Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Fatma G. Hashad"'
Efficient Multi-Biometric Secure-Storage Scheme Based on Deep Learning and Crypto-Mapping Techniques
Autor:
Ahmed Sedik, Ahmed A. Abd El-Latif, Mudasir Ahmad Wani, Fathi E. Abd El-Samie, Nariman Abdel-Salam Bauomy, Fatma G. Hashad
Publikováno v:
Mathematics, Vol 11, Iss 3, p 703 (2023)
Cybersecurity has been one of the interesting research fields that attract researchers to investigate new approaches. One of the recent research trends in this field is cancelable biometric template generation, which depends on the storage of a ciphe
Externí odkaz:
https://doaj.org/article/3d37da85a4664d73b0dae8ea1d85fb80
The issue of cybersecurity is one of the important fields which is involved in different research trends. Biometric security is one of these trends which is involved in several applications such as access control systems and online identity verificat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::36cbc87d619c8b110eb6663c096fe892
https://doi.org/10.21203/rs.3.rs-2241969/v1
https://doi.org/10.21203/rs.3.rs-2241969/v1
Autor:
Sayed El-Rabaie, Osama Zahran, Moawad I. Dessouky, Fathi E. Abd El-Samie, Ibrahim F. Elashry, Ghada M. El-Banby, Fatma G. Hashad
Publikováno v:
Menoufia Journal of Electronic Engineering Research. 29:133-142
Peoples’ biometrics, such as fingerprints, are unique , as a result it can be used in many evidence security requests, such as employees’ registration gate, crime investigation, and revealing smart phones. The security of fingerprints is very cri
Autor:
El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ibrahim F. Elashry, Fatma G. Hashad, Osama Zahran
Publikováno v:
Multimedia Tools and Applications. 78:27351-27381
This paper presents a fingerprint image encryption scheme based on fingerprint image fusion with another visible image that is rich in details. The encryption process is performed with chaotic Baker map, which has large immunity to noise. The image f
Autor:
Osama Zahran, El-Sayed M. El-Rabaie, Ibrahim F. El Ashry, F. E. Abd El-Samie, Fatma G. Hashad
Publikováno v:
Menoufia Journal of Electronic Engineering Research. 27:165-182
This paper presents two chaotic image encryption plans combined with Discrete Wavelet Transform (DWT) to encrypt unique fingerprint. In the first proposal, the fingerprint which has few details (low entropy) is fused with another image which is rich
Publikováno v:
Menoufia Journal of Electronic Engineering Research. 27:183-211
Autor:
Maha Awad, Heba A. El-Khobby, Saleh A. Alshebeili, Mustafa M. Abd Elnaby, Salaheldin M. Diab, Fathi E. Abd El-Samie, El-Sayed M. El-Rabaie, B. M. Sallam, Said E. El Khamy, Fatma G. Hashad, Osama S. Faragallah, Alaa M. Abbas
Publikováno v:
Optik. 127:484-492
In storing large databases of images such as fingerprint and medical databases, the required memory size becomes a great challenge. This work demonstrates a framework for reducing the size of large image databases used in pattern recognition applicat
Publikováno v:
Pattern Recognition and Image Analysis. 20:360-369
This paper presents a new fingerprint recognition method based on mel-frequency cepstral coefficients (MFCCs). In this method, cepstral features are extracted from a group of fingerprint images, which are transformed first to 1-D signals by lexicogra
Publikováno v:
2009 International Conference on Computer Engineering & Systems.
Quality enhancement of fingerprint images is important for a good performance of Automatic Fingerprint Identification System (AFIS). In this paper, a hybrid fingerprint enhancement algorithm is presented. This algorithm is based on morphological enha
Publikováno v:
2009 International Conference on Computer Engineering & Systems.
This paper presents a new fingerprint identification method based on mel frequency cepstral coefficients (MFCCs). This method is based on the transformation of the fingerprint images into a 1-D signals and the extraction of the MFCCs from these signa