Personalised cryptographic key generation based on FaceHashing
Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very Long passwords that are not required to be remembered but are...
| Main Author: | TEOH, A |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2438/ http://shdl.mmu.edu.my/2438/1/1710.pdf |
Similar Items
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024)
by: Abba, Abubakar
Published: (2024)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
by: Mahiddin , Normadiah
Published: (2009)
by: Mahiddin , Normadiah
Published: (2009)
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006)
by: TEOH, A, et al.
Published: (2006)
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007)
by: Jaber, Khalid, et al.
Published: (2007)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014)
by: Jahani, Shahram, et al.
Published: (2014)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011)
by: Han, Pang Ying, et al.
Published: (2011)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
by: Wai Kuan, Yip, et al.
Published: (2007)
by: Wai Kuan, Yip, et al.
Published: (2007)
Regularized locality preserving discriminant embedding for face recognition
by: Pang, Ying Han, et al.
Published: (2012)
by: Pang, Ying Han, et al.
Published: (2012)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
Wavelet based illumination invariant preprocessing in face recognition
by: Y. Z., Goh, et al.
Published: (2008)
by: Y. Z., Goh, et al.
Published: (2008)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
A Study on Optimal Face Ratio for Recognition Using Part-based Feature Extractor
by: Neo, Han Foon, et al.
Published: (2007)
by: Neo, Han Foon, et al.
Published: (2007)
Similar Items
-
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004) -
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003) -
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006) -
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005) -
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)