Iris template protection based on enhanced hill cipher
Biometric is uses to identify authorized person based on specific physiological or behavioral features. Template protection is a crucial requirement when designing an authentication system, where the template could be modified by attacker. Hill Cipher is a block cipher and symmetric key algorithm it...
| Main Authors: | Khalaf, Emad Taha, Mohammed, Muamer N., Norrozila, Sulaiman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
ACM
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21523/ http://umpir.ump.edu.my/id/eprint/21523/1/Iris%20template%20protection%20based%20on%20enhanced%20hill%20cipher1.pdf |
Similar Items
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Efficient classifying and indexing for large iris database based on enhanced clustering method
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Template matching analysis using neural network for mobile iris recognition system
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
by: Khalaf, Emad Taha
Published: (2019)
by: Khalaf, Emad Taha
Published: (2019)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018)
by: Mohd Lokman, Syiham, et al.
Published: (2018)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Effect of Using Different QoS Parameters in Performance of AODV, DSR, DSDV AND OLSR Routing Protocols In MANET
by: Norrozila, Sulaiman, et al.
Published: (2014)
by: Norrozila, Sulaiman, et al.
Published: (2014)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs
by: Ayoob, Ayoob A., et al.
Published: (2014)
by: Ayoob, Ayoob A., et al.
Published: (2014)
Analysis on texture and colour based features of periocular for low resolution colour iris images
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
by: Abidin, A.F.A., et al.
Published: (2011)
by: Abidin, A.F.A., et al.
Published: (2011)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Pairwise testing tools based on hill climbing algorithm (PTCA)
by: Lim, Seng Kee
Published: (2014)
by: Lim, Seng Kee
Published: (2014)
Enhancement the video quality forwarding Using Receiver-Based Approach(URBA) in Vehicular Ad-Hoc Network
by: Hammood, Omar A., et al.
Published: (2017)
by: Hammood, Omar A., et al.
Published: (2017)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Visual execution of caesar cipher methods and its application
by: Nur Syafiqa, Ismail
Published: (2014)
by: Nur Syafiqa, Ismail
Published: (2014)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Template matching techniques for iris recognition system
by: Tania, Umme T., et al.
Published: (2014)
by: Tania, Umme T., et al.
Published: (2014)
Effect of Different Error Correction Algorithms on Video Quality over Heterogeneous Networks
by: Osamah, I. Khalaf, et al.
Published: (2015)
by: Osamah, I. Khalaf, et al.
Published: (2015)
Late Acceptance Hill Climbing Based Strategy for Test Redundancy Reduction and Prioritization
by: Rohani, Abu Bakar, et al.
Published: (2015)
by: Rohani, Abu Bakar, et al.
Published: (2015)
Test suite generation based on hybrid flower pollination algorithm and hill climbing
by: Nasser, Abdullah B., et al.
Published: (2021)
by: Nasser, Abdullah B., et al.
Published: (2021)
Indexing-First-One Hashing based Cancellable Iris Template Generation
by: Lai, Yen Lung
Published: (2017)
by: Lai, Yen Lung
Published: (2017)
Solving Examination Timetabling Problem using Partial Exam Assignment with Hill Climbing Search
by: Ashis Kumar, Mandal, et al.
Published: (2015)
by: Ashis Kumar, Mandal, et al.
Published: (2015)
Combination of Graph Heuristic with Hill Climbing Search for Solving Capacitated Examination Timetabling Problem
by: Ashis Kumar, Mandal, et al.
Published: (2015)
by: Ashis Kumar, Mandal, et al.
Published: (2015)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Comparative Benchmarking Of Constraints T-Way Test Generation Strategy Based On Late Acceptance Hill Climbing Algorithm
by: Kamal Z., Zamli, et al.
Published: (2015)
by: Kamal Z., Zamli, et al.
Published: (2015)
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
by: Lai, Chor Kiew, et al.
Published: (2021)
by: Lai, Chor Kiew, et al.
Published: (2021)
Tumor detection based on enhanced hill climbing method
by: Yaseen, Ali Taha
Published: (2010)
by: Yaseen, Ali Taha
Published: (2010)
Technology Review: Image Enhancement, Feature Extraction and Template Protection of a Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2010)
by: Islam, Md. Rajibul, et al.
Published: (2010)
Scheduling academic procession in UMP convocation ceremony using hill climbing
by: Nazreen Umeera, Dzulkifli
Published: (2019)
by: Nazreen Umeera, Dzulkifli
Published: (2019)
Fusion iris and periocular recognitions in non-cooperative environment
by: Anis Farihan, Mat Raffei, et al.
Published: (2019)
by: Anis Farihan, Mat Raffei, et al.
Published: (2019)
Similar Items
-
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018) -
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015) -
Efficient classifying and indexing for large iris database based on enhanced clustering method
by: Khalaf, Emad Taha, et al.
Published: (2018) -
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015) -
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)