Multibiometric systems and template security survey
Multimodal biometric systems are capable of utilizing, more than one physiological or behavioral characteristic for enrolment either in verification or identification mode, It is generally believed that several biometric sources usually compensate for the weaknesses of single biometric fusion techni...
| Main Authors: | Khalaf, Emad Taha, Norrozila, Sulaiman |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
JSRAD
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21530/ http://umpir.ump.edu.my/id/eprint/21530/1/Multibiometric%20systems%20and%20template%20security%20survey.pdf |
Similar Items
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Multibiometric systems based verification technique
by: Anwar, Farhat, et al.
Published: (2009)
by: Anwar, Farhat, et al.
Published: (2009)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
Efficient classifying and indexing for large iris database based on enhanced clustering method
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Effect of Different Error Correction Algorithms on Video Quality over Heterogeneous Networks
by: Osamah, I. Khalaf, et al.
Published: (2015)
by: Osamah, I. Khalaf, et al.
Published: (2015)
Template matching analysis using neural network for mobile iris recognition system
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
A Survey of multi-biometrics and fusion levels
by: Taha, Khalaf Emad, et al.
Published: (2015)
by: Taha, Khalaf Emad, et al.
Published: (2015)
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
by: Lai, Chor Kiew, et al.
Published: (2021)
by: Lai, Chor Kiew, et al.
Published: (2021)
A Study and Implementation of a Template-Based Online Advertisements Management System (AMS) for INTI University Education Purpose
by: Chin, Yun Onn
Published: (2010)
by: Chin, Yun Onn
Published: (2010)
Intuitive Content Management System to Preferences Template Throughout Data Collection by using Data Mining Classification of Prediction Method
by: Chan, Chung Hoong, et al.
Published: (2016)
by: Chan, Chung Hoong, et al.
Published: (2016)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Effect of Using Different QoS Parameters in Performance of AODV, DSR, DSDV AND OLSR Routing Protocols In MANET
by: Norrozila, Sulaiman, et al.
Published: (2014)
by: Norrozila, Sulaiman, et al.
Published: (2014)
A Review on Minutiae Extraction of Fingerprint
by: Rozita, Mohd Yusof, et al.
Published: (2013)
by: Rozita, Mohd Yusof, et al.
Published: (2013)
A Survey on Internet Security Threat in Malaysia’s Internet Banking System and Suggestion Solutions
by: Mohd Hariz, Ibrahim, et al.
Published: (2018)
by: Mohd Hariz, Ibrahim, et al.
Published: (2018)
Homepage template for academic / Sho Hock Chuan
by: Sho, Hock Chuan
Published: (2002)
by: Sho, Hock Chuan
Published: (2002)
Assessing Usability Elements For A Website of Higher Education Website
by: Nur Sukinah, Aziz, et al.
Published: (2013)
by: Nur Sukinah, Aziz, et al.
Published: (2013)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
A novel normal parameter reduction algorithm of soft sets
by: Ma, Xiuqin, et al.
Published: (2010)
by: Ma, Xiuqin, et al.
Published: (2010)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
New E-Learning Framework Based On Patterns And Constructive Templates Using Instructional And Learning Strategies
by: Jegan, Thayanithy
Published: (2006)
by: Jegan, Thayanithy
Published: (2006)
A Survey of Stochastic processes in Wireless Sensor Network: a Power Management Prospective
by: Ul haq, Riaz, et al.
Published: (2013)
by: Ul haq, Riaz, et al.
Published: (2013)
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
XRecursive: An efficient method to store and query XML documents
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Secure student attendance system based on geo-location and QR code technologies
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
Android based smart security systems using internet of things (IoT) and firebase
by: Harvent Rau, Mogana Ravu
Published: (2019)
by: Harvent Rau, Mogana Ravu
Published: (2019)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Security enhancement of dynamic signature by utilizing local features with individual threshold
by: Suryanti, Awang, et al.
Published: (2018)
by: Suryanti, Awang, et al.
Published: (2018)
Similar Items
-
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015) -
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015) -
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016) -
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015) -
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)