On Securing a Door with Finger Print Biometric Technique

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Security Using Finger Print Recognition

Our goal is to implement finger print recognition on the PXA27x DVK platform in view of increasing popularity of biometric security for digital handheld devices. To this end we are using Siemens ID Mouse finger print capture device mentioned in [5] that scans the finger print and gives out a high quality image while maintaining sub-pixel geometric accuracy. This image will then be stored and pr...

متن کامل

Securing Business’s Front Door – Password, Token, and Biometric Authentication

Human authentication is the security task whose job is to limit access to computer networks and physical locations only to those with authorization. This is done by equipping authorized users with passwords or tokens, or using their biometrics. However, due to human limitations, these are often used poorly, thus weakening security, or they are secure but so inconvenient as to be circumvented. T...

متن کامل

Securing the Images Using Biometric Cryptography Technique

A biometric authentication system operates by acquiring raw biometric data from a subject, extracting a feature set from the data and comparing the feature set against the templates stored in a database in order to identify a person or to verify a claimed identity. The template data in the database is generated during enrolment and is often stored along with the original raw data. This work exp...

متن کامل

Biometric encryption using enhanced finger print image and elliptic curve

The greatest strength of biometrics is that it does not change over time. But at the same time while using it directly for enhancing the security in network system, if that data has been compromised, its compromised forever[1]. Therefore, cancellable biometrics will increase the privacy which means that the true biometrics are never stored or revealed to the authentication server. Biometrics, c...

متن کامل

Security Threats of Finger Print Biometric in Network System Environment

Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transactions on Machine Learning and Artificial Intelligence

سال: 2014

ISSN: 2054-7390

DOI: 10.14738/tmlai.22.164