Iris authentication using privatized advanced correlation filter
his paper proposes a private biometrics formulation which is based on the concealment of random kernel and the iris images to synthesize a minimum average correlation energy (MACE) filter for iris authentication. Specifically, we multiply training images with the user-specific random kernel in frequ...
| Main Authors: | Chong, , SC, Teoh, , ABJ, Ngo, , DCL |
|---|---|
| Format: | Article |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2025/ |
Similar Items
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Machinery fault diagnosis using advanced correlation filters
by: Loo, C. K., et al.
Published: (2007)
by: Loo, C. K., et al.
Published: (2007)
Machinery fault diagnosis using advanced correlation filters
by: Loo, C. K., et al.
Published: (2007)
by: Loo, C. K., et al.
Published: (2007)
Why and how should design patterns be formalized?
by: Taibi,, T, et al.
Published: (2001)
by: Taibi,, T, et al.
Published: (2001)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004)
by: Lee, , PS, et al.
Published: (2004)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Leave-one-out authentication of persons using 40 Hz EEG oscillations
by: Ravi, , KVR, et al.
Published: (2005)
by: Ravi, , KVR, et al.
Published: (2005)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Technology Review: Image Enhancement, Feature Extraction and Template Protection of a Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2010)
by: Islam, Md. Rajibul, et al.
Published: (2010)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Similar Items
-
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004) -
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004) -
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006) -
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003) -
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)