Retina - biometric computer security systems, Computer Engineering

Retina - Biometric Computer Security Systems

The next security technology that explained in this report is retina security technology which is very famous in a lot of spy movie. Although retina is an outstanding and perfect security device, it can not be popularized in human’s daily life. Firstly, retina contains a large amount of vessels which absorbs more light than the surrounding area. The retina scanner device can recognize retina by casting a ray of low energy light into human’s retina when they see through the device. However, according to Biometric Scanner (2009), the person who wants to be recognized should concentrate his eyes on the scanner device for more than 10 seconds. The description stated above is the principle of operating retina scanning device.

342_Retina - Biometric Computer Security Systems.png

According to the principle of retina scanner, it is actually a dependable security system. However, a lot of scientists continually study for the ray from the device because users still doubt whether the ray is harmful for human’s eyesight or not (Biometric Scanner 2009). Furthermore, using this security system is not only time consuming, but also making user uncomfortable due to the 10 seconds concentration. With this drawbacks and the expense, retina can not be commonly used at present society.

Posted Date: 4/2/2013 2:50:02 AM | Location : United States







Related Discussions:- Retina - biometric computer security systems, Assignment Help, Ask Question on Retina - biometric computer security systems, Get Answer, Expert's Help, Retina - biometric computer security systems Discussions

Write discussion on Retina - biometric computer security systems
Your posts are moderated
Related Questions
Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

Why The JavaScript Validation Not Run on the Asp.Net? The Asp.Net Button Is post backed on the server & not yet Submit & when it goes to the server its states is lost so if we

What is Web Mail Services? Web-based email services are also called as web mail or HTTP email. Unlike traditional POP email, web mail can be accessed from any PC using any web

In a particular exchange during busy hour 1200 calls were offered to a group of trunks, during this time 6 calls were lost. The average call duration being 3 minutes Calculate

Problem: (a) Cellular systems are based on two types of multiplexing, what are those two types of multiplexing? Describe how they are used to improve channel allocation in cel

What is Error detection code? It is a binary code that notice digital errors during transmission. The detected errors cannot be correct but the presence is shown.

Illustrate some notations of object modeling notations A classifier is a mechanism which describes behavioural and structural features. In UML significant classifiers are cla

Question: (a) Explain clearly the difference between J-cuts and L-Cuts. (b) What is the function of the rate stretch tool? (c) What's the difference between an Image Matt

1. How can you divide the screen into quadrants? Is the process called as ‘viewing transformations’?

Q. Define syntax of MPI_Scatter function? MPI_Scatter(Sendaddr, Scount, Sdatatype, Receiveaddr, Rcount, Rdatatype, Rank, Comm): 'Using this function process with rank' ran