[1] R. de Luis-García, C. Alberola-López, O. Aghzout, and J. Ruiz-Alzola, Signal Processing 83, 2539 (2003).
[2] A. K. Jain, A. Ross, and S. Prabhakar, IEEE Trans. Circ. Syst. Video Technol. 14, 4 (2004).
[3] L. Ma, T. Tan, Y. Wang, and D. Zhang, Pattern Recogn. 37, 1287 (2004).
[4] R. Luo and T. Lin, Chin. Opt. Lett. 5, 160 (2007).
[5] C.-L. Lin and K.-C. Fan, IEEE Trans. Circ. Syst. Video Technol. 14, 199 (2004).
[6] L. Wang, G. Leedham, and D. S.-Y. Cho, Pattern Recogn. 41, 920 (2008).
[7] M. Shahin, A. Badawi, and M. Kamel, Int. J. Biomed. Sci. 2, 141 (2007).
[8] J. M. Cross and C. L. Smith, in Proceedings of 29th International Carnahan Conference on Security Technology 20 (1995).
[9] X. Lin, B. Zhuang, X. Su, Y. Zhou, and G. Bao, J. Tsinghua University (Sci. and Tech.) (in Chinese) 43, 164 (2003).
[10] T. Tanaka and N. Kubo, in Proceedings of SICE Annual Conference in Sapporo 249 (2004).
[11] D. Shen and H. H. S. Ip, Pattern Recogn. 32, 151 (1999).
[12] I. Daubechies, IEEE Trans. Information Theory 36, 961 (1990).
[13] Q. Xu, Y. Zhong, and Z. You, Acta Opt. Sin. (in Chinese) 20, 1617 (2000).
[14] S. Prabhakar, S. Pankanti, and A. K. Jain, IEEE Security Privacy 1, 33 (2003).
[15] C. Cortes and V. Vapnik, Machine Learning 20, 273 (1995).
[16] S. Li, Y. Zhang, L. Dong, S. Chang, and J. Shen, Acta Photon. Sin. (in Chinese) 35, 304 (2006).
[17] J. Sun, Q. Li, W. Lu, and Q. Wang, Chinese J. Lasers (in Chinese) 33, 1467 (2006).