Combined i-vector and extreme learning machine approach for robust speaker identification and evaluation with SITW 2016, NIST 2008, TIMIT databases
In this article, a novel combined i-vector and an Extreme Learning Machine (ELM) is
proposed for speaker identification. The ELM is chosen because it is fast to train and has a …
proposed for speaker identification. The ELM is chosen because it is fast to train and has a …
A framework for iris biometrics protection: a marriage between watermarking and visual cryptography
This paper presents a novel security architecture for protecting the integrity of iris images
and templates using watermarking and visual cryptography (VC). The proposed scheme …
and templates using watermarking and visual cryptography (VC). The proposed scheme …
Efficient yet robust biometric iris matching on smart cards for data high security and privacy
N Nedjah, RS Wyant, LM Mourelle, BB Gupta - Future Generation …, 2017 - Elsevier
Smart control access to any service and/or critical data is at the very basis of any smart
project. Biometrics have been used as a solution for system access control, for many years …
project. Biometrics have been used as a solution for system access control, for many years …
[PDF][PDF] An efficient feature extraction method for iris recognition based on wavelet transformation
M Elgamal, N Al-Biqami - Int. J. Comput. Inf. Technol, 2013 - academia.edu
One of the most reliable biometric is the iris, due to its stability, uniqueness and noninvasive
nature. One of the difficult problems in feature based iris recognition is the speed of …
nature. One of the difficult problems in feature based iris recognition is the speed of …
[PDF][PDF] PCA based Iris Recognition using DWT
K Raja, R Chhootaray, S Pattnaik - Int. J. Comp. Tech. Appl, 2011 - academia.edu
The Iris pattern is an important biological feature of human body. The recognition of an
individual based on iris pattern is gaining more popularity due to the uniqueness of the …
individual based on iris pattern is gaining more popularity due to the uniqueness of the …
Iris recognition methods of a blinked eye in nonideal condition
AS Adhau, DK Shedge - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Iris accuracy stands highest by Comparing of all the biometrics. This paper proposed
methods for iris edge detection, extraction of feature and matching whereas the important …
methods for iris edge detection, extraction of feature and matching whereas the important …
[PDF][PDF] Exploring the use of biometric smart cards for voters' accreditation: A case study of Nigeria electoral process
AA Kayode - 2020 - researchgate.net
Voting remains an integral component of every democratic electoral process. it is an avenue
for citizens to exercise their rights in order to elect those who will lead them in various vacant …
for citizens to exercise their rights in order to elect those who will lead them in various vacant …
[PDF][PDF] DWT and DCT based robust iris feature extraction and recognition algorithm for biometric personal identification
SV Dhavale - International journal of computer applications, 2012 - Citeseer
Human iris is one of the most reliable biometric because of its uniqueness, stability and
noninvasive nature. Thus it has attracted the attention of biometrics based identification and …
noninvasive nature. Thus it has attracted the attention of biometrics based identification and …
Efficient Unconstrained Iris Recognition System Based on CCT‐Like Mask Filter Bank
In this paper, a new personal identification method based on unconstrained iris recognition
is presented. We apply a nontraditional step for feature extraction where a new circular …
is presented. We apply a nontraditional step for feature extraction where a new circular …
Biometric signature based public key security system
HM Therar, EA Mohammed… - … Conference on Advanced …, 2020 - ieeexplore.ieee.org
Digital signature is a technique that is utilized to check the authenticity of a message
transmitted electronically. The digital signature technique is based on a public key method …
transmitted electronically. The digital signature technique is based on a public key method …