[3] JAIN A K,LIN H,SHARATH P,et al..An identity authentication system using fingerprints[J].IEEE,1997,85(9):1363-1388
[4] SKEA D,BARRODALE I,KUWAHARA R,et al..Control point matching algorithm[J].Pattern Recognition,1993,26(2):269-276
[5] MEHTRE B M.Fingerprint image analysis for automatic identification[J].Machine Vision and Applications,1993,6(2):124-139
[6] ISENOR D K.ZAKY S G.Fingerprint identification using graph matching[J].Pattern Recognition,1986,19(2):113-120
[7] WILSON C L,WATSON C I,PAEK E G.Effect of resolution and image quality on combined optical neural network fingerprint matching[J].Pattern Recognition,2000,33(2):317-331
[8] LEE S W,NAM B H.Fingerprint recognition using wavelet transform and probabilistic neural network[C].Proceedings of the International Joint Conference on Neural Networks,1999,5:3276-3279
[9] WILSON C L,WATSON C I,PAEK E G.Combined optical and neural network fingerprint matching[J].SPIE,1997,3073:373-382
[10] YANG J,ZHANG D,ALEJANDRO F F,el al..Two-dimensional PCA:a new approach to appearance-based face representation and recognition[J].IEEE Trans.Patten Analysis and Machine Intelligence,2004:26(1):131-137
[11] JAKUBEK S,STRASSER T.Fault-giagnosis using neural networks with ellipsoidal basis functions[C].Proceedings of the American Control Conference Anchorage,2002(5):3846-3851