Comment on "Method of Fingerprint Identification" (Report) Comment on "Method of Fingerprint Identification" (Report)

Comment on "Method of Fingerprint Identification" (Report‪)‬

Journal of Computer Science 2011, June, 7, 6

    • 2,99 €
    • 2,99 €

Description de l’éditeur

INTRODUCTION Panich (2010) reported about finding out an effective algorithm in order to match two fingerprints taken from database. This study state that fingerprint identification techniques only used in a small database in order to find out an effective algorithm to develop the accuracy in matching process. However I found that in the real application, the fingerprint matching must be in very large database. I argue that in the recent research most of the fingerprint problems are explore in million of data. Biometrics have analogy to the use of physiological or biological characteristics to measure the identity of an individual. These features are assuming unique to each individual and remain unaltered during a person's lifetime. These features make biometrics a promising solution to the society. In traditional access control, the access to the secured area can be made by the use of ID numbers or password which amounts to knowledge based security. But such mode can easily be modified and penetrated by intruders and they can breach the doors of security. In monetary transactions and highly restricted to information zone, these are very serious situation. Thus to overcome the above mentioned issue biometric traits are used (Alfaouri, 2008).

GENRE
Informatique et Internet
SORTIE
2011
1 juin
LANGUE
EN
Anglais
LONGUEUR
5
Pages
ÉDITIONS
Science Publications
TAILLE
54,8
Ko

Plus de livres par Journal of Computer Science

Wifi Technology: Future Market Challenges and Opportunities. Wifi Technology: Future Market Challenges and Opportunities.
2006
Management Information Systems Role in Decision-Making During Crises: Case Study (Report) Management Information Systems Role in Decision-Making During Crises: Case Study (Report)
2010
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011
Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report) Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report)
2011
Exploring the Relationship Between Cohesion and Complexity. Exploring the Relationship Between Cohesion and Complexity.
2005