Individual recognition based on human iris using fractal dimension approach
In this paper, we present an approach for individual recognition system based on human iris using the estimation of fractal dimension in feature extraction. In this research, 500 iris images have been collected from different races for system validation. The attempt of capturing iris images in 320x2...
| Main Authors: | Lee, , PS, Ewe, , HT |
|---|---|
| Format: | Article |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2503/ |
Similar Items
An ant colony optimization approach to the degree-constrained minimum spanning tree problem
by: Ewe, HT, et al.
Published: (2005)
by: Ewe, HT, et al.
Published: (2005)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Performance of an ant colony optimization (ACO) algorithm on the dynamic load-balanced clustering problem in ad hoc networks
by: Ho, , CK, et al.
Published: (2005)
by: Ho, , CK, et al.
Published: (2005)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
Classification of alcohol abusers: An intelligent approach
by: Kanna,, PS, et al.
Published: (2005)
by: Kanna,, PS, et al.
Published: (2005)
Enhanced Conditional Generative Adversarial Network For Handling Subject Variability In Human Activity Recognition
by: Jimale, Ali Olow
Published: (2023)
by: Jimale, Ali Olow
Published: (2023)
A hybrid ant colony optimization approach (hACO) for constructing load-balanced clusters
by: Ho, C. K., et al.
Published: (2005)
by: Ho, C. K., et al.
Published: (2005)
Clustering In Fingerprint Recognition System.
by: Ooi, Boon Yaik, et al.
Published: (2004)
by: Ooi, Boon Yaik, et al.
Published: (2004)
An automated palmprint recognition system
by: CONNIE, T, et al.
Published: (2005)
by: CONNIE, T, et al.
Published: (2005)
Recognising individuals using their brain patterns
by: Ravi,, FVR, et al.
Published: (2005)
by: Ravi,, FVR, et al.
Published: (2005)
An Approach to 3-D Object Recognition Using Legendre Moment Invariants
by: Ong, Lee-Yeng, et al.
Published: (2007)
by: Ong, Lee-Yeng, et al.
Published: (2007)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011)
by: Han, Pang Ying, et al.
Published: (2011)
Feature Estraction In Automatic Shape Recognition System.
by: Salam, Rosalina Abdul, et al.
Published: (2004)
by: Salam, Rosalina Abdul, et al.
Published: (2004)
The Scanning Electron Microscope (SEM) assessment system using the autoregressive (AR) technique
by: Sim,, KS, et al.
Published: (2005)
by: Sim,, KS, et al.
Published: (2005)
Regularized locality preserving discriminant embedding for face recognition
by: Pang, Ying Han, et al.
Published: (2012)
by: Pang, Ying Han, et al.
Published: (2012)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Fuzzy modeling based recognition of multi-font numerals
by: Hanmandlu, Madasu, et al.
Published: (2003)
by: Hanmandlu, Madasu, et al.
Published: (2003)
Unconstrained handwritten character recognition based on fuzzy logic
by: Hanmandlu, M
Published: (2003)
by: Hanmandlu, M
Published: (2003)
Associative Memory Based Image and Object Recognition by Quantum Holography
by: Loo, Chu Kiong, et al.
Published: (2004)
by: Loo, Chu Kiong, et al.
Published: (2004)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Comparison between fuzzy and NN method for speech emotion recognition
by: Razak,, AA, et al.
Published: (2005)
by: Razak,, AA, et al.
Published: (2005)
Face recognition using wavelet transform and non-negative matrix factorization
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Ant Colony Optimization Approaches for the Dynamic Load-Balanced Clustering Problem in Ad Hoc Networks
by: Ho, Chin K., et al.
Published: (2007)
by: Ho, Chin K., et al.
Published: (2007)
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
Similar Items
-
An ant colony optimization approach to the degree-constrained minimum spanning tree problem
by: Ewe, HT, et al.
Published: (2005) -
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005) -
Performance of an ant colony optimization (ACO) algorithm on the dynamic load-balanced clustering problem in ad hoc networks
by: Ho, , CK, et al.
Published: (2005) -
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006) -
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)