Integrated authentication model: face verification
| Main Authors: | Hameed, Shihab A., Badurik, Waleed A. |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21435/ http://irep.iium.edu.my/21435/1/Chapter_29.pdf |
Similar Items
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Authentication enhancement for medical data centers
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Introduction to fingerprint verification
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Fundamental to medical data centers
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Vision-based verification of authentic JAKIM halal logo
by: Razali, Sumirah, et al.
Published: (2015)
by: Razali, Sumirah, et al.
Published: (2015)
Face recognition for identify verification in exams locations
by: Ng, Suet Eng
Published: (2023)
by: Ng, Suet Eng
Published: (2023)
Illumination Invariant Pre-Processing Techniques For Face Verification
by: Goh , Yi Zheng
Published: (2009)
by: Goh , Yi Zheng
Published: (2009)
Mobile web for integrated medical emergency model
by: Hameed, Shihab A.
Published: (2010)
by: Hameed, Shihab A.
Published: (2010)
Digital verification and authentication system for test certificates (DVASTC-COVID-19)
by: Rassem, Taha H., et al.
Published: (2021)
by: Rassem, Taha H., et al.
Published: (2021)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Face identification and verification using PCA and LDA
by: Chan, Lih Heng, et al.
Published: (2008)
by: Chan, Lih Heng, et al.
Published: (2008)
Boosted features for face authentication
by: Hanafi, Marsyita, et al.
Published: (2014)
by: Hanafi, Marsyita, et al.
Published: (2014)
A bayesian scene-prior-based deep network model for face verification
by: Wang, H., et al.
Published: (2018)
by: Wang, H., et al.
Published: (2018)
SMS and MMS to enhance an integrated medical emergency model for malaysia
by: Hameed, Shihab A.
Published: (2010)
by: Hameed, Shihab A.
Published: (2010)
Framework for comprehensive Hajj model with ICT
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Modeling and verification of facial expression display mechanism for developing a sociable robot face
by: Benson, D., et al.
Published: (2016)
by: Benson, D., et al.
Published: (2016)
Face authentication system based on FDA and ANN.
by: Mohd Aris, Teh Noranis, et al.
Published: (2010)
by: Mohd Aris, Teh Noranis, et al.
Published: (2010)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Performance evaluation of face verification: a comparative study on different classifiers
by: Nazeer, Shahrin Azuan, et al.
Published: (2007)
by: Nazeer, Shahrin Azuan, et al.
Published: (2007)
Sorted locally confined non-negative matrix factorization in face verification
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Fractal coding of bio-metric image for face authentication
by: Ahadullah, Md
Published: (2021)
by: Ahadullah, Md
Published: (2021)
Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
Face verification without false acceptance / Rosmawati Nordin and Md Jan Nordin
by: Nordin, Rosmawati, et al.
Published: (2010)
by: Nordin, Rosmawati, et al.
Published: (2010)
Regularized kernel discriminant analysis with a robust kernel for face recognition and verification
by: Zafeiriou, Stefanos, et al.
Published: (2012)
by: Zafeiriou, Stefanos, et al.
Published: (2012)
Verification of RISC-V design with Universal Verification Methodology (UVM)
by: Liew, You Hong
Published: (2022)
by: Liew, You Hong
Published: (2022)
Formal verification of RFID system using model verification agent
by: Lockman, Muhammad Tarmizi
Published: (2012)
by: Lockman, Muhammad Tarmizi
Published: (2012)
Verification of i* models using alloy
by: Oluoch Ating'a, Peter, et al.
Published: (2011)
by: Oluoch Ating'a, Peter, et al.
Published: (2011)
Mobile web model to serve healthcare
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Integrated biometric verification system using soft computing approach
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2007)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2007)
Finger vein verification
by: Krishna Veni, Selvan.
Published: (2009)
by: Krishna Veni, Selvan.
Published: (2009)
Fingerprint Identification and Verification with Secure Technology
by: Islam, Md. Rajibul
Published: (2009)
by: Islam, Md. Rajibul
Published: (2009)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Car monitoring, alerting and tracking model: enhancement with mobility and database facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Two-dimensional barcodes for hardcopy document integrity verification
by: Teoh, Chin Yew
Published: (2008)
by: Teoh, Chin Yew
Published: (2008)
Two-factor face authentication: Topographic Independent Component Analysis (TICA) and Multispace Random Projection (MRP)
by: Lee, Gin Chong, et al.
Published: (2009)
by: Lee, Gin Chong, et al.
Published: (2009)
New model for software engineering ethical principles
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
ICT and environmental problem
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Hajj and information technologies: analytical studies
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Similar Items
-
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011) -
Authentication enhancement for medical data centers
by: Hameed, Shihab A., et al.
Published: (2011) -
Introduction to fingerprint verification
by: Hameed, Shihab A., et al.
Published: (2011) -
Fundamental to medical data centers
by: Hameed, Shihab A., et al.
Published: (2011) -
Vision-based verification of authentic JAKIM halal logo
by: Razali, Sumirah, et al.
Published: (2015)