Face scanning security system - biometric, Computer Engineering

Face Scanning Security System - Biometric Computer Security Systems

Finally, face scanning security system are also one of biometric technologies. Generally, the principle of face scanning security is very similar with fingerprint scanning device, because both of them are scanning the appearance of human body (Biometric Security Technology 2009). It is using the ray to calculate the distance from human’s face to the device, and then supposedly structure an image in the security system. By the comparison with fingerprint, it can catch more characters on user’s face, which can also effectively achieve the requirement of security device.

1561_Face Scanning Security System - Biometric.png

In contrast, face scanner device also has the same disadvantage with voice security system. Commonly, human’s face changes frequently because of different factors, such as growth, illness or putting on make-up. For this reason, face scanning security system is still rarely used with its shortages.

Posted Date: 4/2/2013 2:53:49 AM | Location : United States







Related Discussions:- Face scanning security system - biometric, Assignment Help, Ask Question on Face scanning security system - biometric, Get Answer, Expert's Help, Face scanning security system - biometric Discussions

Write discussion on Face scanning security system - biometric
Your posts are moderated
Related Questions
Explain that the lost acknowledgement does not necessarily enforce retransmission of the packet . To guarantee reliable transfer, protocols utilize positive acknowledgement al

What is Page stealing? Ans. Taking page frames other working sets is called Page stealing.

What is non-repudiation? Non Repudiation: Assurance that the sender is given with proof of delivery and that the recipient is provided with proof of the sender's identity so th

Background Information The National Aeronautics and Space Administration (NASA) is the agency within the United States Government responsible for US space exploration. Within th

Q. Explain Status and Control Registers? For control of numerous operations several registers are used. These registers can't be used in data manipulation though content of som

What is database integration? Database integration is the ability to give user-friendly and cost-effective software solutions for data infrastructure management by the interfac

Smart Card & E-Cash E-cash storable smart cards can kept and dispense cash electronically, making bills and coins lesser essential. It transfers funds over phone lines, making

Q. Develop a menu driven program to implement the logic of the following gates. I. AND Gate II. OR Gate III. NOT Gate IV. Exit The user has option to give n number

The PVM system supports functional and data decomposition model of parallel programming. It attaches with C, C++, and FORTRAN. The C and C++ language bindings for the PVM user inte

Blue Sky events is an organisation that devices and runs large outdoor events. They have been commissioned to organise and run an event for four months over the summer period in a