History, development and trend of Fractal based biometric cryptography
This article has been originated to institute for obtaining the History and the trend of Development of Fractal based Biometric Cryptography. Here we endeavour to assemble the bygone information for representing the trend of progress of cryptography operated with the perception of Fractal. On a whol...
| Main Authors: | Labu, Md Ahadullah, Md Said, Mohamad Rushdan, Banerjee, Santo |
|---|---|
| Other Authors: | Erçetin, Şefika Şule |
| Format: | Book Section |
| Language: | English |
| Published: |
Springer International Publishing
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47320/ http://psasir.upm.edu.my/id/eprint/47320/1/History%2C%20development%20and%20trend%20of%20Fractal%20based%20biometric%20cryptography.pdf |
Similar Items
Fractal coding of bio-metric image for face authentication
by: Ahadullah, Md
Published: (2021)
by: Ahadullah, Md
Published: (2021)
Competitive improvement of the time complexity to encode fractal image: by applying symmetric central pixel of the block
by: Md Ahadullah, et al.
Published: (2021)
by: Md Ahadullah, et al.
Published: (2021)
Fractal attractor based digital signature
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
Finite and infinite field cryptography analysis and applications
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
Efficiency analysis for public key systems based on fractal functions.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Biometric identification using local iterated function
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
IFS on the multi-fuzzy fractal space.
by: M.G. Al-Saidi , Nadia, et al.
Published: (2009)
by: M.G. Al-Saidi , Nadia, et al.
Published: (2009)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
A generalized fractal dimension as an image feature
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
An improved fuzzy fractal dimension for texture analysis
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
A new approach in cryptographic systems using fractal image coding
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
Cryptanalysis of a family of 1D unimodal maps
by: Md Said, Mohamad Rushdan, et al.
Published: (2017)
by: Md Said, Mohamad Rushdan, et al.
Published: (2017)
About fuzzy fixed point theorem in the generalized fuzzy fractal space.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Development of palmprint based biometric system
by: Rotinwa-Akinbile, M. A., et al.
Published: (2011)
by: Rotinwa-Akinbile, M. A., et al.
Published: (2011)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
The beta-transformation: a case study for chaos based cryptography
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
Degenerating the butterfly attractor in a plasma perturbation model using nonlinear controllers
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Medical negligence - History & current trends
by: Jahn Kassim, Puteri Nemie
Published: (2017)
by: Jahn Kassim, Puteri Nemie
Published: (2017)
Designing an M-dimensional nonlinear model for producing hyperchaos
by: Kadhim, Hayder Natiq, et al.
Published: (2018)
by: Kadhim, Hayder Natiq, et al.
Published: (2018)
Enhancing the sensitivity of a chaos sensor for Internet of Things
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
Number theoretical foundations in cryptography
by: Mohd Atan, Kamel Ariffin
Published: (2016)
by: Mohd Atan, Kamel Ariffin
Published: (2016)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Miniaturization of resonator based on Moore fractal
by: Mohd, E., et al.
Published: (2017)
by: Mohd, E., et al.
Published: (2017)
Similar Items
-
Fractal coding of bio-metric image for face authentication
by: Ahadullah, Md
Published: (2021) -
Competitive improvement of the time complexity to encode fractal image: by applying symmetric central pixel of the block
by: Md Ahadullah, et al.
Published: (2021) -
Fractal attractor based digital signature
by: Al-Saidi, Nadia M. G., et al.
Published: (2010) -
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018) -
Finite and infinite field cryptography analysis and applications
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)