preview

Biometric Authentication : Using Ear And Finger Knuckle Images

Good Essays
Biometric Authentication Algorithm: Using Ear and Finger Knuckle Images
Yadniki Patil MCIS 665 Dr. Wei Li

Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Related Work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. XEngine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4. HXPEngine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
5. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
6. References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Introduction
Biometrics security technology provides automated methods of recognizing a person based on a physiological or behavioral characteristic. There was a rapid growth in the authentication system due to the use of e-commerce applications and change in information technology which fulfils daily life’s requirement by giving reliable and personal authentication system for effective security control. The current features of biometric authentication are face recognition, signature, vein, retinal scan, hand geometry, voice, iris and fingerprints.
Biometric technique is
Get Access