Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
This paper presents a novel two-factor authenticator which hashes tokenized random data and moment based palmprint features to produce a set of private binary string, coined as Discrete-Hashing code. This novel technique requires two factors (random number + authorized biometrics) credentials in ord...
| Main Authors: | Pang, Ying Han, Ngo, David Chek Ling, Teoh, Andrew Ben Jin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer Berlin Heidelberg
2004
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2518/ http://shdl.mmu.edu.my/2518/1/Personal%20Authenticator%20on%20the%20Basis%20of%20Two-Factors%20%20%20Palmprint%20Features%20and%20Tokenized%20Random%20Data.pdf |
Similar Items
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
An automated palmprint recognition system
by: CONNIE, T, et al.
Published: (2005)
by: CONNIE, T, et al.
Published: (2005)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Palmprint Recognition For Personal Identification System
by: Tee , Connie
Published: (2004)
by: Tee , Connie
Published: (2004)
Cohesive token passing algorithm utilizing software agents
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024)
by: Sharath, M.S., et al.
Published: (2024)
Probabilistic random projections and speaker verification
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
by: Woo, Jan Yin
Published: (2023)
by: Woo, Jan Yin
Published: (2023)
Enhanced pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
A Study on Non-Fungible Tokens Marketplace for Secure Management
by: Rishabh, Singh, et al.
Published: (2024)
by: Rishabh, Singh, et al.
Published: (2024)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Token Based Authentication Method Using Bluetooth Enabled Mobile Phone
by: Abdel Hameed Mokhtar, Rania
Published: (2004)
by: Abdel Hameed Mokhtar, Rania
Published: (2004)
Feature Selection and Radial Basis Function Network for Parkinson Disease Classification
by: Ibrahim, Ashraf Osman, et al.
Published: (2017)
by: Ibrahim, Ashraf Osman, et al.
Published: (2017)
Digital camera based fingerprint recognition
by: Hiew, Bee Yan, et al.
Published: (2007)
by: Hiew, Bee Yan, et al.
Published: (2007)
Touch-less Fingerprint Recognition System
by: Hiew, Bee Yan, et al.
Published: (2007)
by: Hiew, Bee Yan, et al.
Published: (2007)
Palmprint identification protocol
by: Kadian, Siti Atikah
Published: (2016)
by: Kadian, Siti Atikah
Published: (2016)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004)
by: Chia , Kai Yan
Published: (2004)
Token of courage
by: The Star
Published: (2013)
by: The Star
Published: (2013)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Wireless controller area networking using token frame scheme
by: Ng, Wei Lun
Published: (2012)
by: Ng, Wei Lun
Published: (2012)
Cancelable Biometrics Realization With Multispace Random Projections
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
Fingerprint images segmentation using two stages coarse to fine discrimination technique
by: Ong, Teng Sian, et al.
Published: (2003)
by: Ong, Teng Sian, et al.
Published: (2003)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
A Study on Optimal Face Ratio for Recognition Using Part-based Feature Extractor
by: Neo, Han Foon, et al.
Published: (2007)
by: Neo, Han Foon, et al.
Published: (2007)
Design and development of automated token assembly system
by: Khaw, Jia Ying
Published: (2021)
by: Khaw, Jia Ying
Published: (2021)
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011)
by: Han, Pang Ying, et al.
Published: (2011)
Regularized locality preserving discriminant embedding for face recognition
by: Pang, Ying Han, et al.
Published: (2012)
by: Pang, Ying Han, et al.
Published: (2012)
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
Development of palmprint based biometric system
by: Rotinwa-Akinbile, M. A., et al.
Published: (2011)
by: Rotinwa-Akinbile, M. A., et al.
Published: (2011)
A novel palmprint segmentation technique
by: Rotinwa-Akinbile, M. O., et al.
Published: (2011)
by: Rotinwa-Akinbile, M. O., et al.
Published: (2011)
Similar Items
-
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007) -
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006) -
An automated palmprint recognition system
by: CONNIE, T, et al.
Published: (2005) -
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005) -
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)