An overview of steganography techniques applied to the protection of biometric data

M Douglas, K Bailey, M Leeney, K Curran - Multimedia Tools and …, 2018 - Springer
Identification of persons by way of biometric features is an emerging phenomenon. Over the
years, biometric recognition has received much attention due to its need for security …

Minutiae extraction from fingerprint images-a review

R Bansal, P Sehgal, P Bedi - arXiv preprint arXiv:1201.1422, 2011 - arxiv.org
Fingerprints are the oldest and most widely used form of biometric identification. Everyone is
known to have unique, immutable fingerprints. As most Automatic Fingerprint Recognition …

Risk assessment in discrete production processes considering uncertainty and reliability: Z-number multi-stage fuzzy cognitive map with fuzzy learning algorithm

M Abbaspour Onari, S Yousefi… - Artificial Intelligence …, 2021 - Springer
Abstract The Failure Mode and Effects Analysis (FMEA) technique due to its proactive nature
can identify failures and their causes as well as potential effects, and provide …

Application of type-2 fuzzy logic filtering to reduce noise in color images

ME Yuksel, A Basturk - IEEE Computational intelligence …, 2012 - ieeexplore.ieee.org
In this paper, we present a novel application of type-2 fuzzy logic to the design of an image
processing operator called an impulse detector. The type-2 fuzzy logic based impulse …

[PDF][PDF] Effective morphological extraction of true fingerprint minutiae based on the hit or miss transform

R Bansal, P Sehgal, P Bedi - International Journal of Biometrics and …, 2010 - academia.edu
Fingerprints are the most widely used parameter for personal identification amongst all
biometrics based personal authentication systems. As most Automatic Fingerprint …

Fingerprint image enhancement using type-2 fuzzy sets

R Bansal, P Arora, M Gaur, P Sehgal… - 2009 sixth international …, 2009 - ieeexplore.ieee.org
High-quality images are a prerequisite for accurate matching of fingerprint images. However,
fingerprint images are rarely of perfect quality. They may be degraded or corrupted due to …

A fuzzfied approach to Iris recognition for mobile security

R Bansal, A Juneja, A Agnihotri… - 2017 International …, 2017 - ieeexplore.ieee.org
Mobile security is a major concern in today's world. Biometric security techniques are
modern ways to ensure security in these systems. Iris is a unique biometric trait that offers …

Improved Digital Image Enhancement Filters Based on Type-2 Neuro-Fuzzy Techniques

ME Yüksel, A Baştürk - Computational Intelligence in Image Processing, 2012 - Springer
A general purpose image enhancement operator based on type-2 neuro-fuzzy networks is
presented in this chapter. The operator can be used for a number of different image …

[PDF][PDF] SELF STUDY REPORT

K MAHAVIDYALAYA - 2023 - vnspmam.in
In the era of competitiveness in every field and to sustain globally and locally more focus has
been given on quality of higher education. To meet the benchmarks laid down for improving …