Biometrics identification system

For most system, their security relies on authentication methods that use information or token such as password, keys or cards to authorize their users’ access. While these methods are generally sufficient, unauthorized users can gain access once they acquire the required information or token. This...

Full description

Saved in:
Bibliographic Details
Main Author: Wong, Fu Qiang.
Other Authors: Li Fang
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/52273
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English