БИБЛИОТЕКА НОРМАТИВНЫХ ДОКУМЕНТОВ

ГОСТ Р 54412-2019 (ISO/IEC TR 24741:2018). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Общие положения и примеры применения

Библиография

 

[1]

IBM. 1970. The Considerations of Data Security in a Computer Environment, Technical Report G520-2169, White Plains, NY

[2]

Bertillon A. 1889. Alphonse Bertillon's Instructions For Taking Descriptions For The Identification Of Criminals And Others, By Means Of Anthropometric Indications, translated by Gallus Muller. Whitefish: Kessinger Publishing

[3]

Faulds H. 1880. On the Skin Furrows of the Hand, Nature, 22, 605

[4]

Herschel W.J. 1880. Skin Furrows of the Hand, Nature, 23, 76

[5]

Fejfar A. 1978. Combining techniques to improve security in automated entry control, Carnahan Conference on Crime Countermeasures

[6]

Twain M. 1893. Pudd'nhead Wilson, The Century, serialized 47(2) - 48(2), New York: The Century Company

[7]

Osborn S. 1929. Questioned Documents. Chicago: Nelson-Hall

[8]

Simon C., & Goldstein I. 1935. A new scientific method of identification. New York State Journal of Medicine, 35, 901 - 906

[9]

Potter R.K., Kopp G.A., Green H.C. 1947. Visible Speech, New York: van Nostran Co

[10]

Chang S.H., Pihl G.E., Essignmann M.W 1951. Representations of Speech Sounds and Some of Their Statistical Properties, Proc. Institute of Radio Engineers, 147

[11]

Pruzansky S. 1963. Pattern-matching procedure for automatic talker recognition, Journal of the Acoustical Society of America, 26, 403 - 406

[12]

Trauring M. 1963a. On the automatic comparison of finger ridge patterns, Nature, 197, 938 - 940

[13]

Trauring M. 1963b. Automatic comparison of finger ridge patterns, Hughes Research Laboratory Report, 190, Malibu

[14]

Bledsoe W.W. 1966. Man-machine facial Recognition: Report on a large-scale experiment, Technical Report PRI22, Panoramic Research Inc, Palo Alto, CA

[15]

Goldstein A.J., Harmon L.D., Lesk A.B. 1971. Identification of human faces, Proc. Institute of Electrical and Electronic Engineers, 59, 748 - 760

[16]

Wegstein J. 1970. Automated Fingerprint Identification, Technical Note 538, National Bureau of Standards

[17]

Messner W.K., Cleciwa C.A., Kibbler G.O.T.H., Parlee W.L. 1974. Research and Development of Personal Identity Verification Systems, Proceedings 1974 Carnahan and International Crime Countermeasures Conference, University of Kentucky

[18]

Fejfar A. 1978. Combining techniques to improve security in automated entry control, Carnahan Conference on Crime Countermeasures

[19]

Meissner P. 1977. Guidelines on evaluation of techniques for automated personal identification, National Bureau of Standards, FIPS PUB 48

[20]

https://mvd.ru/upload/site1/folder_page/001/930/393/ADIS.pdf

[21]

Flom L., & Safir A. 1987. Iris recognition system, U.S. Patent 4,641,349

[22]

Daugman J. 1993. High confidence visual recognition of persons by a test of statistical independence, IEEE Trans. on Pattern Analysis and Machine Intelligence 15, 1148 - 1161

[23]

ISO/IEC 19794-3:2006, Information technology - Biometric data interchange formats - Part 3: Finger pattern spectral data

[24]

ISO/IEC 24722:2007, Information technology - Biometrics - Multimodal and other multibiometric fusion

[25]

ISO/IEC 19795-1:2006, Information technology - Biometric performance testing and reporting - Part 1: Principles and framework

[26]

Phillips P.J., Martin A., Wilson C.L., Przybocki M. 2000. An introduction to evaluating biometric systems, Computer, 33, 56 - 63

[27]

National Institute of Standards And Technology Multimodal Information Group (1996 - 2012). Speaker Recognition Evaluation

[28]

National Institute Of Standards And Technology (1993 - 1997). Facial Recognition Technology (FERET) Database Evaluation

[29]

Blackburn D., Bone M., Grother P., Phillips P.J. 2001. Facial Recognition Vendor Test 2000: Evaluation Report

[30]

Phillips P., Grother P., Micheals R., Blackburn D., Tabassi E., Bone J. 2003. Face recognition vendor test 2002: Evaluation report, National Institute of Standards and Technology, Tech. Report, NISTIR 6965

[31]

Phillips P.J., Scruggs W.T., O'toole A.J., Flynn P.J., Bowyer K.W., Schott C.L., Sharpe M. 2007. FRVT 2006 and ICE 2006 Large-scale results. National Institute of Standards and Technology, Tech. Report NISTIR 7408

[32]

Grother P., Quinn G.W., Phillips P.J 2010. Evaluation of 2-D still-image face recognition algorithms. National Institute of Standards and Technology, Tech. Report, NISTIR 7709

[33]

Grother P., & Ngan M 2014. Face recognition vendor test (FRVT): Performance of face identification algorithms. National Institute of Standards and Technology, Tech. Report, NISTIR 8009

[34]

Maio D., Maltoni D., Cappelli R., Wayman J.L., Jain A.K. 2002. FVC2000: Fingerprint verification competition. IEEE Trans. on Pattern Analysis and Machine Intelligence. 24, pp. 402 - 412

[35]

Maio D., Maltoni D., Cappelli R., Wayman J.L., Jain A.K. 2002. FVC2002: Second fingerprint verification competition. Proceedings of the 16th International Conference on Pattern Recognition (ICPR'02) volume 3, pp. 811 - 814

[36]

Cappelli R., Maio D., Maltoni D., Wayman J.L., Jain A.K. 2006. Performance evaluation of fingerprint verification systems. IEEE Trans. on Pattern Analysis and Machine Intelligence. 28, pp. 3 - 18

[37]

Cappelli R., Ferrara M., Franco A., Maltoni D. 2007. Fingerprint verification competition 2006, Biometric Technology Today, vol. 15, no. 7 - 8, pp. 7 - 9

[38]

Wilson C.L., Grother P.J., Michaels R.J., Otto S.C., Watson C.I., Hicklin R.A., Korves H., Ulery B., Zoepfl M. 2004. Fingerprint vendor technology evaluation 2003: Summary of results and analysis report. National Institute of Standards and Technology, Tech. Report NISTIR 7123

[39]

Watson C., Fiumara G., Tabassi E., Cheng S.L., Flanagan P., Salamon W. 2014. Fingerprint vendor technology evaluation 2012: Evaluation of fingerprint matching algorithms, National Institute of Standards and Technology, Tech Report, NISTIR 8034

[40]

Watson C.I., & Wilson C.L 2005. Effect of Image Size and Compression on One-to-One Fingerprint Matching. National Institute of Standards and Technology, Tech Report, NISTIR 7201

[41]

Grother P.J., Mccabe R., Watson C.I., Indovina M.D., Salamon W.J., Flanagan P.A., Tabassi E., Newton E.M., Wilson C.L 2006. MINEX Performance and Interoperability of the INCITS 378 Fingerprint Template. National Institute of Standards and Technology, Tech. Report, NISTIR 7296

[42]

International Biometric Group. 2005. Independent testing of iris recognition technology (ITIRT)

[43]

Phillips P.J., Scruggs W.T., O'toole A.J., Flynn P.J., Bowyer K.W., Schott C.L., Sharpe M. 2007. FRVT 2006 and ICE 2006 Large-scale results. National Institute of Standards and Technology, Tech. Report NISTIR 7408

[44]

Rodriguez J.R., Bouchier F., Ruehie M. 1993. Performance Evaluation of Biometric Identification Devices, Report SAND93-1930, Sandia National Laboratory Albuquerque

[45]

Bouchier F., Ahrens J., Wells G. 1996. Laboratory evaluation of the Iriscan prototype biometric identifier. Technical report SAND96-1033, Sandia National Laboratories

[46]

Mansfield A.J., Kelly G., Chandler D., Kane J. 2000. Biometric product testing final report

[47]

Wayman J.L. 2000. Evaluation of the INSPASS Hand Geometry Data. In Wayman J.L. (Ed.), U.S. National Biometric Test Center Collected Works: 1997 - 2000, San Jose: San Jose State University

[48]

ISO/IEC 29794-1:2016, Information technology - Biometric sample quality - Parti: Framework

[49]

ISO/IEC/TR 29198:2013, Information technology - Biometrics - Characterization and measurement of difficulty for fingerprint databases for technology evaluation

[50]

ISO/IEC 19794-1:2011, Information technology - Biometric data interchange formats - Part 1: Framework

[51]

ISO/IEC 19785-3:2007, Information technology - Common Biometric Exchange Formats Framework - Part 3: Patron format specifications

[52]

Michaels R.J., Mangold K., Aronoff M., Kwong K., Marshall K. 2012. Specification for WS-Biometric Devices (WS-BD), Version 1, National Institute of Standards and Technology, Tech. Report, NISTSP 500-288

[53]

ISO/IEC 30108-1:2016, Information technology - Biometric Identity Assurance Services - Part 1: BIAS services

[54]

ISO/IEC 19784-1:2006, Information technology - Biometric application programming interface - Part 1: BioAPI specification

[55]

ISO/IEC 24708:2008, Information technology - Biometrics - BioAPI Interworking Protocol

[56]

Kent S.T, & Millett L.I. 2003. Who goes there? Authentication through the lens of privacy, Washington, D.C.: National Academies Press

[57]

ISO/IEC 24745:2011, Information technology - Security techniques - Biometric information protection

[58]

ISO/IEC 19772:2009, Information technology - Security techniques - Authenticated encryption

[59]

Breebart J., Busch C., Grave J., Kindt E. 2008. A reference architecture for biometric template protection based on pseudo identities. In: BIOSIG 2008. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures. Editor: ГОСТ Р 54412-2019 (ISO/IEC TR 24741:2018). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Общие положения и примеры применения, A. Bonn: Gesellschaft ГОСТ Р 54412-2019 (ISO/IEC TR 24741:2018). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Общие положения и примеры применения Informatik, 2008, pp. 25 - 37

[60]

Lummis R.C., & Rosenberg A 1972. Test of an ASV method with intensively trained professional mimics, Journal of the Acoustical. Society of America 51, 131

[61]

Raphael D.E., & Young J.R. 1974. Automated Personal Identification, Palo Alto: SRI International

[62]

Meissner P. 1977. Guidelines on evaluation of techniques for automated personal identification, National Bureau of Standards, FIPS PUB 48

[63]

ISO/IEC 30107-1:2016, Information technology - Biometric presentation attack detection - Part 1: Framework

[64]

Van Der Putte T., & Keuning J. 2000. Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned, IFIP TC8/WG.8., Fourth Working Group Conference on Smart Card Research and Advanced Applications, 289 - 303

[65]

Matsumoto T., Matsumoto H., Yamada K., Hoshino S. 2002. Impact of Artificial 'Gummy' Fingers on Fingerprint Systems, Proceedings SPIE, 4677

[66]

Thalheim L., Krissler J., Ziegler P. 2002. Biometric Access Protection Devices and their Programs Put to the Test, C'T Magazine 11

[67]

Bundesamt ГОСТ Р 54412-2019 (ISO/IEC TR 24741:2018). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Общие положения и примеры применения Sicherheit in der Informationstechnik. 2004. An investigation into the performance of facial recognition systems relative to their planned use in photo identification documents - BioP I: Public final report. Available online at https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/BioP/BioPfinalreportpdf.pdf?_blob=publicationFile (Date of Access 25 Jul 2016)

[68]

Bundesamt ГОСТ Р 54412-2019 (ISO/IEC TR 24741:2018). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Общие положения и примеры применения Sicherheit in der Informationstechnik. 2005. Untersuchung der ГОСТ Р 54412-2019 (ISO/IEC TR 24741:2018). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Общие положения и примеры применения von biometrischen Verifikationssystemen - BioP II ГОСТ Р 54412-2019 (ISO/IEC TR 24741:2018). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Общие положения и примеры применения Abschlussbericht https://www.bsi.bund.de/DE/Publikationen/Studien/BioPII/BioPII.html (Date of Access 25 Jul 2016)

[69]

Alderman E., & Kennedy C. 1995. The Right to Privacy. New York: Vintage Books

[70]

Warren S., & Brandeis L. 1890. The Right to Privacy, Harvard Law Review, 4, 193 - 220

[71]

Westin A. 1967. Privacy and Freedom, Boston: Atheneum

[72]

Robinson N., Graux H., Botterman M., Valeri L. 2009. Review of the European Data Protection Directive. Rand Europe

[73]

ISO/IEC 24714-1:2008, Biometrics - Jurisdictional and societal considerations for commercial applications - Part 1: General guidance

[74]

Kindt E., & ГОСТ Р 54412-2019 (ISO/IEC TR 24741:2018). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Общие положения и примеры применения L. eds. 2007. Biometrics in identity management, Report D3.10, Future of Identity in the Information Society (FIDIS)

[75]

Locke J 1690. An essay concerning human understanding, Book 2, Chapter 27

[76]

Baker L.R. 2000. Persons and Bodies: A Constitution View. Cambridge: Cambridge University Press

[77]

Adler A. 2003. Sample images can be independently restored from face recognition templates. Proc. Canadian Conference on Electrical and Computer Engineering 2003, pp. 1163 - 1166

[78]

Hill C.J. 2001. Risk of masquerade arising from the storage of biometrics. Australian National University, 2001, p. 116

 

 

 

 

 

УДК 004.93'1:006.89:006.354

ОКС 35.040

Ключевые слова: информационные технологии, биометрия, общие положения