Multibiometric systems based verification technique
Multibiometric systems represent the fusion of two or more unimodal biometric systems. Such systems are expected to be more reliable due to the presence of multiple independent pieces of evidence. Since security is one of the important concerns of twenty first century, multibiometric systems can pla...
| Main Authors: | Anwar, Farhat, Rahman, Md. Arafatur, Azad, Md. Saiful |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
EuroJournals Publishing, Inc.
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/2774/ http://irep.iium.edu.my/2774/1/ejsr_34_2_13.pdf |
Similar Items
Multibiometric based personal verification using the fusion of hand and finger stripe geometry
by: Anwar, Farhat, et al.
Published: (2010)
by: Anwar, Farhat, et al.
Published: (2010)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
An efficient technique for human verification using finger stripes geometry
by: Rahman, Md. Arafatur, et al.
Published: (2007)
by: Rahman, Md. Arafatur, et al.
Published: (2007)
A Store-and-delivery Based MAC Protocol for Air-ground Collaborative Wireless Networks for Precision Agriculture
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
An offline signature verification technique using pixels intensity levels
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Crowd Associated Network: Exploiting over a Smart Garbage Management System
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
TeKET: a tree-based unsupervised keyphrase extraction technique
by: Rabby, Gollam, et al.
Published: (2020)
by: Rabby, Gollam, et al.
Published: (2020)
Verification of scholars and references in Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
IoT Enabled Relay Network for Designing An Energy Efficient Highway Lighting System
by: Muhammad Adib, Abid, et al.
Published: (2016)
by: Muhammad Adib, Abid, et al.
Published: (2016)
Raising Fairness Issue of Vehicle Routing Problem
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
Medical certificate verification system using QR code
by: Lai, Chong Lan
Published: (2014)
by: Lai, Chong Lan
Published: (2014)
Online signature verification based on dynamic feature discriminators
by: Omar, Nazaruddin
Published: (2009)
by: Omar, Nazaruddin
Published: (2009)
Dynamic signature verification based on hybrid wavelet-Fourier transform
by: Khoh, W. H., et al.
Published: (2014)
by: Khoh, W. H., et al.
Published: (2014)
Driver identification and driver's emotion verification using KDE and MLP neural networks
by: Md Nor, Norzaliza, et al.
Published: (2010)
by: Md Nor, Norzaliza, et al.
Published: (2010)
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
SVD-BASED SIGNATURE VERIFICATION TECHNIQUE USING DATA GLOVE
by: KAMEL, NIDAL S., et al.
Published: (2008)
by: KAMEL, NIDAL S., et al.
Published: (2008)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Driver identification and driver's emotion verification using KDE and MLP neural networks
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
Simple and efficient multibiometric technique for subject recognition using multilead electrocardiogram signal
by: Sidek, Khairul Azami, et al.
Published: (2013)
by: Sidek, Khairul Azami, et al.
Published: (2013)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
IoT Enabled Intra-Vehicular Communication for Designing A Smart Car
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
A connection probability model for communications networks under regional failures
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Two-dimensional barcodes for hardcopy document integrity verification
by: Teoh, Chin Yew
Published: (2008)
by: Teoh, Chin Yew
Published: (2008)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Modeling activity diagram to colored petri net for validation and verification based on non functional parameters
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
Comparative Study And Analysis Of Quality Based
Multibiometric Technique Using Fuzzy Inference System
by: Hamid, Lydia Abdul
Published: (2013)
by: Hamid, Lydia Abdul
Published: (2013)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
2D CLAFIC Subspace Technique in Probabilistic Speaker Verification
by: Chong, L. Y., et al.
Published: (2007)
by: Chong, L. Y., et al.
Published: (2007)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Performance analysis of on-demand routing protocols in wireless mesh networks
by: Rahman, Md. Arafatur, et al.
Published: (2009)
by: Rahman, Md. Arafatur, et al.
Published: (2009)
Glove-Based Approach to Online Signature Verification
by: Kamel, N.S., et al.
Published: (2008)
by: Kamel, N.S., et al.
Published: (2008)
Keyphrases Concentrated Area Identification from Academic Articles as Feature of Keyphrase Extraction: A New Unsupervised Approach
by: Miah, Mohammad Badrul Alam, et al.
Published: (2022)
by: Miah, Mohammad Badrul Alam, et al.
Published: (2022)
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Development of an interactive teaching-learning technique of mathematics based on the EIF technique for the primary schools
by: Ahmad, Ab. Rahman, et al.
Published: (2004)
by: Ahmad, Ab. Rahman, et al.
Published: (2004)
An efficient fingerprint verification system using integrated wavelet and Fourier–Mellin invariant transform
by: Jin, A
Published: (2004)
by: Jin, A
Published: (2004)
Similar Items
-
Multibiometric based personal verification using the fusion of hand and finger stripe geometry
by: Anwar, Farhat, et al.
Published: (2010) -
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015) -
An efficient technique for human verification using finger stripes geometry
by: Rahman, Md. Arafatur, et al.
Published: (2007) -
A Store-and-delivery Based MAC Protocol for Air-ground Collaborative Wireless Networks for Precision Agriculture
by: Azad, Saiful, et al.
Published: (2016) -
An offline signature verification technique using pixels intensity levels
by: Shah, Abdul Salam, et al.
Published: (2016)