Login / Signup

Encryption using finger-code generated from fingerprints.

Cynthia Sthembile NtshangaseMeshack Bafana Shabalala
Published in: ICTAS (2018)
Keyphrases
  • source code
  • information systems
  • case study
  • input image
  • automatically generated
  • randomly selected
  • generation process
  • encryption decryption