Iris biometric cryptography for identity document
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now playing an important role especi...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2009
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/15340/ http://dx.doi.org/10.1109/SoCPaR.2009.149 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|