Face scanning security system - biometric, Computer Engineering

Face Scanning Security System - Biometric Computer Security Systems

Finally, face scanning security system are also one of biometric technologies. Generally, the principle of face scanning security is very similar with fingerprint scanning device, because both of them are scanning the appearance of human body (Biometric Security Technology 2009). It is using the ray to calculate the distance from human’s face to the device, and then supposedly structure an image in the security system. By the comparison with fingerprint, it can catch more characters on user’s face, which can also effectively achieve the requirement of security device.

1561_Face Scanning Security System - Biometric.png

In contrast, face scanner device also has the same disadvantage with voice security system. Commonly, human’s face changes frequently because of different factors, such as growth, illness or putting on make-up. For this reason, face scanning security system is still rarely used with its shortages.

Posted Date: 4/2/2013 2:53:49 AM | Location : United States







Related Discussions:- Face scanning security system - biometric, Assignment Help, Ask Question on Face scanning security system - biometric, Get Answer, Expert's Help, Face scanning security system - biometric Discussions

Write discussion on Face scanning security system - biometric
Your posts are moderated
Related Questions
Performance and Issues in Pipelining Speedup:   Firstly, we get the speedup factor that is we see how much speed up performance we get through pipelining. First we get the

What are disadvantages of the asynchronous reset and synchronous reset? Disadvantages of asynchronous reset: Make sure that the release of the reset can arise within one c

Why Build and fix model is considered as ad-hoc software development model?

Q. Show MPI functions? MPI comprises hundreds of functions which are a small subset of which is enough for most practical purposes. We will discuss some of them here. Int M

Question 1: (a) How would you explain human reasoning? (b) Explain the different types of human reasoning? Question 2: (a) What are the computational factors affec

Q. Executing a parallel algorithm? Multiple processors need synchronization with one another when executing a parallel algorithm. So task which is running on processor X may ha

Q. Signaling PVM process? int pvm_sendsig( int tid, int signum ) Transmits a signal to other PVM process. tid is task identifier of PVM process to receive signal.

* Public, protected and private are 3 access specifier in C++. * Public data members and member functions are accessible outside the class. * Protected data members and memb

DUPLICATING PROCESSES : As we mentioned earlier duplicating is a process whereby a master copy is prepared from which a large number of other copies are obtained with the help of

Describe the Electronic Data Exchange (EDI) architecture in brief. Electronic Data Interchange (EDI) may be generally easy to understand as the replacement of paper-based purch