Hand vein pattern recognition

For authentication technologies such as password, keys or cards, all that known during the authenticating process is that the correct information presented to the system, not who is holding it. Any unauthorized person can bypass the security system if possesses or known the information. That issue r...

Full description

Saved in:
Bibliographic Details
Main Author: Nguyen, Canh Lich.
Other Authors: Li Fang
Format: Final Year Project
Language:English
Published: 2012
Subjects:
Online Access:http://hdl.handle.net/10356/48816
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Be the first to leave a comment!
You must be logged in first