Comment on "Method of Fingerprint Identification" (Report) Comment on "Method of Fingerprint Identification" (Report)

Comment on "Method of Fingerprint Identification" (Report‪)‬

Journal of Computer Science 2011, June, 7, 6

    • $5.99
    • $5.99

Publisher Description

INTRODUCTION Panich (2010) reported about finding out an effective algorithm in order to match two fingerprints taken from database. This study state that fingerprint identification techniques only used in a small database in order to find out an effective algorithm to develop the accuracy in matching process. However I found that in the real application, the fingerprint matching must be in very large database. I argue that in the recent research most of the fingerprint problems are explore in million of data. Biometrics have analogy to the use of physiological or biological characteristics to measure the identity of an individual. These features are assuming unique to each individual and remain unaltered during a person's lifetime. These features make biometrics a promising solution to the society. In traditional access control, the access to the secured area can be made by the use of ID numbers or password which amounts to knowledge based security. But such mode can easily be modified and penetrated by intruders and they can breach the doors of security. In monetary transactions and highly restricted to information zone, these are very serious situation. Thus to overcome the above mentioned issue biometric traits are used (Alfaouri, 2008).

GENRE
Computing & Internet
RELEASED
2011
1 June
LANGUAGE
EN
English
LENGTH
5
Pages
PUBLISHER
Science Publications
SELLER
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
SIZE
54.8
KB
Handbook of Fingerprint Recognition Handbook of Fingerprint Recognition
2022
Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems
2017
Touchless Palmprint Recognition Systems Touchless Palmprint Recognition Systems
2014
Handbook of Multimedia Information Security: Techniques and Applications Handbook of Multimedia Information Security: Techniques and Applications
2019
Guide to Biometric Reference Systems and Performance Evaluation Guide to Biometric Reference Systems and Performance Evaluation
2009
Recent Trends in Image Processing and Pattern Recognition Recent Trends in Image Processing and Pattern Recognition
2021
Wifi Technology: Future Market Challenges and Opportunities. Wifi Technology: Future Market Challenges and Opportunities.
2006
A Fast Approximate String Searching Algorithm. A Fast Approximate String Searching Algorithm.
2005
Management Information Systems Role in Decision-Making During Crises: Case Study (Report) Management Information Systems Role in Decision-Making During Crises: Case Study (Report)
2010
A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf) A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf)
2007
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011