What can the structure of the palmprint tell us

We know that common authentication technologies like having password, keys or cards, the system only needs to acquire the correct information during the authenticating process and not the authorized person of the password, keys or cards. As a result an unauthorized person can bypass the security sys...

Full description

Saved in:
Bibliographic Details
Main Author: Leong, Wei Siong.
Other Authors: Li Fang
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/52493
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English