Thermal Recognition in Biometrics Approach

Download Now
Provided by: International Journal of Recent Technology and Engineering (IJRTE)
Topic: Security
Format: PDF
Humans recognize each other according to their various characteristics for ages. The authors recognize others by their face when they meet them and by their voice as they speak to them. Identity verification (authentication) in computer systems has been traditionally based on something that one has (key, magnetic or chip card) or one knows (PIN, password). Things like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or disclosed. To achieve more reliable verification or identification they should use something that really characterizes the given person.
Download Now

Find By Topic