Face scanning security system - biometric, Computer Engineering

Face Scanning Security System - Biometric Computer Security Systems

Finally, face scanning security system are also one of biometric technologies. Generally, the principle of face scanning security is very similar with fingerprint scanning device, because both of them are scanning the appearance of human body (Biometric Security Technology 2009). It is using the ray to calculate the distance from human’s face to the device, and then supposedly structure an image in the security system. By the comparison with fingerprint, it can catch more characters on user’s face, which can also effectively achieve the requirement of security device.

1561_Face Scanning Security System - Biometric.png

In contrast, face scanner device also has the same disadvantage with voice security system. Commonly, human’s face changes frequently because of different factors, such as growth, illness or putting on make-up. For this reason, face scanning security system is still rarely used with its shortages.

Posted Date: 4/2/2013 2:53:49 AM | Location : United States







Related Discussions:- Face scanning security system - biometric, Assignment Help, Ask Question on Face scanning security system - biometric, Get Answer, Expert's Help, Face scanning security system - biometric Discussions

Write discussion on Face scanning security system - biometric
Your posts are moderated
Related Questions
The Stack A procedure call is supported by a stack. So let's discuss stack in assembly. Stacks are 'Last In First Out' data structures and are used for storing return addresses

hidden edge/surface removal

Java bean is a reusable component, where as the servlet is the java program which extends the server capability.

Q. How to convert Binary to Octal and Hexadecimal? Rules for these conversions are simple. For converting binary to octal binary number is splitted in groups of three, that are

pls give the list of adaptive mechanism in artificial immune system

What is the Gray equivalent of  (25) 10 Ans. Gray equivalent of (25) 10 : The Decimal number 25 has binary equivalent as (00100101) 2 The left most bits (MSB) into gray

What is computer virus?  A  computer  virus  is  a  computer  program  that  is  designed  to  spread  itself between   computers.   Computer virus are inactive when standing a


Canvas is a component. ScrollPanel is a container. Canvas is a rectangular area where the application can draw or trap input events. ScrollPane executes horizontal and vertical scr

Is the ROM a volatile memory? Explain Ans. No, ROM is a Non-Volatile memory. Programming of ROM includes making of the needed  interconnections at  the time of fabrication and