What can the structure of the palmprint tell us?

With the development of technology—a double edge sword, while people are enjoying convenience and lifestyle reform, malicious usage of technology also lead to security concerns. Many identification and verification methods have been developed to address this issue. Token based solutions like pass...

Full description

Bibliographic Details
Main Author: Liu, Xue
Other Authors: Li Fang
Format: Final Year Project (FYP)
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/66613