Design and development of biometric-based techniques for E-security
Biometric has been vastly used in security systems in the rapid development of computer applications today. There are several means of Biometric used in security that are unique tophysical characteristics of human being. They are Fingerprint identification, Hand Geometry, Iris/Retinal scan,Facial sc...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/50033 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-50033 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-500332023-07-07T17:43:22Z Design and development of biometric-based techniques for E-security Ahmad Mustafa Abdul Hameed Mohammed Yakoob Siyal School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Biometric has been vastly used in security systems in the rapid development of computer applications today. There are several means of Biometric used in security that are unique tophysical characteristics of human being. They are Fingerprint identification, Hand Geometry, Iris/Retinal scan,Facial scan, Voice recognition, Digital signatureand others. These various approaches have different level of security and uses. For instance, fingerprint identification is one of the most secured biometric that hasbeen widely used over the years. A fingerprint consists of tiny ridges, whorls and valley patterns which are unique among humans. Fingerprints are differentiated by minutia points found on the ridges. The two most common types of minutia are known as termination and bifurcation points. Bachelor of Engineering 2012-05-28T09:21:54Z 2012-05-28T09:21:54Z 2012 2012 Final Year Project (FYP) http://hdl.handle.net/10356/50033 en Nanyang Technological University 61 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Ahmad Mustafa Abdul Hameed Design and development of biometric-based techniques for E-security |
description |
Biometric has been vastly used in security systems in the rapid development of computer applications today. There are several means of Biometric used in security that are unique tophysical characteristics of human being. They are Fingerprint identification, Hand Geometry, Iris/Retinal scan,Facial scan, Voice recognition, Digital signatureand others. These various approaches have different level of security and uses. For instance, fingerprint identification is one of the most secured biometric that hasbeen widely used over the years. A fingerprint consists of tiny ridges, whorls and valley patterns which are unique among humans. Fingerprints are differentiated by minutia points found on the ridges. The two most common types of minutia are known as termination and bifurcation points. |
author2 |
Mohammed Yakoob Siyal |
author_facet |
Mohammed Yakoob Siyal Ahmad Mustafa Abdul Hameed |
format |
Final Year Project |
author |
Ahmad Mustafa Abdul Hameed |
author_sort |
Ahmad Mustafa Abdul Hameed |
title |
Design and development of biometric-based techniques for E-security |
title_short |
Design and development of biometric-based techniques for E-security |
title_full |
Design and development of biometric-based techniques for E-security |
title_fullStr |
Design and development of biometric-based techniques for E-security |
title_full_unstemmed |
Design and development of biometric-based techniques for E-security |
title_sort |
design and development of biometric-based techniques for e-security |
publishDate |
2012 |
url |
http://hdl.handle.net/10356/50033 |
_version_ |
1772828342302539776 |