References
- B. Schiener, “Applied Cryptography”, John Wiley & Sons, 1996.
- A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans on Information Forensics and Security, vol. 1, no. 2, pp. 125–143, 2006.
- J L. Wayman, A K. Jain, D. Maltoni, and D. Maio (Eds.), “Biometric Systems: Technology, Design and Performance Evaluation”. New York: Springer Verlag, 2005.
- A. Ross, K. Nandkumar, and A. K. Jain. “Handbook of Multibiometrics”, Springer Verlag, 2006.
- J. Daugman, “Probing the uniqueness and randomness of Iris Codes: Results from 200 billion iris pair comparisons,” Proc. IEEE, vol. 94, no. 11, pp. 1927–1935, 2006.
- R. Duda, P. Hart, and D. Stork, “Pattern Classification”, Wiley student edition, 1997.
- R G. Gallager, “Information Theory and Reliable Communication”, John Wiley & Sons, 1968.
- T. Cover, and J. Thomas, “Elements of Information Theory”, John Wiley & Sons, 1991.
- S. Verdù, and S. McLaughlin, “Information Theory: 50 years of Discovery”. Wiley Series, 1999.
- J. Wozencraft, and B. Reiffen, “Sequential Decoding”, Cambridge, MA, MIT Press and Wiley, 1974.
- J. Bhatnagar, and A. Kumar, “On Estimating Some Performance Indices for Biometric Identification,” Pattern Recognition, vol. 42, no. 5, pp. 1805–1818, 2009.
- J. Bhatnagar, B. Lall, and R K. Patney, “On Formulating a Probability of Random Correspondence for Biometrics Using Error Exponent,” accepted Proc. of IEEE (Computer Society) conference NaBIC 2009. Bhatnagar JR, et al.: Performance Issues in Biometric Authentication IETE TECHNICAL REVIEW | VOL 27 | ISSUE 4 | JUL-AUG 2010 285
- R G. Gallager, “A Simple Derivation of the Coding Theorem and Some Applications,” IEEE Trans on Info. Theory, vol. 11, No. 1, 1965, pp. 3–18.
- S C. Dass, Y. Zhu, and A. K. Jain, “Validating a Biometric Authentication: Sample size requirements,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, pp. 1902–1919, 2006.
- J. Bhatnagar, and A. Kumar, “On Some Performance Measures for Biometric Identification,” Proc. of IEEE ICB, 2007, pp. 1035–1048.
- J. Bhatnagar, A. Kumar, and N. Saggar, “A Novel Approach to Improve Biometric Recognition Using Rank Level Fusion,” Proc. of IEEE CVPR, 2007, pp. 43–51.
- N A. Schmid, and J A. O’Sullivan, “Performance Prediction Methodology for Biometric System Using Large Deviations Approach,” IEEE Trans Signal Processing: Supplement on Secure Media, vol. 52, no. 10, pp. 3036–3045, 2004.
- S. Pankanti, S. Prabhakar, and A. K Jain, “On the Individualityof Fingerprints,” IEEE Trans Pattern Analysis and Machine Intelligence, vol. 24, no. 8, pp. 1010–1025, 2002.
- Y. Zhu, S.C. Dass, and A.K Jain, “Statistical Models for Assessing Individuality of Fingerprints,” IEEE Trans. on Information Forensics and Security, vol. 2, no. 3, pp. 391–401, 2007.
- A. Adler, R. Youmaran, and S. Loyka, “http://www.sce.carleton.ca/ faculty/adler//publications”.
- T.Weismann, “Universally Attainable Error Exponents for Rate Distortion Coding of Noisy Sources,” IEEE Trans on Info. Theory, vol. 50, No. 6, 2004, pp. 1229–1246.
- J. Bhatnagar, and A. Kumar, “Estimating Minimum Sample Size Requirements for Reliable Identification,” Proc. of IEEE CVPR, 2006, pp. 18- 25.
- S. Cole, “Is Fingerprint Identification Valid Rhetorics of Reliability in Fingerprint Proponents Discourse” Law & Policy, vol. 28(1), pp. 109–135, 2006.
- W. Feller, “An Introduction to Probability Theory and Its Applications”, Vol. 2, New York: Wiley, 1966