1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
11

This measures how close a biometric reading is to a prerecorded template

Computers and Technology
1 answer:
rjkz [21]3 years ago
5 0

The question above has multiple choices;

<span>a)      </span>Hamming distance

<span>b)      </span>Match percentage

<span>c)       </span>Legacy amount 100.

<span>d)      </span>PDA reading

The answer is a) Hamming distance


Biometric authentications like other technologies are vulnerable to attacks such as spoofing and transmission. Binary template representations in recent research provide significant improvements in efficiency without compromising data accuracy for biometric modalities like iris, fingerprints, and palm prints.

Any binary biometric representation that uses hamming distance and converts it into a privacy preserving secure protocol comparison provides template protection.






You might be interested in
If cos 3/5 what is the sin and tan​
suter [353]

Answer:2.988584094

Explanation:

6 0
3 years ago
Which of the following must be true for hydropower to work?
Nastasia [14]

95% sure its there must be waves

5 0
2 years ago
How operands are fetched from or stored into memory using different ways?
Mila [183]
<span>The operand is part of the instruction and is fetched from code memory following the instruction opcode.
</span><span>The value is stored in memory, and the specific address is held in a register</span>
6 0
4 years ago
Which of the following are pointers? Select all that are correct. hub node router transmission media switch port interconnector
Sphinxa [80]
Hub , switch port , transmission media , hope I helped
4 0
3 years ago
Read 2 more answers
The content of a 4-bit register is initially the 4-bit word 0101. the register is shifted 6 times to the right with the serial i
Slav-nsk [51]

what is this concept?

3 0
3 years ago
Other questions:
  • Regulatory control limits the activities of an organization in compliance with the organization's policies. True False
    14·2 answers
  • A transmission system at a radio station uses a/an _______ to convert a direct current into a high-frequency alternating current
    14·1 answer
  • #We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns i
    5·1 answer
  • According to the ethical computer use policy, users should be __________ of the rules and, by agreeing to use the system on that
    11·1 answer
  • Which Tab contains the font style attributes?<br><br> Home<br> Insert<br> Review<br> View
    8·2 answers
  • All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
    12·1 answer
  • Watson Studio is the IBM premier integrated development environment for data science and artificial intelligence practitioners.
    5·1 answer
  • What's the full form of CPU?​
    5·2 answers
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. Please select the
    12·1 answer
  • Define computer architecture?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!