B Schneier.Theusesandabusesofbiometrics[J].CommACM.1999,42(8):136.
[2]
R G van Schyndel, A Z Tirkel, C F Osborne.A digital watermark[A].Proc of IEEE Int Conf Image Processing[C].USA:IEEE, 1994, Ⅱ:86-90.
[3]
M Yeung, S Pankanti.Verification watermarks on fingerprint recognition and retrieval[A].Proc.of SPIE Conference on Security and Watermarking of Multimedia Contents[C].San Jose:SPIE, 1999.
[4]
K Jain, U Uludag.Hiding fingerprint minutiae in images[A].Proc.Automatic Identification Advanced Technologies[C].New York:AutoID,2002.
[5]
B Schneier.Applied Crytography:Protocols, Algorithms, and Source Code in C[M].USA:John Wiley & Sons,Inc.1996.
[6]
A K Jain, L Hong, S Pankanti, R Bolle.An identity-authentication system using fingerprints[A].Proc.IEEE[C].USA:IEEE, 1997.
[7]
C-Y Lin, S-F Chang.A robust image authentication algorithm surviving JPEG lossy compression, storage and retrieval of image/video databases[A].SPIE[C].USA:SPIE, 1998, 3312:296-307.