A new secure storing system for biometric templates based encryption and concealment
The security of templates is the critical part of biometric system and one of the most crucial issues in any proposed system. In fact, features such as voice, face, fingerprints and many others can be covertly acquired or stolen by an attacker and misused. Therefore, storing biometric templates a se...
| Main Authors: | Khalaf, Emad Taha, Norrozila, Sulaiman |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Network for Scientific Information
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21531/ http://umpir.ump.edu.my/id/eprint/21531/1/A%20new%20secure%20storing%20system%20for%20biometric%20templates%20based%20encryption%20and%20concealment.pdf |
Similar Items
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
A Survey of multi-biometrics and fusion levels
by: Taha, Khalaf Emad, et al.
Published: (2015)
by: Taha, Khalaf Emad, et al.
Published: (2015)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
XRecursive: An efficient method to store and query XML documents
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
by: Khalaf, Emad Taha
Published: (2019)
by: Khalaf, Emad Taha
Published: (2019)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Efficient classifying and indexing for large iris database based on enhanced clustering method
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Study On The Template Protection Technique In Biometric Authentication System
by: Ong, Thian Song
Published: (2008)
by: Ong, Thian Song
Published: (2008)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
New E-Learning Framework Based On Patterns And Constructive Templates Using Instructional And Learning Strategies
by: Jegan, Thayanithy
Published: (2006)
by: Jegan, Thayanithy
Published: (2006)
Implementation of fingerprint biometric template system in embedded software design
by: Zakaria, Nor Farizan
Published: (2006)
by: Zakaria, Nor Farizan
Published: (2006)
A Defensive Evidence Model: An Approach of Security Model for Storing Digital Evidence in Network Forensics
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
Analyzing the periocular biometric-based access control systems
by: Mon, Chit Su, et al.
Published: (2020)
by: Mon, Chit Su, et al.
Published: (2020)
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
by: Lai, Chor Kiew, et al.
Published: (2021)
by: Lai, Chor Kiew, et al.
Published: (2021)
Storing and query XML document using relation database
by: Siti Hajar, Sulaiman
Published: (2015)
by: Siti Hajar, Sulaiman
Published: (2015)
Effect of Different Error Correction Algorithms on Video Quality over Heterogeneous Networks
by: Osamah, I. Khalaf, et al.
Published: (2015)
by: Osamah, I. Khalaf, et al.
Published: (2015)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014)
by: Ong, T. S., et al.
Published: (2014)
A hybrid cryptosystem for biometric authentication and template protection
by: Jegede, Abayomi Joshua
Published: (2017)
by: Jegede, Abayomi Joshua
Published: (2017)
Template matching analysis using neural network for mobile iris recognition system
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
A Study and Implementation of a Template-Based Online Advertisements Management System (AMS) for INTI University Education Purpose
by: Chin, Yun Onn
Published: (2010)
by: Chin, Yun Onn
Published: (2010)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014)
by: Moh, Heng Huong
Published: (2014)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
Depth error concealment based on decision making
by: Ranjbari, Mohamadreza, et al.
Published: (2013)
by: Ranjbari, Mohamadreza, et al.
Published: (2013)
Similar Items
-
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015) -
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015) -
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015) -
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016) -
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)