Iris biometric cryptography for identity document

Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now playing an important role especi...

Full description

Saved in:
Bibliographic Details
Main Authors: Moi, Sim Hiew, Abdul Rahim, Nazeema, Saad, Puteh, Sim, Pang Li, Zakaria, Zalmiyah, Ibrahim, Subariah
Format: Conference or Workshop Item
Published: 2009
Subjects:
Online Access:http://eprints.utm.my/id/eprint/15340/
http://dx.doi.org/10.1109/SoCPaR.2009.149
Tags: Add Tag
No Tags, Be the first to tag this record!