V Zorkadis, P Donos - Information Management & Computer Security, 2004 - emerald.com
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis
and hand‐written signature verification, are increasingly becoming basic elements of …