Comment on "Method of Fingerprint Identification" (Report) Comment on "Method of Fingerprint Identification" (Report)

Comment on "Method of Fingerprint Identification" (Report‪)‬

Journal of Computer Science 2011, June, 7, 6

    • US$5.99
    • US$5.99

출판사 설명

INTRODUCTION Panich (2010) reported about finding out an effective algorithm in order to match two fingerprints taken from database. This study state that fingerprint identification techniques only used in a small database in order to find out an effective algorithm to develop the accuracy in matching process. However I found that in the real application, the fingerprint matching must be in very large database. I argue that in the recent research most of the fingerprint problems are explore in million of data. Biometrics have analogy to the use of physiological or biological characteristics to measure the identity of an individual. These features are assuming unique to each individual and remain unaltered during a person's lifetime. These features make biometrics a promising solution to the society. In traditional access control, the access to the secured area can be made by the use of ID numbers or password which amounts to knowledge based security. But such mode can easily be modified and penetrated by intruders and they can breach the doors of security. In monetary transactions and highly restricted to information zone, these are very serious situation. Thus to overcome the above mentioned issue biometric traits are used (Alfaouri, 2008).

장르
컴퓨터 및 인터넷
출시일
2011년
6월 1일
언어
EN
영어
길이
5
페이지
출판사
Science Publications
판매자
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
크기
54.8
KB
Handbook of Fingerprint Recognition Handbook of Fingerprint Recognition
2022년
Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems
2017년
Touchless Palmprint Recognition Systems Touchless Palmprint Recognition Systems
2014년
Handbook of Multimedia Information Security: Techniques and Applications Handbook of Multimedia Information Security: Techniques and Applications
2019년
Guide to Biometric Reference Systems and Performance Evaluation Guide to Biometric Reference Systems and Performance Evaluation
2009년
Recent Trends in Image Processing and Pattern Recognition Recent Trends in Image Processing and Pattern Recognition
2021년
Analysis of Virus Algorithms (Report) Analysis of Virus Algorithms (Report)
2006년
A Fast Approximate String Searching Algorithm. A Fast Approximate String Searching Algorithm.
2005년
Management Information Systems Role in Decision-Making During Crises: Case Study (Report) Management Information Systems Role in Decision-Making During Crises: Case Study (Report)
2010년
A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf) A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf)
2007년
Fast Algorithms for Outlier Detection. Fast Algorithms for Outlier Detection.
2008년
The Cyber Space and Information, Communication and Technology: A Tool for Westernization Or Orientalism Or both (Report) The Cyber Space and Information, Communication and Technology: A Tool for Westernization Or Orientalism Or both (Report)
2011년