Jump to content

SIL775: Difference between revisions

From IITD Wiki
[checked revision][checked revision]
Creating course page via bot
 
Bot: wrap bare course codes in wikilinks
 
Line 9: Line 9:


== SIL775 : Biometric Security ==
== SIL775 : Biometric Security ==
Prerequisite(s) :COL106/COL702 Overview of Biometrics, benefits of biometrics over traditional authentication systems,Biometric parameters, biometric matching methods and accuracy in biometric systems, Overview of Image Processing for Biometric Applications, Biometric system design challenges, Biometric recognition: Fingerprint, Face, Iris, Voice, signature (offline and online), Multi-modal Biometric recognition Systems, Challenges to maintain cryptographic key, Biometrics security of cryptographic keys. Template Protection, Fuzzy Vault and its weaknesses and secure template management.
Prerequisite(s) :[[COL106]]/[[COL702]] Overview of Biometrics, benefits of biometrics over traditional authentication systems,Biometric parameters, biometric matching methods and accuracy in biometric systems, Overview of Image Processing for Biometric Applications, Biometric system design challenges, Biometric recognition: Fingerprint, Face, Iris, Voice, signature (offline and online), Multi-modal Biometric recognition Systems, Challenges to maintain cryptographic key, Biometrics security of cryptographic keys. Template Protection, Fuzzy Vault and its weaknesses and secure template management.

Latest revision as of 16:46, 14 April 2026

SIL775
Biometric Security
Credits 3
Structure 3-0-0
Pre-requisites
Overlaps

SIL775 : Biometric Security

Prerequisite(s) :COL106/COL702 Overview of Biometrics, benefits of biometrics over traditional authentication systems,Biometric parameters, biometric matching methods and accuracy in biometric systems, Overview of Image Processing for Biometric Applications, Biometric system design challenges, Biometric recognition: Fingerprint, Face, Iris, Voice, signature (offline and online), Multi-modal Biometric recognition Systems, Challenges to maintain cryptographic key, Biometrics security of cryptographic keys. Template Protection, Fuzzy Vault and its weaknesses and secure template management.