Retina - biometric computer security systems, Computer Engineering

Retina - Biometric Computer Security Systems

The next security technology that explained in this report is retina security technology which is very famous in a lot of spy movie. Although retina is an outstanding and perfect security device, it can not be popularized in human’s daily life. Firstly, retina contains a large amount of vessels which absorbs more light than the surrounding area. The retina scanner device can recognize retina by casting a ray of low energy light into human’s retina when they see through the device. However, according to Biometric Scanner (2009), the person who wants to be recognized should concentrate his eyes on the scanner device for more than 10 seconds. The description stated above is the principle of operating retina scanning device.

342_Retina - Biometric Computer Security Systems.png

According to the principle of retina scanner, it is actually a dependable security system. However, a lot of scientists continually study for the ray from the device because users still doubt whether the ray is harmful for human’s eyesight or not (Biometric Scanner 2009). Furthermore, using this security system is not only time consuming, but also making user uncomfortable due to the 10 seconds concentration. With this drawbacks and the expense, retina can not be commonly used at present society.

Posted Date: 4/2/2013 2:50:02 AM | Location : United States

Related Discussions:- Retina - biometric computer security systems, Assignment Help, Ask Question on Retina - biometric computer security systems, Get Answer, Expert's Help, Retina - biometric computer security systems Discussions

Write discussion on Retina - biometric computer security systems
Your posts are moderated
Related Questions
Explain the TEST instruction TEST instruction performs the AND operation. The difference is that AND instruction changes the destination operand whereas TEST instruction doesn

What are local objects? Local objects (Dev class$TMP) are independent of correction & transport system

where should I work?

Th e ID3 algorithm The calculation for information gain is the very difficult phase of this algorithm. ID3 performs a search whereby the search states are decision trees an

How music is produced and generated - CAD Computer software and hardware advances have changed how music is produced and generated. Some of the primary reasons for this have

Stack unwinding in C++ is a process during exception handling when the destructor is known for all local objects the place where the exception was thrown and where it is caught.

We perform load testing once we are completed with interface (GUI) testing. Modern system architectures are large and difficult. Whereas one user testing primarily on functionality

Automated Reasoning - first-order logic: The topic known as "Automated Reasoning" in "AI"concentrates mostly on deductive reasoning, here new facts are logically deduced from

Explain Tri-state logic inverter with the help of a circuit diagram. Give its Truth Table. Ans: Tri-state Logic Inverter: The functional diagram of Tri-state Logic Inve

Universal Serial Bus - computer architecture: USB   Universal Serial Bus   Speed Low-speed(1.5 Mb/s) High-speed(480 Mb/s) Full-speed(12 Mb/s)   De