References
[1]. N. L. Clarke and S. M. Furnell (2005), Authentication of users on mobile telephones—A survey of attitudes and practices, Computers and Security, Vol. 24, no. 7, pp. 519–527.
[2]. N. L. Clarke and A. Mekala (2007), The application of signature recognition to transparent handwriting verification for mobile devices, Inf. Manage. Computer and Security, Vol. 15, no. 3, pp. 214–225.
[3]. X. Chen, J. Tian, Q. Su, X. Yang, and F. Wang (2005), A secured mobile phone based on embedded fingerprint recognition systems, in Proc. ISI (Lect. Notes Computer and Security, vol. 3495), pp. 549–553.
[4]. Ephraim, Theo,(2009), Real-Time Viola-Jones Face Detection in a Web Browser, Computer and Robot Vision, CRV '09, pp.321-328
[5]. R. M. Godbole and A. R. Pais,(2008), Secure and efficient protocol for mobile payments, Proceeding 10th Int. Conf. Electron. Commerce, pp. 1–10.
[6]. J. Gonzalez-Rodriguez, D. T. Toledano, and J. Ortega-Garcia(2008), Voice biometrics in Handbook on Biometrics, A. K. Jain, A. A. Ross and P. Flynn, Eds. New York: Springer-Verlag, pp. 151–170.
[7]. Hu,Jhe-Yi , Nat. Yunlin, Taiwan Sueng, Chien-Cheng; Liao, Wei-Hsiang; Ho,Chian C(2012), Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking, Computing, Communications and Applications Conference (ComComAp ), pp.111-116.
[8]. S.M.E. Hossain , G. Chetty (2011), Next Generation Identity Verification Based on Face-Gait Biometrics, International Conference on Biomedical Engineering and Technology IPCBEE, Vol.11, IACSIT Press, Singapore.
[9]. D. J. Hurley, B. Arbab-Zabar, and M. S. Nixon(2008), The ear as a biometric, in Handbook on Biometrics, A. K. Jain, A. A. Ross, and P. Flynn, Eds.New York: Springer-Verlag, pp. 131–150.
[10]. D. S. Jeong, H.-A. Park, K. R. Park, and J. Kim(2005), Iris recognition in mobile phone based on adaptive gabor filter, Lect. Notes Computer and Security, Vol. 3832, pp. 457–463.
[11]. R. L. Kay Protecting mobility, IDC White Paper [Online]. Available at: http://www.tsi.enst.fr/.
[12]. Livingston, Adam R. Old Dominion Univ., Norfolk Asari, Vijayan (2007), Regional Variance Dependant Sub-frame Reduction for Face Detection in, High Definition Video Frames, Applied Imagery Pattern Recognition Workshop, 36th IEEE, Date of Conference: 10-12 ,pp. 89 - 94.
[13]. Malachi, Tobias, Bambuch, Petr, Malach, Jindrich (2012), Face detection in video sequences, Radioelektronika (RADIOELEKTRONIKA), 22nd international Conference, pp. 1 – 4.
[14]. S. McCallum, Evaluability assessment of mobile biometric facial recognition Technology, Pinellas County, FL. [Online].Available:http://www.ncjrs.gov/ pdffiles1/nij/mobile-biometric-facial.pdf.
[15]. Pramod Kumar Pandey, Yaduvir Singh, Sweta Tripathi (2011), Image Processing using Principle Component Analysis, International Journal of Computer Applications (0975 – 8887), Volume 15– No.4.
[16]. I.K. Shlizerman, R. Basri (2011), 3D Face Reconstruction from a Single Image Using a Single Reference Face Shape, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 33, No. 2.
[17]. Q. Zhang, J. N. Moita, K. Mayes, and K.Markantonakis (2004), The secure and multiple payment system based on the mobile phone platform, presented at Workshop Inf. Secur. Appl., Jeju Island, Korea, 2004.