Login / Signup

U-City User Authentication Methods and Encryption Techniques Based on Biometric Technology.

Youngjun KimJason Kim
Published in: FBIT (2007)
Keyphrases
  • user authentication
  • biometric systems
  • data mining
  • feature extraction
  • feature space
  • low cost
  • anomaly detection
  • biometric authentication
  • biometric recognition