[1]
He Qi. The Design of Authentication System Based on Fingerprint Identification, Hefei University of Engeering, 2008, 6: 24-28.
Google Scholar
[2]
Cao Guangzhong, Fingerprint Recognition Technology and Application of the Principle,. Shenzhen University (Science Edition), 18 (3) 2001, p.36 ~ 42.
Google Scholar
[3]
Zhang Honglin. Visual C + + Digital Image Pattern Identification Technology and Engineering Practice, The People Post and Telecommunication Press, (2003).
Google Scholar
[4]
Han engling, Hu Jiankun, Yu Xinghuo, Wang Yi. Fingerprint Images Encryption Via Multi-scroll Chaotic Attractors,. Applied Mathematics and Computation, 2007, (185) p.931–939.
DOI: 10.1016/j.amc.2006.07.030
Google Scholar
[5]
LIN Wen-feng, YANG Fan, CHEN Guo-min. Digital Information Encryption Algorithm Based on Fingerprint, Computer Engineering, Vol. 36 No. 8 April 2010, pp.132-134.
Google Scholar
[6]
Li Yu-yu, Han Jian-hua. Research and Realization of Authentication Scheme Based on Fingerprint and Cryptography, Journal of Guangdong University of Technology, Vol. 27 No. 1 March 2010, pp.60-63.
Google Scholar
[7]
Deng Jian-guang. The Actuality of Research on Biometric-Character Encryption Technology and Solutions, Journal of Dongguan University of Technology, 2009. 03.
Google Scholar
[8]
Tian Jie, Yang Xin. Overview of Biometric-Character Encryption Technology, Chinese Automatic Identification Technology, (02-04), (2008).
Google Scholar
[9]
ARMLtd. http: /www. arm. com/products/DevTools.
Google Scholar
[10]
Wan Han, Gao Xiaopeng, Deng Libo, Yu Ting , Design and Implementation of a Simulation Framework for the ARM Embedded System, Tenth International Conference on Computer Modeling and Simulation, 2008, p.714–719.
DOI: 10.1109/uksim.2008.41
Google Scholar