S Chandran - International Conference on IT, Architecture and …, 2015 - researchgate.net
Identifying a person or authenticating a person has been most vital process and mandatory
in several real time applications for security reasons. For example logging into a computer …