[1] PHILLIPS P J, MARTIN A, WILSON C L, et al. An introduction evaluating biometric systems[J]. Computer, 2000, 33(2): 56-63. [2] YAMPOLSKIY R V, GOVINDARAJU V. Behavioural biometrics: a survey and classification[J]. International Journal of Biometrics, 2008, 1(1): 81-113. [3] 郝玉洁, 冯银付, 赖攀.基于指纹识别的VPN身份认证研究[J]. 计算机应用, 2009, 29(2):350-352.(HAO Y J, FENG Y F, LAI P. VPN identity certification technology based on fingerprint identification[J]. Journal of Computer Applications, 2009, 29(2): 350-352.) [4] 张燕昆, 杜平, 刘重庆.基于主元分析与支持向量机的人脸识别方法[J]. 上海交通大学学报, 2002, 36(6):884-886.(ZHANG Y K, DU P, LIU C Q. A face recognition method based on principal component analysis and support vector machine[J]. Journal of Shanghai Jiao Tong University, 2002, 36(6): 884-886.) [5] CHO D, PARK K R, RHEE D W, et al. Pupil and iris localization for iris recognition in mobile phones[C]//Proceedings of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Piscataway, NJ: IEEE, 2006: 197-201. [6] 郭武.复杂信道下的说话人识别[D]. 合肥:中国科学技术大学, 2007.(GUO W. Session variability text-independent speak-recognition[D]. Hefei: University of Science and Technology of China, 2007.) [7] 高海燕.人体步态识别研究[D]. 北京:北京交通大学, 2010.(GAO H Y. Research on human gait recognition[D]. Beijing: Beijing Jiaotong University, 2010.) [8] FENG H, WAH C C. Online signature verification using a new extreme points warping technique[J]. Pattern Recognition Letters, 2003, 24(16): 2943-2951. [9] KOSTORZ I, DOROZ R. On-line signature recognition based on reduced set of points[M]//BURDUK R, KURZYNSKI M, WOZNIAK M. Computer Recognition Systems 4. Berlin: Springer, 2011: 3-11. [10] BERGROTH L, HAKONEN H, RAITA T. A survey of longest common subsequence algorithms[C]//SPIRE 2000: Proceedings of the Seventh International Symposium on String Processing Information Retrieval. Washington, DC: IEEE Computer Society, 2000: 39-48. [11] HUANG X. On global sequence alignment[J]. Computer Applications in the Biosciences: Bioinformatics, 1994, 10(3): 227-235. [12] 李正欣, 张凤鸣, 李克武.基于DTW的多元时间序列模式匹配方法[J]. 模式识别与人工智能, 2011, 24(3):425-430.(LI Z X, ZHANG F M, LI K W. DTW based pattern matching method for multivariate time series[J]. Pattern Recognition and Artificial Intelligence, 2011, 24(3): 425-430.) [13] 高焕之, 郭云楠, 刘晴, 等.基于加速度传感器的WLALCS身份认证及实现[J]. 湖南大学学报(自然科学版), 2014, 41(8):111-116.(GAO H Z, GUO Y N, LIU Q, et al. Accelerometer based authentication method in WLALCS[J]. Journal of Hunan University (Natural Sciences), 2014, 41(8): 111-116.) [14] 周治平, 苗敏敏.结合DTW与改进STLCS的动态手势认证研究[J]. 电子测量与仪器学报, 2015, 29(7):1064-1073.(ZHOU Z P, MIAO M M. Research of dynamic gesture authentication based on DTW and improved STLCS[J]. Journal of Electronic Measurement and Instrumentation, 2015, 29(7): 1064-1073.) [15] CASANOVA J G, AVILA C S, DE SANTOS SIERRA A, et al. A real-time in-air signature biometric technique using a mobile device embedding an accelerometer[M]//Networked Digital Technologies. Berlin: Springer, 2010: 497-503. [16] OKUMURA F, KUBOTA A, HATORI Y, et al. A study on biometric authentication based on arm sweep action with acceleration sensor[M]//ISPACS 2006: Proceedings of the International Symposium on Intelligent Signal Processing and Communications. Piscataway, NJ: IEEE, 2006: 219-222. [17] 李端, 钱富才, 李立, 等.动态规划问题研究[J]. 系统工程理论与实践, 2007, 27(8):56-64.(LI D, QIAN F C, LI L, et al. Research on dynamic programming[J]. Systems Engineering-Theory & Practice, 2007, 27(8): 56-64.) |