Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
The rapidly growing use and storage of private, sensitive, and personal information across different applications have given rise to the need to restrict access to such information; thus, leading to the development of biometric authentication. Multimodal biometric authentication has improved syst...
| Main Author: | Najih, Abdulmawla |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/92805/ http://psasir.upm.edu.my/id/eprint/92805/1/FK%202020%20107%20UPMIR.pdf |
Similar Items
Fingerprint Image Watermarking Using Encrypted Identification Number
by: Mustafa, Intan Shafinaz
Published: (2006)
by: Mustafa, Intan Shafinaz
Published: (2006)
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013)
by: Shojanazeri, Hamid
Published: (2013)
An efficient method for audio watermarking using SWT and mean value quantization
by: Mushgil, Baydaa Mohammad
Published: (2016)
by: Mushgil, Baydaa Mohammad
Published: (2016)
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Image orientation watermarking technique for copyright protection
by: Jasim, Hend Muslim
Published: (2016)
by: Jasim, Hend Muslim
Published: (2016)
State-of-the-art in techniques of text digital watermarking: challenges and limitations
by: Al-Maweri, Nasr Addin Ahmed Salem, et al.
Published: (2016)
by: Al-Maweri, Nasr Addin Ahmed Salem, et al.
Published: (2016)
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
by: Salem Hussin, Saleh Hussin
Published: (2005)
by: Salem Hussin, Saleh Hussin
Published: (2005)
Subjective and objective watermark detection using a novel approach: Bar-coded watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Watermarking technique for wireless multimedia sensor networks: A state of the art
by: Potdar, Vidyasagar, et al.
Published: (2012)
by: Potdar, Vidyasagar, et al.
Published: (2012)
Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techniques
by: Abbas, Nidaa Hasan
Published: (2017)
by: Abbas, Nidaa Hasan
Published: (2017)
Multiple image watermarking using the SILE approach
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Robust patchwork-based watermarking method for stereo audio signals
by: Natgunanathan, I., et al.
Published: (2013)
by: Natgunanathan, I., et al.
Published: (2013)
Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking
by: Natgunanathan, I., et al.
Published: (2012)
by: Natgunanathan, I., et al.
Published: (2012)
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals
by: Xiang, Y., et al.
Published: (2015)
by: Xiang, Y., et al.
Published: (2015)
Effects of variation theory-based strategy on form two students' algebraic achievement and motivation
by: Ting, Jing Jing
Published: (2016)
by: Ting, Jing Jing
Published: (2016)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Matching fingerprint images for biometric authentication using convolutional neural networks
by: Najih, Abdulmawla, et al.
Published: (2019)
by: Najih, Abdulmawla, et al.
Published: (2019)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008)
by: Sulong, Mek Rahmah
Published: (2008)
Implementation of data security system in Tabung Haji and SOCSO
by: Ahmad, Jasmin Ilyani
Published: (2003)
by: Ahmad, Jasmin Ilyani
Published: (2003)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
by: Ahmed, Shakil
Published: (2013)
by: Ahmed, Shakil
Published: (2013)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Development of authentication code based on spectral amplitude coding optical code division multiplexing for multi-user pseudo quantum key distribution
by: Abiola, Taiwo Ambali
Published: (2018)
by: Abiola, Taiwo Ambali
Published: (2018)
Encryption selection for WLAN IEEE802.11G
by: Ahmad, Zahrol Azam
Published: (2013)
by: Ahmad, Zahrol Azam
Published: (2013)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Data forensics analysis on biometric images using Benford's law and support vector machine algorithm
by: Hamid, Alsaadi Hussam Hussein
Published: (2024)
by: Hamid, Alsaadi Hussam Hussein
Published: (2024)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
Similar Items
-
Fingerprint Image Watermarking Using Encrypted Identification Number
by: Mustafa, Intan Shafinaz
Published: (2006) -
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013) -
An efficient method for audio watermarking using SWT and mean value quantization
by: Mushgil, Baydaa Mohammad
Published: (2016) -
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010) -
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)