What can the structure of the palmprint tell us?
With the development of technology—a double edge sword, while people are enjoying convenience and lifestyle reform, malicious usage of technology also lead to security concerns. Many identification and verification methods have been developed to address this issue. Token based solutions like pass...
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/66613 |