2010 International Conference on E-Product E-Service and E-Entertainment 2010
DOI: 10.1109/iceee.2010.5660777
|View full text |Cite
|
Sign up to set email alerts
|

The Research of Double-Biometric Identification Technology Based on Handprints

Abstract: Single biometric identification becomes the bottleneck problem of biometric identification technology inevitably because of its limitation and objectivity. In order to solve the problem, double biometric identification technology will become the main direction of future development. This article is based on this idea and adopts handprints recognition which combines fingerprints recognition with palmprints recognition. It aimed at the complexity and diversity of handprints image and brought forward double biome… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Network security includes physical security, network security, application system security, data security, information security and infrastructure security. The main purpose of network security is to protect computer hardware and software and network data for avoiding being destroyed, modified and revealed by malicious attacks and ensuring the integrity and security of information [4].…”
Section: A Network Riskmentioning
confidence: 99%
See 2 more Smart Citations
“…Network security includes physical security, network security, application system security, data security, information security and infrastructure security. The main purpose of network security is to protect computer hardware and software and network data for avoiding being destroyed, modified and revealed by malicious attacks and ensuring the integrity and security of information [4].…”
Section: A Network Riskmentioning
confidence: 99%
“…Hackers take advantage of this loophole to destroy system by "legitimate" identity. Network security can only be effectively confirmed the true identity from passive to active [4].…”
Section: Backup Systemmentioning
confidence: 99%
See 1 more Smart Citation