Search Results - (( image verification method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- verification method »
- image verification »
- method algorithm »
- java application »
- using algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…However, different number of generations applied in CSA will give different result of the verification process. Further studies can be made by using the same algorithm, but focusing more on the image enhancement and the feature extraction methods to improve the quality of the extraction of fingerprints.…”
Get full text
Get full text
Thesis -
2
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Unlike common signature image, the on-line signature image data consists of points that are arranged in sequence based on time. …”
Get full text
Get full text
Thesis -
3
-
4
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…Therefore, this research presents an image-based method to classify children from adult and to verify children’s age range. …”
Get full text
Get full text
Get full text
Article -
5
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…In preprocessing stage, finger image from database will undergo process such as Contrast-limited Adaptive Histogram Equalization (CLAHE) and noise filtering image for con-trast improvement. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH
Published 2006“…The scope of this project is concentrated in three parts which are algorithm development and verification, image analysis and image classification. …”
Get full text
Get full text
Final Year Project -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
-
10
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
11
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
12
Face identification and verification using PCA and LDA
Published 2008“…In this paper, we describe both of these statistical subspace methods and evaluated them using The Database of Faces which comprises 40 subjects with 10 images each. …”
Get full text
Get full text
Conference or Workshop Item -
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…A ‘speeded-up robust features’ algorithm was used to determine the key points of interest and the Euclidean Distance was used to estimate similarity between database images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Enhanced face recognition using discrete cosine transform
Published 2016“…One of the challenges of face recognition using DCT and any other algorithm is poor illumination of the acquired images. …”
Get full text
Get full text
Get full text
Article -
17
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The method successfully recognizes the user fingerprint image even with noisy, translated or rotated images.…”
Get full text
Get full text
Thesis -
18
-
19
Image Steganography Using Hash Function And Compression
Published 2023“…An image steganography is a method for concealing any data or secret messages within an image file. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…Fingerprint identification and verification are one of the most significant and reliable identification methods. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
