Essays about: "fingerprint Recognition System"
Showing result 1 - 5 of 14 essays containing the words fingerprint Recognition System.
-
1. Contactless palm print recognition: Novel design and palm openness classification
University essay from Lunds universitet/Matematik LTHAbstract : Biometric technologies, such as facial and fingerprint recognition, have become widely adopted for identity verification in various applications. Palm biometrics, utilizing the unique patterns of the human palm, has gained significant attention for its accuracy and security. READ MORE
-
2. Polar Codes for Biometric Identification Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Biometrics are widely used in identification systems, such as face, fingerprint, iris, etc. Polar code is the only code that can be strictly proved to achieve channel capacity, and it has been proved to be optimal for channel and source coding. READ MORE
-
3. Knock-Knock Door Lock : Unlocking your door with a secret knock sequence
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : The door lock - a key function in every modern home, as well as a product which is today undergoing drastic change. The digital revolution has not left the door lock untouched, and there is today a wide variety of digital door locks utilizing technologies ranging from touch displays to fingerprint readers. READ MORE
-
4. Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. READ MORE
-
5. Biometric Authentication and Penetration of Smartphones
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. READ MORE