A survey of multi-biometrics and fusion levels
The verification of the identities of individuals is becoming an increasingly important requirement in a variety of applications based on specific physiological or behavioral features. Most biometric systems that are currently in operation usually utilize a single biometric trait which called Uni-bi...
| Main Authors: | Khalaf, Emad Taha, Norrozila, Sulaiman |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Informatics Publishing Limited
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21521/ http://umpir.ump.edu.my/id/eprint/21521/1/A%20survey%20of%20multi-biometrics%20and%20fusion%20levels.pdf |
Similar Items
A Survey of multi-biometrics and fusion levels
by: Taha, Khalaf Emad, et al.
Published: (2015)
by: Taha, Khalaf Emad, et al.
Published: (2015)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
by: Khalaf, Emad Taha
Published: (2019)
by: Khalaf, Emad Taha
Published: (2019)
Feature level fusion of face and signature using a modified feature selection technique
by: Suryanti, Awang, et al.
Published: (2013)
by: Suryanti, Awang, et al.
Published: (2013)
Efficient classifying and indexing for large iris database based on enhanced clustering method
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Effect of Different Error Correction Algorithms on Video Quality over Heterogeneous Networks
by: Osamah, I. Khalaf, et al.
Published: (2015)
by: Osamah, I. Khalaf, et al.
Published: (2015)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
Fusion of LSB and DWT biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
BioHealthCloud: A Biometric Worldwide Public Cloud Infrastructure
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme
by: Teoh,, A, et al.
Published: (2004)
by: Teoh,, A, et al.
Published: (2004)
A Review on Minutiae Extraction of Fingerprint
by: Rozita, Mohd Yusof, et al.
Published: (2013)
by: Rozita, Mohd Yusof, et al.
Published: (2013)
Comparison of accuracy performance based on normalization techniques for the features fusion of face and online signature
by: Suryanti, Awang, et al.
Published: (2017)
by: Suryanti, Awang, et al.
Published: (2017)
Effect of Using Different QoS Parameters in Performance of AODV, DSR, DSDV AND OLSR Routing Protocols In MANET
by: Norrozila, Sulaiman, et al.
Published: (2014)
by: Norrozila, Sulaiman, et al.
Published: (2014)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Multi-frame super-resolution: a survey
by: Khattab, Mahmoud, et al.
Published: (2019)
by: Khattab, Mahmoud, et al.
Published: (2019)
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015)
by: Suryanti, Awang
Published: (2015)
Assessing Usability Elements For A Website of Higher Education Website
by: Nur Sukinah, Aziz, et al.
Published: (2013)
by: Nur Sukinah, Aziz, et al.
Published: (2013)
Analyzing the periocular biometric-based access control systems
by: Mon, Chit Su, et al.
Published: (2020)
by: Mon, Chit Su, et al.
Published: (2020)
A novel normal parameter reduction algorithm of soft sets
by: Ma, Xiuqin, et al.
Published: (2010)
by: Ma, Xiuqin, et al.
Published: (2010)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
A Survey of Stochastic processes in Wireless Sensor Network: a Power Management Prospective
by: Ul haq, Riaz, et al.
Published: (2013)
by: Ul haq, Riaz, et al.
Published: (2013)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Contractor And Visitor Management System Using Biometric Recognition (Vizika System)
by: Nur Alia Hidayah, Rohaya Udin
Published: (2023)
by: Nur Alia Hidayah, Rohaya Udin
Published: (2023)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Texture-based feature using multi-blocks gray level co-occurrence matrix for ethnicity identification
by: Mohd Zamri, Osman, et al.
Published: (2020)
by: Mohd Zamri, Osman, et al.
Published: (2020)
XRecursive: An efficient method to store and query XML documents
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
A Survey of UML Tools
by: Weng, Jie Thong, et al.
Published: (2015)
by: Weng, Jie Thong, et al.
Published: (2015)
A survey of arabic text mining
by: Salloum, Said A., et al.
Published: (2017)
by: Salloum, Said A., et al.
Published: (2017)
Efficient Mapping XML DTD to Relational Database
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs
by: Ayoob, Ayoob A., et al.
Published: (2014)
by: Ayoob, Ayoob A., et al.
Published: (2014)
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
Similar Items
-
A Survey of multi-biometrics and fusion levels
by: Taha, Khalaf Emad, et al.
Published: (2015) -
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015) -
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015) -
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015) -
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)