Please use this identifier to cite or link to this item:
|Title:||Design and development of biometric-based techniques for E-security||Authors:||Ahmad Mustafa Abdul Hameed||Keywords:||DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems||Issue Date:||2012||Abstract:||Biometric has been vastly used in security systems in the rapid development of computer applications today. There are several means of Biometric used in security that are unique tophysical characteristics of human being. They are Fingerprint identification, Hand Geometry, Iris/Retinal scan,Facial scan, Voice recognition, Digital signatureand others. These various approaches have different level of security and uses. For instance, fingerprint identification is one of the most secured biometric that hasbeen widely used over the years. A fingerprint consists of tiny ridges, whorls and valley patterns which are unique among humans. Fingerprints are differentiated by minutia points found on the ridges. The two most common types of minutia are known as termination and bifurcation points.||URI:||http://hdl.handle.net/10356/50033||Rights:||Nanyang Technological University||Fulltext Permission:||restricted||Fulltext Availability:||With Fulltext|
|Appears in Collections:||EEE Student Reports (FYP/IA/PA/PI)|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.