An overview of steganography techniques applied to the protection of biometric data
Identification of persons by way of biometric features is an emerging phenomenon. Over the
years, biometric recognition has received much attention due to its need for security …
years, biometric recognition has received much attention due to its need for security …
Minutiae extraction from fingerprint images-a review
Fingerprints are the oldest and most widely used form of biometric identification. Everyone is
known to have unique, immutable fingerprints. As most Automatic Fingerprint Recognition …
known to have unique, immutable fingerprints. As most Automatic Fingerprint Recognition …
Risk assessment in discrete production processes considering uncertainty and reliability: Z-number multi-stage fuzzy cognitive map with fuzzy learning algorithm
M Abbaspour Onari, S Yousefi… - Artificial Intelligence …, 2021 - Springer
Abstract The Failure Mode and Effects Analysis (FMEA) technique due to its proactive nature
can identify failures and their causes as well as potential effects, and provide …
can identify failures and their causes as well as potential effects, and provide …
Application of type-2 fuzzy logic filtering to reduce noise in color images
In this paper, we present a novel application of type-2 fuzzy logic to the design of an image
processing operator called an impulse detector. The type-2 fuzzy logic based impulse …
processing operator called an impulse detector. The type-2 fuzzy logic based impulse …
[PDF][PDF] Effective morphological extraction of true fingerprint minutiae based on the hit or miss transform
Fingerprints are the most widely used parameter for personal identification amongst all
biometrics based personal authentication systems. As most Automatic Fingerprint …
biometrics based personal authentication systems. As most Automatic Fingerprint …
Fingerprint image enhancement using type-2 fuzzy sets
High-quality images are a prerequisite for accurate matching of fingerprint images. However,
fingerprint images are rarely of perfect quality. They may be degraded or corrupted due to …
fingerprint images are rarely of perfect quality. They may be degraded or corrupted due to …
A fuzzfied approach to Iris recognition for mobile security
R Bansal, A Juneja, A Agnihotri… - 2017 International …, 2017 - ieeexplore.ieee.org
Mobile security is a major concern in today's world. Biometric security techniques are
modern ways to ensure security in these systems. Iris is a unique biometric trait that offers …
modern ways to ensure security in these systems. Iris is a unique biometric trait that offers …
Improved Digital Image Enhancement Filters Based on Type-2 Neuro-Fuzzy Techniques
ME Yüksel, A Baştürk - Computational Intelligence in Image Processing, 2012 - Springer
A general purpose image enhancement operator based on type-2 neuro-fuzzy networks is
presented in this chapter. The operator can be used for a number of different image …
presented in this chapter. The operator can be used for a number of different image …
[PDF][PDF] SELF STUDY REPORT
K MAHAVIDYALAYA - 2023 - vnspmam.in
In the era of competitiveness in every field and to sustain globally and locally more focus has
been given on quality of higher education. To meet the benchmarks laid down for improving …
been given on quality of higher education. To meet the benchmarks laid down for improving …