Face scanning security system - biometric, Computer Engineering

Face Scanning Security System - Biometric Computer Security Systems

Finally, face scanning security system are also one of biometric technologies. Generally, the principle of face scanning security is very similar with fingerprint scanning device, because both of them are scanning the appearance of human body (Biometric Security Technology 2009). It is using the ray to calculate the distance from human’s face to the device, and then supposedly structure an image in the security system. By the comparison with fingerprint, it can catch more characters on user’s face, which can also effectively achieve the requirement of security device.

1561_Face Scanning Security System - Biometric.png

In contrast, face scanner device also has the same disadvantage with voice security system. Commonly, human’s face changes frequently because of different factors, such as growth, illness or putting on make-up. For this reason, face scanning security system is still rarely used with its shortages.

Posted Date: 4/2/2013 2:53:49 AM | Location : United States







Related Discussions:- Face scanning security system - biometric, Assignment Help, Ask Question on Face scanning security system - biometric, Get Answer, Expert's Help, Face scanning security system - biometric Discussions

Write discussion on Face scanning security system - biometric
Your posts are moderated
Related Questions
How is basic authentication worked? When an exact resource has been protected using fundamental authentication, Apache sends a 401 Authentication needed header along with the r

Q. Explain logical shift Micro-operations? In logical shift data entering by serial input to left most or right most flip-flop (which depends on right or left shift operations

Bit Serial Associative Processor (BSAP) : When the associative processor accepts bit serial memory organization then it is known as bit serial associative processor. While only one

What is the aim of a stair case light is controlled by two switches one at the top of the stairs and another at the bottom of the stair

The Standard C Library function is removing. (This is thus one of the few questions in this section for which the answer is not ''It's system-dependent.'') On older, pre-ANSI Unix

What is meant by Wired-AND connection of digital ICs?                                                                                                               Ans: Wir

What is Page stealing? Ans. Taking page frames other working sets is called Page stealing.

How to select valid lines for secondary list? To stop the user from selecting invalid lines, ABAP/4 offers various possibilities.  At the end of the processing block END-OF-SEL


Knowledge Representation: To recap, now we have some characterizations of Artificial Intelligence, so  when an Artificial Intelligence problem arises, you will enable  to put i