Hand vein pattern recognition
For authentication technologies such as password, keys or cards, all that known during the authenticating process is that the correct information presented to the system, not who is holding it. Any unauthorized person can bypass the security system if possesses or known the information. That issue r...
Saved in:
主要作者: | |
---|---|
其他作者: | |
格式: | Final Year Project |
語言: | English |
出版: |
2012
|
主題: | |
在線閱讀: | http://hdl.handle.net/10356/48816 |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
機構: | Nanyang Technological University |
語言: | English |