Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Fingerprinting

Handbook of Research on Cyber Law, Data Protection, and Privacy
The technique of using fingers for identification and recognition of individuals.
Published in Chapter:
Gauging the Scale of Intertwinement: Juggling Between the Use of Biometric Data and Right to Privacy
Vinayak Jhamb (University School of Law and Legal Studies, Guru Gobind Singh Indraprastha University, India) and Manini Syali (Guru Gobind Singh Indraprastha University, India)
Copyright: © 2022 |Pages: 15
DOI: 10.4018/978-1-7998-8641-9.ch007
One of the critical features of automated biometric recognition applications is that, unlike traditional security systems, they do not solely rely on memory or knowledge-based features like passwords and thus provide protection and identification of an enhanced form. Bio-metric recognition systems instead weigh on pattern matching. They collect biological data from an individual using sensors and match the extracted discriminatory features from the input received with the already existing data in the system. Unique identification projects do not solely pose a danger from the side of the government authorities alone, and private players have also entered the game of misusing sensitive information of the users. It would thus not be wrong to state that privacy has indeed become a commodity to be sold off for monetary gains. However, the concept of “privacy” is a contentious domain, and debates pertaining to its scope continue.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Music Score Watermarking
Used for calling the hidden serial numbers or anything else that should allow to the copyright owner to identify which reseller broke the license agreement. It is used for the multilevel document distribution.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey of People Localization Techniques Utilizing Mobile Phones
A localization method where the current location is determined by measuring the local characteristics of one or more signals (usually of electromagnetic nature) and comparing them with a set of values stored in a database. The database contains a map of signal values and their corresponding physical locations.
Full Text Chapter Download: US $37.50 Add to Cart
Text Mining in Program Code
Code fragments are associated with numerical (hash) codes to speed up the detection of code clones. If two code blocks are identical, they have the same fingerprints. If two code blocks have identical fingerprints, these blocks do not necessarily have to be identical.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR