| http://www.w3.org/ns/prov#value | - IntroductionWith the increased demand for personal information security, biometric technologies such as iris, face, fingerprint, finger-vein, voice, gait, palm-print, and hand geometry recognition have been employed in a wide number of security systems, e.g., building access, computer log-ins, door access control, cellular phones, and ATMs [1???4].
|