Cancellable biometerics featuring with tokenised random number
In this paper we introduce a novel cancellable biometric realisation approach based on the iterated inner products between the tokenised pseudo-random number and the face feature to produce a set of user-specific compact binary code, coined as FaceHash. This approach enables straightforward revocati...
| Main Authors: | TEOH, A, NGO, D |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2209/ http://shdl.mmu.edu.my/2209/1/1523.pdf |
Similar Items
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Cancelable Biometrics Realization With Multispace Random Projections
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
Synchronization Controller To Solve
The Mismatched Sampling Rates For
Acoustic Echo Cancellation
by: Naeem, Adel Nadhem
Published: (2015)
by: Naeem, Adel Nadhem
Published: (2015)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007)
by: Abdul Rashid, Hairul Azhar
Published: (2007)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Screen design: composing with dynamic symmetry
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Proposal of successive interference cancellation scheme in optical code-division multiple access systems
by: Eltaif, Tawfig, et al.
Published: (2008)
by: Eltaif, Tawfig, et al.
Published: (2008)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Probabilistic random projections and speaker verification
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
Analysis of ShuffleNets with limited number of wavelength converters employing deflection routing
by: Castanon, Gerardo, et al.
Published: (2005)
by: Castanon, Gerardo, et al.
Published: (2005)
Analysis on spatial and temporal features of gait kinematics
by: Wan Noorshahida Mohd Isa,
Published: (2005)
by: Wan Noorshahida Mohd Isa,
Published: (2005)
Feature Estraction In Automatic Shape Recognition System.
by: Salam, Rosalina Abdul, et al.
Published: (2004)
by: Salam, Rosalina Abdul, et al.
Published: (2004)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
A Markovian inventory system with random shelf time and back orders
by: CHAKRAVARTHY, S, et al.
Published: (2004)
by: CHAKRAVARTHY, S, et al.
Published: (2004)
Neural network classification of late gamma band electroencephalogram features
by: Ravi, K. V. R., et al.
Published: (2006)
by: Ravi, K. V. R., et al.
Published: (2006)
Color Feature Embedded for Content-based Image Retrieval System.
by: Sumari, Putra, et al.
by: Sumari, Putra, et al.
Analysis Of Feature Reduction Algorithms To Estimate
Human Stress Conditions
by: Arasu, Darshan Babu
Published: (2022)
by: Arasu, Darshan Babu
Published: (2022)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Similar Items
-
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004) -
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004) -
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004) -
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006) -
Cancelable Biometrics Realization With Multispace Random Projections
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)