Anuj Mehra

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—Biometric authentication techniques are more consistent and efficient than conventional authentication techniques and can be used in monitoring, transaction authentication, information retrieval, access control, forensics, etc. In this paper, we have presented a detailed comparative analysis between Principle Component Analysis (PCA) and Independent(More)
  • 1