Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/50033
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahmad Mustafa Abdul Hameed | |
dc.date.accessioned | 2012-05-28T09:21:54Z | |
dc.date.available | 2012-05-28T09:21:54Z | |
dc.date.copyright | 2012 | en_US |
dc.date.issued | 2012 | |
dc.identifier.uri | http://hdl.handle.net/10356/50033 | |
dc.description.abstract | Biometric has been vastly used in security systems in the rapid development of computer applications today. There are several means of Biometric used in security that are unique tophysical characteristics of human being. They are Fingerprint identification, Hand Geometry, Iris/Retinal scan,Facial scan, Voice recognition, Digital signatureand others. These various approaches have different level of security and uses. For instance, fingerprint identification is one of the most secured biometric that hasbeen widely used over the years. A fingerprint consists of tiny ridges, whorls and valley patterns which are unique among humans. Fingerprints are differentiated by minutia points found on the ridges. The two most common types of minutia are known as termination and bifurcation points. | en_US |
dc.format.extent | 61 p. | en_US |
dc.language.iso | en | en_US |
dc.rights | Nanyang Technological University | |
dc.subject | DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems | en_US |
dc.title | Design and development of biometric-based techniques for E-security | en_US |
dc.type | Final Year Project (FYP) | en_US |
dc.contributor.supervisor | Mohammed Yakoob Siyal | en_US |
dc.contributor.school | School of Electrical and Electronic Engineering | en_US |
dc.description.degree | Bachelor of Engineering | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | restricted | - |
Appears in Collections: | EEE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
eA3104-111.pdf Restricted Access | Biometric-based E-Security using Fingerprint Identification technique | 3.23 MB | Adobe PDF | View/Open |
Page view(s) 50
478
Updated on Mar 28, 2024
Download(s) 50
17
Updated on Mar 28, 2024
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.