Development of Face Recognition Techniques for user Authentication

-15% su kodu: ENG15
75,74 
Įprasta kaina: 89,10 
-15% su kodu: ENG15
Kupono kodas: ENG15
Akcija baigiasi: 2025-03-03
-15% su kodu: ENG15
75,74 
Įprasta kaina: 89,10 
-15% su kodu: ENG15
Kupono kodas: ENG15
Akcija baigiasi: 2025-03-03
-15% su kodu: ENG15
2025-02-28 89.1000 InStock
Nemokamas pristatymas į paštomatus per 11-15 darbo dienų užsakymams nuo 10,00 

Knygos aprašymas

The authentication for access control includes token-based identification or knowledge based identification. In token based method person should possess driving license, passport or and any other authorized identification (ID) card. In knowledge-based identification systems passwords or unique codes are used. Both these authentication methods are not safe because passport or licenses can be stolen and passwords can be hacked. So a unique and secure system is needed. Every individual possess unique biological characteristics and biometrics is related to these measureable biological traits. These are iris, fingerprint, hand, voice, palm geometry recognition and face recognition. Out of all these traits face recognition is the only trait which does not involve the active presence of a person. So these days face is the prime focus of attention. Human brain is quite intelligent to recognize faces under different conditions. But for computer system it is a difficult task. Face recognition is of two types: appearance based and feature based. In appearance based face recognition method holistic features are applied to whole face or sub regions in a face.

Informacija

Autorius: Reecha Sharma
Leidėjas: LAP LAMBERT Academic Publishing
Išleidimo metai: 2016
Knygos puslapių skaičius: 156
ISBN-10: 3659892092
ISBN-13: 9783659892097
Formatas: 220 x 150 x 10 mm. Knyga minkštu viršeliu
Kalba: Anglų

Pirkėjų atsiliepimai

Parašykite atsiliepimą apie „Development of Face Recognition Techniques for user Authentication“

Būtina įvertinti prekę

Goodreads reviews for „Development of Face Recognition Techniques for user Authentication“