ABSTRACT

Many of the principles I covered in Chapter 1 were derived from my first book, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture *