Postprocessing algorithm for security features extraction
One of the issues of fingerprint recognition is finding minutiae or ridges, which involves deciding whether the pixel evaluated is a valid minutiae (ridge ending or ridge bifurcation) or not. Usually, the minutiae are detected in the thinned image which contains a large number of false minutiae and...
| Main Authors: | Rozita, Mohd Yusof, Norrozila, Sulaiman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26996/ http://umpir.ump.edu.my/id/eprint/26996/1/Postprocessing%20algorithm%20for%20security%20features%20extraction.pdf |
Similar Items
A Review on Minutiae Extraction of Fingerprint
by: Rozita, Mohd Yusof, et al.
Published: (2013)
by: Rozita, Mohd Yusof, et al.
Published: (2013)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Security enhancement of dynamic signature by utilizing local features with individual threshold
by: Suryanti, Awang, et al.
Published: (2018)
by: Suryanti, Awang, et al.
Published: (2018)
A novel normal parameter reduction algorithm of soft sets
by: Ma, Xiuqin, et al.
Published: (2010)
by: Ma, Xiuqin, et al.
Published: (2010)
Effect of Different Error Correction Algorithms on Video Quality over Heterogeneous Networks
by: Osamah, I. Khalaf, et al.
Published: (2015)
by: Osamah, I. Khalaf, et al.
Published: (2015)
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Feature extraction analysis, techniques and issues in vehicle types recognition
by: Nor'Aqilah, Misman, et al.
Published: (2018)
by: Nor'Aqilah, Misman, et al.
Published: (2018)
Automatic text summarization using feature based fuzzy extraction
by: Suanmali, Ladda, et al.
Published: (2008)
by: Suanmali, Ladda, et al.
Published: (2008)
An Improved Algorithm for Prediction of Young's
Modulus of Wood Plastic Composites
by: Gupta, Ritu, et al.
Published: (2013)
by: Gupta, Ritu, et al.
Published: (2013)
Facial image retrieval on semantic features using adaptive mean genetic algorithm
by: Shnan, Marwan Ali, et al.
Published: (2019)
by: Shnan, Marwan Ali, et al.
Published: (2019)
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015)
by: Suryanti, Awang
Published: (2015)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Feature level fusion of face and signature using a modified feature selection technique
by: Suryanti, Awang, et al.
Published: (2013)
by: Suryanti, Awang, et al.
Published: (2013)
Basic emotions varification and identifiction using Gaussian Mixture Model (GMM) features extraction
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Assessing Usability Elements For A Website of Higher Education Website
by: Nur Sukinah, Aziz, et al.
Published: (2013)
by: Nur Sukinah, Aziz, et al.
Published: (2013)
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
Region-Based Distance Analysis of Keyphrases: A New Unsupervised Method for Extracting Keyphrases Feature from Articles
by: Miah, Mohammad Badrul Alam, et al.
Published: (2021)
by: Miah, Mohammad Badrul Alam, et al.
Published: (2021)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Feature extraction approaches from natural language requirements for reuse in software product lines: a systematic literature review
by: Bakar, Noor Hasrina, et al.
Published: (2015)
by: Bakar, Noor Hasrina, et al.
Published: (2015)
Evaluation and Comparative Analysis of Feature Extraction Methods on
Image Data to increase the Accuracy of Classification Algorithms
by: Rachmad, Iqbal, et al.
Published: (2024)
by: Rachmad, Iqbal, et al.
Published: (2024)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
XRecursive: An efficient method to store and query XML documents
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Face Recognition For Home Security System Using Hybrid Fisher Linear Discriminant Algorithm
by: Zhi, Chua Min Zhi
Published: (2009)
by: Zhi, Chua Min Zhi
Published: (2009)
Comparison of accuracy performance based on normalization techniques for the features fusion of face and online signature
by: Suryanti, Awang, et al.
Published: (2017)
by: Suryanti, Awang, et al.
Published: (2017)
A review of feature selection on text classification
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Similar Items
-
A Review on Minutiae Extraction of Fingerprint
by: Rozita, Mohd Yusof, et al.
Published: (2013) -
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015) -
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015) -
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015) -
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)