In biometric security, steganography has become one of the techniques used in defending biometrics data and system. This is due to fraud to the biometric data and illegal activites occured at the biometrics point of system. The biometric data, which in this study, iris, is preprocessed using Hough Transform in producing the iris feature. The pixel values of iris feature is formed, in order to embed the iris feature with the stego key which gained from the cover image (thumbprint from the same trained sample). Studies showed that various techniques of embedding such as least significant bits and pixel value differencing are among popular researches. However, none has been designed for iris implementation in biometrics system. Therefore, a ne...
This research aimed at comparing iris-signature techniques, namely the Sequential Technique (ST) and...
Biometric identification systems involve securing biometric traits by encrypting them using an encry...
Author name used in this publication: David ZhangBiometrics Research Centre, Department of Computing...
The integration of steganography in biometric system is a solution for enhancing security in iris. T...
The challenging part in achieving high security biometrics data is viewed from the engineering persp...
The challenging part in achieving high security biometrics data is viewed from the engineering persp...
The security is an important aspect in our daily life whichever the system is considered, security p...
Recent growth in digital multimedia technologies has presented a lot of facilities in information tr...
Recent growth in digital multimedia technologies has presented a lot of facilities in information tr...
A biometric system provides automatic identification of an individual based on a unique feature or c...
In this paper, efficient biometric security technique for Integer Wavelet Transform based Human Reco...
Iris-based security systems are highly recommended because of their security and ease of use. Differ...
The Cancelable Biometrics is a template protection scheme that can replace a stolen or lost biometri...
The Cancelable Biometrics is a template protection scheme that can replace a stolen or lost biometri...
This research aimed at comparing iris-signature techniques, namely the Sequential Technique (ST) and...
This research aimed at comparing iris-signature techniques, namely the Sequential Technique (ST) and...
Biometric identification systems involve securing biometric traits by encrypting them using an encry...
Author name used in this publication: David ZhangBiometrics Research Centre, Department of Computing...
The integration of steganography in biometric system is a solution for enhancing security in iris. T...
The challenging part in achieving high security biometrics data is viewed from the engineering persp...
The challenging part in achieving high security biometrics data is viewed from the engineering persp...
The security is an important aspect in our daily life whichever the system is considered, security p...
Recent growth in digital multimedia technologies has presented a lot of facilities in information tr...
Recent growth in digital multimedia technologies has presented a lot of facilities in information tr...
A biometric system provides automatic identification of an individual based on a unique feature or c...
In this paper, efficient biometric security technique for Integer Wavelet Transform based Human Reco...
Iris-based security systems are highly recommended because of their security and ease of use. Differ...
The Cancelable Biometrics is a template protection scheme that can replace a stolen or lost biometri...
The Cancelable Biometrics is a template protection scheme that can replace a stolen or lost biometri...
This research aimed at comparing iris-signature techniques, namely the Sequential Technique (ST) and...
This research aimed at comparing iris-signature techniques, namely the Sequential Technique (ST) and...
Biometric identification systems involve securing biometric traits by encrypting them using an encry...
Author name used in this publication: David ZhangBiometrics Research Centre, Department of Computing...