Download Now Free registration required
In recent information day, how to identify person and protect security of information is a key to the social. A problem of personal verification and identification is an actively growing area of research. The methods are numerous, and are based on different personal characteristics. Voice, lip movements, hand geometry, face, odor, gait, iris, retina, fingerprint are the most commonly used authentication methods. With the development of information society, the identity recognition technology in the privacy protection, information security and plays a more and more important role. In daily life, people often need to know the identity of people around, to prevent the individual rights are being violated.
- Format: PDF
- Size: 907.08 KB