan Y F, Jain A. Fingerprint image enhencement: Agorithm and performance evaluation[J]. IEEE Trans on PAMI, 1998, 20(8): 777789[29]Hrechak A D, Mchugh J A. Automated fingerprint recognition using structural matching[J]. Pattern Recognition, 1990, 23(8): 893904[30]Hung D C D. Enhencement and feature purification of fingerprint images[J]. Pattern Recognition, 1993, 26(11): 16611671[31]Jain A K, Hong L, Bolle R. Online fingerprint verification[J]. IEEE Trans on PAMI, 1997, 19(4): 302314[32]Jain A. K., Hong L, Pankanti S, et al. An identityauthentication system using fingerprints[J]. Proceedings of IEEE: Special Issue on Automated Biometrics, 1997, 85(9): 13651388[33]NikodémuszSzékely é, Székely V. Image recognition problems of fingerprint identification[J]. Microprocessors and Microsystems, 1993, 17(4): 215218[34]Wahab A, Chin S H, Tan E C. Novel approach to automated fingerprint recognition[J]. IEE ProcVis Image Signal Process, 1998, 145(3): 160166[35]Xiao Q H, Raafat H. Fingerprint image postprocessing: A combined statistical and structural approach[J]. Pattern Recognition, 1991, 24(10): 985992[36]Yamato K, Asada T, Hata Y. Interpolation technique of fingerprint features for personal verification[J]. IEICE Trans Information & System, 1994, E77D(11): 13061309[37]王曙光. 指纹识别的若干问题研究,博士后出站报告[R]. 北京: 中国科学院自动化研究所, 2003[38]Raul S R. The madrid report, a comparative analysis of size and quality in fingerprint sensors[R]. Madrid: Universidad Carlos III de Madrid, 2015[39]Indovina M, Dovrngchenko V, et al. NISTIR 7577: ELFT phase II—An evaluation of automated latent fingerprint identification technologies[R]. Gaithersburg: NIST, 2009[40]Watson C, Wilson C, et al. NISTIR 7249: Two finger matching with vendor SDK matchers[R]. Gaithersburg: NIST, 2005[41]Memon S A. Novel active sweat pores based liveness detection techniques for fingerprint biometrics[D]. London: Brunel University, 2012[42]Good things come in small packages[EBOL].[20151215]. http:www.vkansee.com[43]iOS Security iOS 9.0 or later[EBOL].[20151215]. http:www.apple.combusinessdocsiOS_Security_Guide.pdf |