Comment on "Method of Fingerprint Identification" (Report) Comment on "Method of Fingerprint Identification" (Report)

Comment on "Method of Fingerprint Identification" (Report‪)‬

Journal of Computer Science 2011, June, 7, 6

    • 2,99 €
    • 2,99 €

Beschreibung des Verlags

INTRODUCTION Panich (2010) reported about finding out an effective algorithm in order to match two fingerprints taken from database. This study state that fingerprint identification techniques only used in a small database in order to find out an effective algorithm to develop the accuracy in matching process. However I found that in the real application, the fingerprint matching must be in very large database. I argue that in the recent research most of the fingerprint problems are explore in million of data. Biometrics have analogy to the use of physiological or biological characteristics to measure the identity of an individual. These features are assuming unique to each individual and remain unaltered during a person's lifetime. These features make biometrics a promising solution to the society. In traditional access control, the access to the secured area can be made by the use of ID numbers or password which amounts to knowledge based security. But such mode can easily be modified and penetrated by intruders and they can breach the doors of security. In monetary transactions and highly restricted to information zone, these are very serious situation. Thus to overcome the above mentioned issue biometric traits are used (Alfaouri, 2008).

GENRE
Computer und Internet
ERSCHIENEN
2011
1. Juni
SPRACHE
EN
Englisch
UMFANG
5
Seiten
VERLAG
Science Publications
ANBIETERINFO
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
GRÖSSE
54,8
 kB
Handbook of Fingerprint Recognition Handbook of Fingerprint Recognition
2022
Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems
2017
Touchless Palmprint Recognition Systems Touchless Palmprint Recognition Systems
2014
Handbook of Multimedia Information Security: Techniques and Applications Handbook of Multimedia Information Security: Techniques and Applications
2019
Guide to Biometric Reference Systems and Performance Evaluation Guide to Biometric Reference Systems and Performance Evaluation
2009
Recent Trends in Image Processing and Pattern Recognition Recent Trends in Image Processing and Pattern Recognition
2021
Data Mining: A Preprocessing Engine. Data Mining: A Preprocessing Engine.
2006
An Exact Algorithm for the Unbounded Knapsack Problem with Minimizing Maximum Processing Time. An Exact Algorithm for the Unbounded Knapsack Problem with Minimizing Maximum Processing Time.
2007
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011
Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report) Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report)
2011
Exploring the Relationship Between Cohesion and Complexity. Exploring the Relationship Between Cohesion and Complexity.
2005