Biometrics identification system
For most system, their security relies on authentication methods that use information or token such as password, keys or cards to authorize their users’ access. While these methods are generally sufficient, unauthorized users can gain access once they acquire the required information or token. This...
Saved in:
Main Author: | Wong, Fu Qiang. |
---|---|
Other Authors: | Li Fang |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/52273 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Make biometric-based person identification system applicable
by: Gan, David Jian Wen
Published: (2012) -
Make biometric-based person identification system applicable
by: Hu, Yuanling.
Published: (2011) -
Criminal and victim identification based on deep and large feature sets from hand biometrics
by: Wojciech Michal Matkowski
Published: (2020) -
Make biometric mobile applicable to traditional indian palmistry
by: Monica Cheryl Sandra Premkumar.
Published: (2013) -
Biometric based E-security solutions for future digital world
by: Sim, Andy Ming Hong
Published: (2023)