Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
This paper presents multi-user protocol-extensions for Schnorr/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on... more
This paper presents multi-user protocol-extensions for Schnorr/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography ...
Research Interests:
Research Interests:
Research Interests:
Palmprint is one of the relatively new physiological biometrics due to its stable and unique characteristics. The rich texture information of palmprint offers one of the powerful means in personal recognition. According to... more
Palmprint is one of the relatively new physiological biometrics due to its stable and unique characteristics. The rich texture information of palmprint offers one of the powerful means in personal recognition. According to psycho-physiology study, the primary visual cortex in the visual area of human brain is responsible for creating the basis of a three-dimensional map of visual space, and extracting features about the form and orientation of objects. The basic model can be expressed as a linear superposition of basis functions. This idea inspired us to implement two well known linear projection techniques, namely Principle Component Analysis (PCA) and Independent Component Analysis (ICA) to extract the palmprint texture features. Two different frameworks of ICA (1) are adopted to compare with PCA for the recognition performances by using three different classification techniques. Framework I observed images as random variables and the pixels as outcomes while framework II treated ...
Research Interests:
Research Interests:
Abstract This paper presents a novel method of integrating the user-specific secret pseudo-random number and iris feature extracted from wavelet packet transform as a feature vector for iris verification. The proposed method helps to... more
Abstract This paper presents a novel method of integrating the user-specific secret pseudo-random number and iris feature extracted from wavelet packet transform as a feature vector for iris verification. The proposed method helps to improve the traditional iris verification system which depends solely on iris feature. The security risks such as iris fabrication can be avoided through the token replacement. Experimental results show that the proposed method has an encouraging performance. The optimum result is obtained for mean ...
Research Interests:
Abstract In this paper, a novel method of image based palmprint matching based on features extracted from wavelet-based pseudo Zernike moments feature descriptor is proposed. Pseudo Zernike moments have additional properties of being more... more
Abstract In this paper, a novel method of image based palmprint matching based on features extracted from wavelet-based pseudo Zernike moments feature descriptor is proposed. Pseudo Zernike moments have additional properties of being more robust to image noise, possessing geometrical invariants property, having a nearly zero value of redundancy measure in a moment set due to its orthogonality property and having a superior image representative capability; while wavelet analysis affords major advantages of performing ...
Palmprint verification is an approach for verifying a palmprint input by matching the input to the claimed identity template stored in a database. If the dissimilarity measure between the input and the claimed template is below the... more
Palmprint verification is an approach for verifying a palmprint input by matching the input to the claimed identity template stored in a database. If the dissimilarity measure between the input and the claimed template is below the predefined threshold value, the palmprint input is verified possessing same identity as the claimed identity template. This paper introduces an experimental evaluation of the effectiveness of utilizing three well known orthogonal moments, namely Zernike moments, pseudo Zernike moments and Legendre moments, in the application of palmprint verification. Moments are the most commonly used technique in character feature extraction. The idea of implementing orthogonal moments as palmprint feature extractors is prompted by the fact that principal features of both character and palmprint are based on line structure. These orthogonal moments are able to define statistical and geometrical features containing line structure information about palmprint. An experimen...
Research Interests:
Hand geometry biometric system is well-known for its flexible, non-intrusive and low-cost features for personal authentication purpose. In this paper, a prototype of an automated hand geometry v erification system is developed. The... more
Hand geometry biometric system is well-known for its flexible, non-intrusive and low-cost features for personal authentication purpose. In this paper, a prototype of an automated hand geometry v erification system is developed. The proposed hand geometry system is different from the others [1]-[4] in which the users are allowed to place their hands freely within certain degrees on the scanner's surface when scanned. This can increase the user-friendliness and flexibility of the system. The hand image acquired is processed to obtain the binary hand contour based on the RGB-color image. The border tracing algorithm is then used to pinpoint the salient points from the hand contour image. The salient points are the crucial features that are located in the finger tips and in the root locations in between two fingers. Then, hand geometry features will be extracted based upon the salient points obtained. The proposed system has been tested on a small size database using the Euclidean d...
This paper introduces a novel discriminant moment-based method as a feature extraction technique for face recognition. In this method, pseudo Zernike moments are performed before the application of Fisher's Linear Discriminant to... more
This paper introduces a novel discriminant moment-based method as a feature extraction technique for face recognition. In this method, pseudo Zernike moments are performed before the application of Fisher's Linear Discriminant to achieve a stable numerical computation and good generalization in small-sample-size problems. Fisher's Linear Discriminant uses pseudo Zernike moments to derive an enhanced subset of moment features by maximizing the between-class scatter, while minimizing the within-class scatter, which leads to a better discrimination and classification performance. Experimental results show that the proposed method achieves superior performance with a recognition rate of 97.51% in noise free environment and 97.12% in noise induced environment for the Essex Face94 database. For the Essex Face95 database, the recognition rates obtained are 91.73% and 90.30% in noise free and noise induced environments, respectively.
Accurate and reliable center point determination of the fingerprint is an essential pre-processing step for the image based fingerprint recognition approach. This step is particularly important since a reference point is required to... more
Accurate and reliable center point determination of the fingerprint is an essential pre-processing step for the image based fingerprint recognition approach. This step is particularly important since a reference point is required to cancel the variation in position of the reference and testing fingerprint image. This paper illustrated an automatic center point determination algorithm that couples the modified averaged square directional field (MASDF) with morphol-ogical operation, in order to pinpoint the center point of the ...
Segmentation of fingerprint image is necessary to reduce the size of the input data, eliminating undesired background, which is the noisy and smudged area in favor of the central part of the fingerprint. In this paper, an algorithm for... more
Segmentation of fingerprint image is necessary to reduce the size of the input data, eliminating undesired background, which is the noisy and smudged area in favor of the central part of the fingerprint. In this paper, an algorithm for the segmentation which uses two stages coarse to fine approach is presented. The coarse segmentation will be performed at first using the orientation certainty values that derived from the blockwise directional field of the fingerprint image. The coarse segmented image will be carry on to the second stage ...
Abstract We propose a method of extracting cryptographic key from dynamic handwritten signatures that does not require storage of the biometric template or any statistical information that could be used to reconstruct the biometric data.... more
Abstract We propose a method of extracting cryptographic key from dynamic handwritten signatures that does not require storage of the biometric template or any statistical information that could be used to reconstruct the biometric data. Also, the keys produced are not permanently linked to the biometric hence, allowing them to be replaced in the event of key compromise. This is achieved by incorporating randomness which provides high-entropy to the naturally low-entropy biometric key using iterative inner-product method as ...
This paper proposed a novel integrated dual factor authenticator based on iterated inner products between tokenised pseudo random number and the user specific facial feature, which generated from a well known subspace feature extraction... more
This paper proposed a novel integrated dual factor authenticator based on iterated inner products between tokenised pseudo random number and the user specific facial feature, which generated from a well known subspace feature extraction technique-Fisher Discriminant Analysis, and hence produce a set of user specific compact code that coined as BioCode. The BioCode highly tolerant of data captures offsets, with same user facial data resulting in highly correlated bitstrings. Moreover, there is no deterministic way to get the ...
Abstract Biometrics characteristics are immutable, resulting in permanent biometrics compromise. To address this problem, we prescribe a generic cancellable biometrics formulation-BioPhasor. BioPhasor is a set of binary code based on... more
Abstract Biometrics characteristics are immutable, resulting in permanent biometrics compromise. To address this problem, we prescribe a generic cancellable biometrics formulation-BioPhasor. BioPhasor is a set of binary code based on iterated mixing between the user-specific tokenised pseudo-random number and the biometric feature. This method enables straightforward revocation of biometric template via token replacement. The transformation is non-invertible and BioPhasor able to achieve extremely low error rate ...
We present a novel approach to generating cryptographic keys from biometrics. In our approach, the PCA coefficients of a face image are discretised using a bit-extraction method to n bits. We compare performance results obtained with and... more
We present a novel approach to generating cryptographic keys from biometrics. In our approach, the PCA coefficients of a face image are discretised using a bit-extraction method to n bits. We compare performance results obtained with and without the discretisation procedure applied to several PCA-based methods (including PCA, PCA with weighing coefficients, PCA on Wavelet Subband, and LDA) on a combined face image database. Results show that the discretisation step consistently increases the performance.
Abstract. We proposed a novel approach for face recognition to address the challenging task of recognition using a fusion of nonlinear dimensional reduction; Locally Linear Embedding (LLE) and Principal Component Analysis (PCA). LLE... more
Abstract. We proposed a novel approach for face recognition to address the challenging task of recognition using a fusion of nonlinear dimensional reduction; Locally Linear Embedding (LLE) and Principal Component Analysis (PCA). LLE computes a compact representation of high dimensional data combining the major advantages of linear methods, With the advantages of nonlinear approaches which is flexible to learn a broad of class on nonlinear manifolds. The application of LLE, however, is limited due to its lack of a parametric ...
Abstract Palm print textures like principle lines, wrinkles and ridges contain discriminative information which can be extracted for verification purpose. In this paper, we aim to reexamine the competitive palm code scheme, and introduce... more
Abstract Palm print textures like principle lines, wrinkles and ridges contain discriminative information which can be extracted for verification purpose. In this paper, we aim to reexamine the competitive palm code scheme, and introduce some improvement over the proposed method. In order to reduce the computation complexity, we adopted wavelet transform to decompose the palm print image into lower resolution. We are able to show that wavelet transform when integrated with 2D Gabor filter is able to yield verification rate of ...
Abstract Reliable touch-less fingerprint recognition still remains a challenge nowadays as the conventional techniques that used to preprocess the optical or capacitance sensor acquired fingerprint image, for segmentation, enhancement and... more
Abstract Reliable touch-less fingerprint recognition still remains a challenge nowadays as the conventional techniques that used to preprocess the optical or capacitance sensor acquired fingerprint image, for segmentation, enhancement and core point detection, are inadequate to serve the purpose. The problems of the touch-less fingerprint recognition are the low contrast between the ridges and the valleys in fingerprint images, defocus and motion blur. However, it imposes a competency for a further advancing of this biometric ...
Abstract Touch-less fingerprint recognition has been receiving attention recently as it frees from the problems in terms of hygienic, maintenance and latent fingerprints. However, the conventional techniques that used to preprocess the... more
Abstract Touch-less fingerprint recognition has been receiving attention recently as it frees from the problems in terms of hygienic, maintenance and latent fingerprints. However, the conventional techniques that used to preprocess the optical or capacitance sensor acquired fingerprint image, for segmentation, enhancement and core point detection, are inadequate to serve the purpose. The problems of the touch-less fingerprint recognition consist of low contrast between the ridges and the valleys in fingerprint images, defocus and motion blur ...
Abstract In this paper, we propose a face recognition technique based on modification of the nonnegative matrix factorization (NMF) technique, which is known as sorted locally confined NMF (SLC-NMF). The SLC-NMF uses NMF to find... more
Abstract In this paper, we propose a face recognition technique based on modification of the nonnegative matrix factorization (NMF) technique, which is known as sorted locally confined NMF (SLC-NMF). The SLC-NMF uses NMF to find nonnegative basis images, a subset of which were selected according to a discriminant factor and then processed through a series of image processing operations to yield a set of ideal locally confined salient feature basis images. SLC-NMF illustrates a perfectly local salient feature region which effectively ...
This paper demonstrates a novel subspace projection technique via Non-Negative Matrix Factorization (NMF) to represent human facial image in low frequency subband, which is able to realize through the wavelet transform. Wavelet transform... more
This paper demonstrates a novel subspace projection technique via Non-Negative Matrix Factorization (NMF) to represent human facial image in low frequency subband, which is able to realize through the wavelet transform. Wavelet transform (WT), is used to reduce the noise and produce a representation in the low frequency domain, and hence making the facial images insensitive to facial expression and small occlusion. After wavelet decomposition, NMF is performed to produce region or part-based representations of the images. Non-negativity is a useful constraint to generate expressiveness in the reconstruction of faces. The simulation results on Essex and ORL database show that the hybrid of NMF and the best wavelet filter will yield better verification rate and shorter training time. The optimum results of 98.5% and 95.5% are obtained from Essex and ORL Database, respectively. These results are compared with our baseline method, Principal Component Analysis (PCA).
This paper presents a novel two-factor authenticator which hashes tokenized random data and moment based palmprint features to produce a set of private binary string, coined as Discrete-Hashing code. This novel technique requires two... more
This paper presents a novel two-factor authenticator which hashes tokenized random data and moment based palmprint features to produce a set of private binary string, coined as Discrete-Hashing code. This novel technique requires two factors (random number + authorized biometrics) credentials in order to access the authentication system. Absence of either factor will just handicap the progress of authentication. Besides that, Discrete-Hashing also possesses high discriminatory power, with highly correlated bit strings for intra-class data. Experimental results show that this two-factor authenticator surpasses the classic biometric authenticator in terms of verification rate. Our proposed approach provides a clear separation between genuine and imposter population distributions. This implies that Discrete-Hashing technique allows achievement of zero False Accept Rate (FAR) without jeopardizing the False Reject Rate (FRR) performance, which is hardly possible to conventional biometric systems.
With the wonders of the Internet and the promises of the worldwide information infrastructure, a highly secure authentication system is desirable. Biometric has been deployed in this purpose as it is a unique identifier. However, it also... more
With the wonders of the Internet and the promises of the worldwide information infrastructure, a highly secure authentication system is desirable. Biometric has been deployed in this purpose as it is a unique identifier. However, it also suffers from inherent limitations and specific security threats such as biometric fabrication. To alleviate the liabilities of the biometric, a combination of token
This paper proposes a novel revocable two-factor authentication approach which combines user-specific tokenized pseudo-random bit sequence with biometrics data via a logic operation. Through the process, a distinct binary code per person,... more
This paper proposes a novel revocable two-factor authentication approach which combines user-specific tokenized pseudo-random bit sequence with biometrics data via a logic operation. Through the process, a distinct binary code per person, coined as bio-Bit, is formed. There is no deterministic way to acquire bio-Bit without having both factors. This feature offers an extra protection layer against biometrics fabrication since bio-Bit authenticator is replaceable via token replacement. The proposed method also presents ...
Abstract This paper presents a method of combining wavelet transforms (WT) and Zernike moments (ZM) as a feature vector for face recognition. Wavelet transform, with its approximate decomposition is used to reduce the noise and produce a... more
Abstract This paper presents a method of combining wavelet transforms (WT) and Zernike moments (ZM) as a feature vector for face recognition. Wavelet transform, with its approximate decomposition is used to reduce the noise and produce a representation in the low frequency domain, and hence making the facial images insensitive to facial expression and small occlusion. The Zernike moments, on the other hand, is selected as feature extractor due to its robustness to image noise, geometrical invariants property and ...
Abstract. This paper proposes a private biometrics formulation which is based on the concealment of random kernel and the iris images to synthesize a minimum average correlation energy (MACE) filter for iris authentication. Specifically,... more
Abstract. This paper proposes a private biometrics formulation which is based on the concealment of random kernel and the iris images to synthesize a minimum average correlation energy (MACE) filter for iris authentication. Specifically, we multiply training images with the user-specific random kernel in frequency domain before biometric filter is created. The objective of the proposed method is to provide private biometrics realization in iris authentication in which biometric template can be reissued once it was compromised. ...
In this paper we introduce a novel cancellable biometric realisation approach based on the iterated inner products between the tokenised pseudo-random number and the face feature to produce a set of user-specific compact binary code,... more
In this paper we introduce a novel cancellable biometric realisation approach based on the iterated inner products between the tokenised pseudo-random number and the face feature to produce a set of user-specific compact binary code, coined as FaceHash. This approach enables straightforward revocation of FaceHash via token replacement and there is no deterministic way to reveal FaceHash without having both tokenised random number and face feature, thus offers strong protection against biometrics fabrication. In addition, ...
We present a novel technique for extracting bits from the perceptually significant components of an image transformation, thus making the recognition of objects under nonideal conditions robust. Specifically, we describe five popular face... more
We present a novel technique for extracting bits from the perceptually significant components of an image transformation, thus making the recognition of objects under nonideal conditions robust. Specifically, we describe five popular face recognition transform methods [including principal component analysis (PCA), linear discriminant analysis (LDA), wavelet transform, wavelet transform with PCA, and wavelet transform with Fourier-Mellin transform] with robust bit extraction enhancement for various numbers of bits extracted. ...
ABSTRACT Current user interface builders provide only low-level assistance, because they have knowledge of neither the application, nor the principles by which interface elements are combined effectively. We describe a design tool that... more
ABSTRACT Current user interface builders provide only low-level assistance, because they have knowledge of neither the application, nor the principles by which interface elements are combined effectively. We describe a design tool that unites the knowledge components essential for effective dialog box layout. The knowledge base model consists of (1) style knowledge, which provides design-time constraints on interface specifications; (2) style application system, which handles the actual layout of dialog boxes based on the style knowledge base; (3) design knowledge, which provides quantitative metrics to analyse the spatial properties of the dialog box layout; and (4) design evaluation system, which uses evaluation metrics to compare and evaluate alternative designs. As our empirical study shows, the redesigns using the design tool had significant effect on the preference data.
Pattern users are faced with difficulties in understanding when and how to use the increasing number of available design patterns due the inherent ambiguity in the existing means (textual and graphical) of describing them. Since patterns... more
Pattern users are faced with difficulties in understanding when and how to use the increasing number of available design patterns due the inherent ambiguity in the existing means (textual and graphical) of describing them. Since patterns are seldom used in isolation but are usually combined to solve complex problems, the above-mentioned difficulties have even worsen.Hence, there is an appealing need
Abstract Recently, biometric palmprint has received wide attention from researchers. It is well-known for several advantages such as stable line features, low-resolution imaging, low-cost capturing device, and user-friendly. In this... more
Abstract Recently, biometric palmprint has received wide attention from researchers. It is well-known for several advantages such as stable line features, low-resolution imaging, low-cost capturing device, and user-friendly. In this paper, an automated scanner-based palmprint recognition system is proposed. The system automatically captures and aligns the palmprint images for further processing. Several linear subspace projection techniques have been tested and compared. In specific, we focus on principal component analysis (PCA), ...
This paper presents an approach to boost the performance of pseudo Zernike moments in face recognition. This approach is a hybrid of a kernel trick, discriminant function and pseudo Zernike moments (PZM), namely as Kernel-based Fisher... more
This paper presents an approach to boost the performance of pseudo Zernike moments in face recognition. This approach is a hybrid of a kernel trick, discriminant function and pseudo Zernike moments (PZM), namely as Kernel-based Fisher Pseudo Zernike Moments (KFPZM). KFPZM maps the moment-based features into a high dimensional feature space via kernel function for disclosing the underlying variables which carry significant information about the image. Then, it performs discriminant analysis onto the mapped features to ...
... moments on wavelet subband Ying-Han Pang, a) Andrew Teoh BJ, and David Ngo CL Faculty of Information Science and Technology, Multimedia University Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia a) [email protected] ... References [1]... more
... moments on wavelet subband Ying-Han Pang, a) Andrew Teoh BJ, and David Ngo CL Faculty of Information Science and Technology, Multimedia University Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia a) [email protected] ... References [1] H. Javad, A. Majid, and K ...
This paper considers a technique for analysing the composition information of displays based on Hambidge's dynamic symmetry. While, by using this technique, our study of dynamic symmetry that underlies 150 real screens shows an... more
This paper considers a technique for analysing the composition information of displays based on Hambidge's dynamic symmetry. While, by using this technique, our study of dynamic symmetry that underlies 150 real screens shows an unmistakable use of plan ...

And 14 more