Face scanning security system - biometric, Computer Engineering

Face Scanning Security System - Biometric Computer Security Systems

Finally, face scanning security system are also one of biometric technologies. Generally, the principle of face scanning security is very similar with fingerprint scanning device, because both of them are scanning the appearance of human body (Biometric Security Technology 2009). It is using the ray to calculate the distance from human’s face to the device, and then supposedly structure an image in the security system. By the comparison with fingerprint, it can catch more characters on user’s face, which can also effectively achieve the requirement of security device.

1561_Face Scanning Security System - Biometric.png

In contrast, face scanner device also has the same disadvantage with voice security system. Commonly, human’s face changes frequently because of different factors, such as growth, illness or putting on make-up. For this reason, face scanning security system is still rarely used with its shortages.

Posted Date: 4/2/2013 2:53:49 AM | Location : United States

Related Discussions:- Face scanning security system - biometric, Assignment Help, Ask Question on Face scanning security system - biometric, Get Answer, Expert's Help, Face scanning security system - biometric Discussions

Write discussion on Face scanning security system - biometric
Your posts are moderated
Related Questions
Q. Explain about Micro-instruction Formats? Now let's focus on format of a micro-instruction. The two widely used formats employed for micro-instructions are vertical and horiz

Host Computer:  An array processor may be attached to a host computer by the control unit. The reason of the host computer is to broadcast a sequence of vector instructions by CU t

Which of the memories stores the most number of bits ? Ans. 5Mx8 = 5 x 220 x 8 = 40M (max).

The Process of Development The approach to development can be an iterative one. It involves repeated refinement of the object model. The process needs to be controlled by an a

Which approaches do not require knowledge of the system state? Ans. Deadlock detection, deadlock prevention and deadlock avoidance; none of the given require knowledge of the s

Explain any three policies for process scheduling that uses resource consumption information. All three policies for process scheduling are explained below in brief: 1. Fi

How is Secure Sockets Layer relied on the certificates? The Secure Sockets Layer standard is not a single protocol, but quite a set of accepted data transfer routines which a

Q. Define Various classes of Interrupts? Figure below gives list of some common interrupts and events which causes occurrence of those interrupts. Figure: Various clas

All digital devices are made from circuits whichcan be switched between two possible states.These two states are represented by a voltagelevel at the output of the circuit e.g. 0V

The analog signal needs to be sampled at a minimum sampling rate of: (A) 2fs                                               (B) 1/(2fs) (C)  fs/2