Efficient classifying and indexing for large iris database based on enhanced clustering method
Explosive growth in the volume of stored biometric data has resulted in classification and indexing becoming important operations in image database systems. A new method is presented in this paper to extract the most relevant features of iris biometric images for indexing the iris database. Three tr...
| Main Authors: | Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Khalaf, Ahmad Taha |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
ICI Bucharest
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21528/ http://umpir.ump.edu.my/id/eprint/21528/1/Efficient%20classifying%20and%20indexing%20for%20large%20iris%20database.pdf |
Similar Items
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
by: Khalaf, Emad Taha
Published: (2019)
by: Khalaf, Emad Taha
Published: (2019)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Survival analysis for the identified cancer gene subtype from the co-clustering algorithm
by: Logenthiran, Machap, et al.
Published: (2022)
by: Logenthiran, Machap, et al.
Published: (2022)
A Survey of multi-biometrics and fusion levels
by: Taha, Khalaf Emad, et al.
Published: (2015)
by: Taha, Khalaf Emad, et al.
Published: (2015)
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
by: Khalaf, Osamah Ibrahem
Published: (2017)
by: Khalaf, Osamah Ibrahem
Published: (2017)
Dynamic Load Balancing Model Based on Server Status (DLBS) for Green Computing
by: Hasan, Raed Abdulkareem, et al.
Published: (2018)
by: Hasan, Raed Abdulkareem, et al.
Published: (2018)
Efficient Mapping XML DTD to Relational Database
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
Multidimensional Cluster Sampling View on Large Databases for Approximate Query Processing.
by: Inoue, Tomohiro, et al.
Published: (2015)
by: Inoue, Tomohiro, et al.
Published: (2015)
An improved image compression technique using large adaptive DCT psychovisual thresholds
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Indexing-First-One Hashing based Cancellable Iris Template Generation
by: Lai, Yen Lung
Published: (2017)
by: Lai, Yen Lung
Published: (2017)
Techniques for improving clustering and association rules mining from very large transactional databases
by: Li, Yanrong
Published: (2009)
by: Li, Yanrong
Published: (2009)
Noncircular iris segmentation based on weighted adaptive hough transform using smartphone database
by: Amjed, Noor, et al.
Published: (2018)
by: Amjed, Noor, et al.
Published: (2018)
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
Effect of Using Different QoS Parameters in Performance of AODV, DSR, DSDV AND OLSR Routing Protocols In MANET
by: Norrozila, Sulaiman, et al.
Published: (2014)
by: Norrozila, Sulaiman, et al.
Published: (2014)
Template matching analysis using neural network for mobile iris recognition system
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
Iris Segmentation
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
Iris segmentation
by: Mat Raffei, Anis Farihan, et al.
Published: (2018)
by: Mat Raffei, Anis Farihan, et al.
Published: (2018)
Feature Extraction Methods On A Partial Section Of The Iris Region For Iris Classification
by: Ali, Ahmad Nazri
Published: (2019)
by: Ali, Ahmad Nazri
Published: (2019)
An Ensemble of Enhanced Fuzzy Min Max Neural Networks for Data Classification
by: Mohammed, Mohammed Falah, et al.
Published: (2017)
by: Mohammed, Mohammed Falah, et al.
Published: (2017)
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
by: Zailani, Abdullah, et al.
Published: (2012)
by: Zailani, Abdullah, et al.
Published: (2012)
Analysis on texture and colour based features of periocular for low resolution colour iris images
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
Fusion iris and periocular recognitions in non-cooperative environment
by: Anis Farihan, Mat Raffei, et al.
Published: (2019)
by: Anis Farihan, Mat Raffei, et al.
Published: (2019)
Intelligent mining multi dimensional association rules from large inconsistent databases.
by: Defit, Sarjon, et al.
Published: (2003)
by: Defit, Sarjon, et al.
Published: (2003)
Towards optimal search: a modified secant method for efficient search in a big database
by: M. Nomani, Kabir, et al.
Published: (2018)
by: M. Nomani, Kabir, et al.
Published: (2018)
Identifying skylines in cloud databases with incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
EFP-M2: Efficient model for mining frequent patterns in transactional database
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
Autonomous and deterministic clustering for evidence-theoretic classifier
by: Poh, , Chen Li, et al.
Published: (2006)
by: Poh, , Chen Li, et al.
Published: (2006)
The importance of data classification using machine learning methods in microarray data
by: Jaber, Aws Naser, et al.
Published: (2021)
by: Jaber, Aws Naser, et al.
Published: (2021)
An efficient iris image thresholding based on binarization threshold in black hole search method
by: Danlami, Muktar, et al.
Published: (2018)
by: Danlami, Muktar, et al.
Published: (2018)
Similar Items
-
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018) -
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016) -
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
by: Khalaf, Emad Taha
Published: (2019) -
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013) -
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)