Biometrics is increasingly applied in IT (biometric methods today generally use computer technology), mostly used to authenticate users. The aim of this thesis is to describe and compare two selected biometric methods. These methods are fingerprints and scanning of human face. The contribution of this work is to provide information on biometric identification methods, their advantages and disadvantages, and deployment options. If an organization decides to strengthen their security systems with introduction of biometric identification / verification systems, they can find information about these systems, types of sensing devices and their advantages and disadvantages. This work will provide an answer WHY introdukce and use these systems to ...
The goal of this thesis is to introduce the main aspects of biometry, explain particular methods of ...
The problem of minimizing the possibility of obtaining unauthorized access to information is investi...
This report will examine the authentication of identity in the context of the Internet as well as th...
Biometrics is increasingly applied in IT (biometric methods today generally use computer technology)...
The thesis deals with biometrics and biometric systems and the possibility to use these systems in t...
The thesis deals with biometrics and biometric systems and the possibility to use these systems in t...
The paper presents an analytical review of the application of biometric recognition systems in relat...
This bachelor thesis is focused on biometric methods, particularly on fingerprint recognition. First...
The aim of this bachelor thesis is to process available variations of biometric methods which are us...
Biometric has revolutionized the Human Recognition Technology.The base and reach of human recognitio...
This thesis describes general function of biometric access systems and summarizes problems of their ...
The biometrics is a branch with long history. With the arrival of information technologies biometric...
The bachelor´s thesis deals with the issue of esoteric systems which belong to biometric systems. Th...
This bachelor thesis deals with biometric devices designed for enterprise content security. The focu...
The thesis is thematically focused on biometric identification systems. The theoretical part explain...
The goal of this thesis is to introduce the main aspects of biometry, explain particular methods of ...
The problem of minimizing the possibility of obtaining unauthorized access to information is investi...
This report will examine the authentication of identity in the context of the Internet as well as th...
Biometrics is increasingly applied in IT (biometric methods today generally use computer technology)...
The thesis deals with biometrics and biometric systems and the possibility to use these systems in t...
The thesis deals with biometrics and biometric systems and the possibility to use these systems in t...
The paper presents an analytical review of the application of biometric recognition systems in relat...
This bachelor thesis is focused on biometric methods, particularly on fingerprint recognition. First...
The aim of this bachelor thesis is to process available variations of biometric methods which are us...
Biometric has revolutionized the Human Recognition Technology.The base and reach of human recognitio...
This thesis describes general function of biometric access systems and summarizes problems of their ...
The biometrics is a branch with long history. With the arrival of information technologies biometric...
The bachelor´s thesis deals with the issue of esoteric systems which belong to biometric systems. Th...
This bachelor thesis deals with biometric devices designed for enterprise content security. The focu...
The thesis is thematically focused on biometric identification systems. The theoretical part explain...
The goal of this thesis is to introduce the main aspects of biometry, explain particular methods of ...
The problem of minimizing the possibility of obtaining unauthorized access to information is investi...
This report will examine the authentication of identity in the context of the Internet as well as th...