Comment on "Method of Fingerprint Identification" (Report) Comment on "Method of Fingerprint Identification" (Report)

Comment on "Method of Fingerprint Identification" (Report‪)‬

Journal of Computer Science 2011, June, 7, 6

    • $5.99
    • $5.99

Publisher Description

INTRODUCTION Panich (2010) reported about finding out an effective algorithm in order to match two fingerprints taken from database. This study state that fingerprint identification techniques only used in a small database in order to find out an effective algorithm to develop the accuracy in matching process. However I found that in the real application, the fingerprint matching must be in very large database. I argue that in the recent research most of the fingerprint problems are explore in million of data. Biometrics have analogy to the use of physiological or biological characteristics to measure the identity of an individual. These features are assuming unique to each individual and remain unaltered during a person's lifetime. These features make biometrics a promising solution to the society. In traditional access control, the access to the secured area can be made by the use of ID numbers or password which amounts to knowledge based security. But such mode can easily be modified and penetrated by intruders and they can breach the doors of security. In monetary transactions and highly restricted to information zone, these are very serious situation. Thus to overcome the above mentioned issue biometric traits are used (Alfaouri, 2008).

GENRE
Computers & Internet
RELEASED
2011
June 1
LANGUAGE
EN
English
LENGTH
5
Pages
PUBLISHER
Science Publications
SELLER
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
SIZE
54.8
KB
Handbook of Fingerprint Recognition Handbook of Fingerprint Recognition
2022
Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems
2017
Touchless Palmprint Recognition Systems Touchless Palmprint Recognition Systems
2014
Handbook of Multimedia Information Security: Techniques and Applications Handbook of Multimedia Information Security: Techniques and Applications
2019
Guide to Biometric Reference Systems and Performance Evaluation Guide to Biometric Reference Systems and Performance Evaluation
2009
Recent Trends in Image Processing and Pattern Recognition Recent Trends in Image Processing and Pattern Recognition
2021
Analysis of Virus Algorithms (Report) Analysis of Virus Algorithms (Report)
2006
A Fast Approximate String Searching Algorithm. A Fast Approximate String Searching Algorithm.
2005
Management Information Systems Role in Decision-Making During Crises: Case Study (Report) Management Information Systems Role in Decision-Making During Crises: Case Study (Report)
2010
A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf) A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf)
2007
Fast Algorithms for Outlier Detection. Fast Algorithms for Outlier Detection.
2008
The Cyber Space and Information, Communication and Technology: A Tool for Westernization Or Orientalism Or both (Report) The Cyber Space and Information, Communication and Technology: A Tool for Westernization Or Orientalism Or both (Report)
2011