Two-factor face authentication: Topographic Independent Component Analysis (TICA) and Multispace Random Projection (MRP)
A two-factor face authentication method is presented by using Topographic Independent Component Analysis (TICA) as feature extractor in conjunction with Multispace Random Projection (MRP). Instead of using face alone to access the system, a permissible access requires a pair of genuine face and vali...
| Main Authors: | Lee, Gin Chong, Loo, Chu Kiong, Chockalingam, Letchumanan |
|---|---|
| Format: | Book Section |
| Language: | English |
| Published: |
IEEE
2009
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/1932/ http://shdl.mmu.edu.my/1932/1/Two-factor%20face%20authentication%20%20%20Topographic%20Independent%20Component%20Analysis%20%28TICA%29%20and%20Multispace%20Random%20Projection%20%28MRP%29.pdf |
Similar Items
Cancelable Biometrics Realization With Multispace Random Projections
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
Part-Based And Multispace Random Mapping For Face Recognition
by: Neo, Han Foon
Published: (2005)
by: Neo, Han Foon
Published: (2005)
An integrated approach for head gesture based interface
by: Lee, Gin Chong, et al.
Published: (2012)
by: Lee, Gin Chong, et al.
Published: (2012)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Pengurusan rantaian bekalan menggunakan MRP dan DRP di FAMA
by: Sabarudin, Aswahida
Published: (2005)
by: Sabarudin, Aswahida
Published: (2005)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Artificial Visual System Algorithm applied on Face Recognition and Tracking
by: Lum, Mi-Fern, et al.
Published: (2008)
by: Lum, Mi-Fern, et al.
Published: (2008)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
Automated web pages classification with independent component analysis
by: Sam, Lee Zhi, et al.
Published: (2006)
by: Sam, Lee Zhi, et al.
Published: (2006)
Face authentication system based on FDA and ANN.
by: Mohd Aris, Teh Noranis, et al.
Published: (2010)
by: Mohd Aris, Teh Noranis, et al.
Published: (2010)
Brain Topographic Mapping of Emotions using Computational Cerebellum
by: Yaacob, Hamwira Sakti, et al.
Published: (2013)
by: Yaacob, Hamwira Sakti, et al.
Published: (2013)
Fractal coding of bio-metric image for face authentication
by: Ahadullah, Md
Published: (2021)
by: Ahadullah, Md
Published: (2021)
A Platform Independent Web-Based Data Managementn System For Random Access File
by: Ku, Day Chyi
Published: (2002)
by: Ku, Day Chyi
Published: (2002)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
Independent component analysis for fetal heart rate detection using photosplethysmography
by: Harbawi, Malek M.A., et al.
Published: (2009)
by: Harbawi, Malek M.A., et al.
Published: (2009)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Independent Component Analysis And Rough Fuzzy Based
Approach To Web Usage Mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Mining Usage Web Log Via Independent Component Analysis And Rough Fuzzy
by: Siriporn, Chimphlee, et al.
Published: (2006)
by: Siriporn, Chimphlee, et al.
Published: (2006)
Automated web pages classification with integration of principal component analysis (PCA) and independent component analysis (ICA) as feature reduction
by: Sam, Lee Zhi, et al.
Published: (2006)
by: Sam, Lee Zhi, et al.
Published: (2006)
Derivation of Geodesic Flow Fields and Spectrum in Digital Topographic Basins
by: Lim, Sin Liang, et al.
Published: (2008)
by: Lim, Sin Liang, et al.
Published: (2008)
The master production schedule in MRP for microelectronic manufacturer
by: Cheam, Kai Wen, et al.
Published: (2020)
by: Cheam, Kai Wen, et al.
Published: (2020)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
Multi local feature selection using genetic algorithm for face identification
by: Chu, Kai Chuan
Published: (2007)
by: Chu, Kai Chuan
Published: (2007)
The effects of centella asia tica extract on human periodontal ligament fibroblasts cell line (2630) / Awatef Mohamed Younis
by: Mohamed Younis, Awatef
Published: (2011)
by: Mohamed Younis, Awatef
Published: (2011)
A watermarking technique to improve the security level in face recognition systems: An experiment with Principal Component Analysis (PCA) for face recognition and Discrete Cosine Transform (DCT) for watermarking
by: Isa, Mohd Rizal Mohd Mohd, et al.
Published: (2017)
by: Isa, Mohd Rizal Mohd Mohd, et al.
Published: (2017)
Development of topographic database using global digital terrain models and medium resolution satellite imageries
by: Modhammed Al - Wardi, Ahmed Hamood
Published: (2008)
by: Modhammed Al - Wardi, Ahmed Hamood
Published: (2008)
Material Requirements planning (MRP) practices in Melaka manufacturing companies
by: Chua, Keng Yew.
Published: (2005)
by: Chua, Keng Yew.
Published: (2005)
Quantum Bio-inspired Vision Model on System-on-a-Chip (SoC)
by: Chu Kiong, Loo, et al.
Published: (2008)
by: Chu Kiong, Loo, et al.
Published: (2008)
Quantum Bio-inspired Invariant Object Recognition Model on System-on-a-Chip (SoC)
by: Loo Chu, Kiong, et al.
Published: (2008)
by: Loo Chu, Kiong, et al.
Published: (2008)
The topographic connectome
by: Jbabdi, Saad, et al.
Published: (2013)
by: Jbabdi, Saad, et al.
Published: (2013)
Boosted features for face authentication
by: Hanafi, Marsyita, et al.
Published: (2014)
by: Hanafi, Marsyita, et al.
Published: (2014)
Associative Memory Based Image and Object Recognition by Quantum Holography
by: Loo, Chu Kiong, et al.
Published: (2004)
by: Loo, Chu Kiong, et al.
Published: (2004)
Autonomous and deterministic probabilistic neural network using global k-means
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Similar Items
-
Cancelable Biometrics Realization With Multispace Random Projections
by: Teoh, Andrew Beng Jin, et al.
Published: (2007) -
Part-Based And Multispace Random Mapping For Face Recognition
by: Neo, Han Foon
Published: (2005) -
An integrated approach for head gesture based interface
by: Lee, Gin Chong, et al.
Published: (2012) -
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006) -
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)