Digital Forensics and Internet of Things. Группа авторов

Читать онлайн книгу.

Digital Forensics and Internet of Things - Группа авторов


Скачать книгу
video, audio, or audio-visual element given to the system. Generally, the data is used to access a system or service. This can be performed in two variations depending on its application. First is when the facial recognition system is taking the input (face) for the first time and registering it for analysis. Second is when the user is authenticated prior to being registered. In this, the incoming data is checked from the existing data in the database, and then, access or permission is granted.

      The most important aspect of any security system is to properly identify individuals entering or taking an exit through the entrance. There are several systems that use passwords or pins for identification purposes. But these types of systems are not very effective as these pins and passwords can be stolen or copied easily. The best solution to this is using one’s bio-metric trait. These are highly effective and useful. This system is designed for prevention of security threats in exceptionally secure regions with lesser power utilization and more dependable independent security gadget.


Скачать книгу