What can the structure of the palmprint tell us

We know that common authentication technologies like having password, keys or cards, the system only needs to acquire the correct information during the authenticating process and not the authorized person of the password, keys or cards. As a result an unauthorized person can bypass the security sys...

Description complète

Détails bibliographiques
Auteur principal: Leong, Wei Siong.
Autres auteurs: Li Fang
Format: Final Year Project (FYP)
Langue:English
Publié: 2013
Sujets:
Accès en ligne:http://hdl.handle.net/10356/52493

Documents similaires