Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Asem Othman"'
Autor:
Asem Othman, John Callahan
Publikováno v:
Advanced Sciences and Technologies for Security Applications ISBN: 9783030394882
Most user authentication methods and identity proving systems rely on centralized databases. Such information storage presents a single point of compromise from a security perspective. If this system is compromised, it poses a direct threat to a sign
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1487120672771a20aee8bcc609a48295
https://doi.org/10.1007/978-3-030-39489-9_12
https://doi.org/10.1007/978-3-030-39489-9_12
Autor:
Asem Othman, John Callahan
Publikováno v:
IJCNN
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0a6d803c4e5e5c26775ba586c6745a73
http://arxiv.org/abs/1711.07127
http://arxiv.org/abs/1711.07127
Autor:
Aryana Tavanai, Josiah Kane, Richard Tyson, Lewis A. Carney, Asem Othman, Jonathan Francis Mather, Andrew Simpson, Yiqun Xue
Publikováno v:
Proceedings of the 2017 4th International Conference on Biomedical and Bioinformatics Engineering.
We have developed a Multi-Finger Touchless fingerprinting system that can be deployed on most smartphones, capturing prints with only the rear camera and the LED flash. These prints are interoperable with conventional touch-based print databases. Thi
Publikováno v:
Mobile Biometrics ISBN: 9781785610950
In this chapter, we discuss a mobile fingerprint systems denoted as 4FTM-ID system. This system utilizes the built-in rear camera of the smartphone to capture a photo of four fingers, as shown in Figure 11.1. This new touchless fingerprint recognitio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f8a30c8491bc7c814b0682392bdf5128
https://doi.org/10.1049/pbse003e_ch11
https://doi.org/10.1049/pbse003e_ch11
Autor:
Arun Ross, Asem Othman
Publikováno v:
IEEE Transactions on Information Forensics and Security. 8:260-267
This work explores the possibility of mixing two different fingerprints, pertaining to two different fingers, at the image level in order to generate a new fingerprint. To mix two fingerprints, each fingerprint pattern is decomposed into two differen
Autor:
Asem Othman, Arun Ross
Publikováno v:
IEEE Transactions on Information Forensics and Security. 6:70-81
Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting privacy to biometric data such as fing
Autor:
Asem Othman, Amr Ragab El-Beialy, Ahmed H. Kandil, Yehya A. Mostafa, Ahmed M. El-Bialy, Sahar Ali Fawzy
Publikováno v:
American Journal of Orthodontics and Dentofacial Orthopedics. 137:266-273
The introduction of 3-dimensional (3D) volumetric technology and the massive amount of information that can be obtained from it compels the introduction of new methods and new technology for orthodontic diagnosis and treatment planning. In this artic
Autor:
Asem Othman, Arun Ross
Publikováno v:
SPIE Proceedings.
We consider the problem of generating a biometric image from two different traits. Specifically, we focus on generating an IrisPrint that inherits its structure from a fingerprint image and an iris image. To facilitate this, the continuous phase of t
Autor:
Arun Ross, Asem Othman
Publikováno v:
Computer Vision-ECCV 2014 Workshops ISBN: 9783319161808
ECCV Workshops (2)
ECCV Workshops (2)
We consider the problem of perturbing a face image in such a way that it cannot be used to ascertain soft biometric attributes such as age, gender and race, but can be used for automatic face recognition. Such an exercise is useful for extending diff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dc47d278ab535c0122ccf8b8f6b4c2d6
https://doi.org/10.1007/978-3-319-16181-5_52
https://doi.org/10.1007/978-3-319-16181-5_52