Security threats of finger print biometric in network system environment
Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand,...
Main Authors: | Taha, Imad, Ahmad, Mohammad A. |
---|---|
Format: | Article |
Language: | English |
Published: |
Design for Scientific Renaissance
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/2865/ http://irep.iium.edu.my/2865/ http://irep.iium.edu.my/2865/1/17.pdf |
Similar Items
-
A novel associative memory approach to speech enhancement
in a vehicular environment
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009) -
Investigating key success factors in adopting knowledge management system
by: Noordin, Mohamad Fauzan, et al.
Published: (2013) -
Context aware knowledge bases for efficient contextual retrieval: design and methodologies
by: Wani, Sharyar, et al.
Published: (2019) -
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011) -
Multimedia encryption, transmission and authentication
Published: (2011)