Login / Signup
Encryption using finger-code generated from fingerprints.
Cynthia Sthembile Ntshangase
Meshack Bafana Shabalala
Published in:
ICTAS (2018)
Keyphrases
</>
source code
information systems
case study
input image
automatically generated
randomly selected
generation process
encryption decryption