Combined i-vector and extreme learning machine approach for robust speaker identification and evaluation with SITW 2016, NIST 2008, TIMIT databases

MTS Al-Kaltakchi, MAM Abdullah, WL Woo… - Circuits, Systems, and …, 2021 - Springer
In this article, a novel combined i-vector and an Extreme Learning Machine (ELM) is
proposed for speaker identification. The ELM is chosen because it is fast to train and has a …

A framework for iris biometrics protection: a marriage between watermarking and visual cryptography

MAM Abdullah, SS Dlay, WL Woo, JA Chambers - IEEE Access, 2016 - ieeexplore.ieee.org
This paper presents a novel security architecture for protecting the integrity of iris images
and templates using watermarking and visual cryptography (VC). The proposed scheme …

Efficient yet robust biometric iris matching on smart cards for data high security and privacy

N Nedjah, RS Wyant, LM Mourelle, BB Gupta - Future Generation …, 2017 - Elsevier
Smart control access to any service and/or critical data is at the very basis of any smart
project. Biometrics have been used as a solution for system access control, for many years …

[PDF][PDF] An efficient feature extraction method for iris recognition based on wavelet transformation

M Elgamal, N Al-Biqami - Int. J. Comput. Inf. Technol, 2013 - academia.edu
One of the most reliable biometric is the iris, due to its stability, uniqueness and noninvasive
nature. One of the difficult problems in feature based iris recognition is the speed of …

[PDF][PDF] PCA based Iris Recognition using DWT

K Raja, R Chhootaray, S Pattnaik - Int. J. Comp. Tech. Appl, 2011 - academia.edu
The Iris pattern is an important biological feature of human body. The recognition of an
individual based on iris pattern is gaining more popularity due to the uniqueness of the …

Iris recognition methods of a blinked eye in nonideal condition

AS Adhau, DK Shedge - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Iris accuracy stands highest by Comparing of all the biometrics. This paper proposed
methods for iris edge detection, extraction of feature and matching whereas the important …

[PDF][PDF] Exploring the use of biometric smart cards for voters' accreditation: A case study of Nigeria electoral process

AA Kayode - 2020 - researchgate.net
Voting remains an integral component of every democratic electoral process. it is an avenue
for citizens to exercise their rights in order to elect those who will lead them in various vacant …

[PDF][PDF] DWT and DCT based robust iris feature extraction and recognition algorithm for biometric personal identification

SV Dhavale - International journal of computer applications, 2012 - Citeseer
Human iris is one of the most reliable biometric because of its uniqueness, stability and
noninvasive nature. Thus it has attracted the attention of biometrics based identification and …

Efficient Unconstrained Iris Recognition System Based on CCT‐Like Mask Filter Bank

HN Fathee, ON Ucan… - Mathematical …, 2019 - Wiley Online Library
In this paper, a new personal identification method based on unconstrained iris recognition
is presented. We apply a nontraditional step for feature extraction where a new circular …

Biometric signature based public key security system

HM Therar, EA Mohammed… - … Conference on Advanced …, 2020 - ieeexplore.ieee.org
Digital signature is a technique that is utilized to check the authenticity of a message
transmitted electronically. The digital signature technique is based on a public key method …