default search action
ISBAST 2014: Kuala Lumpur, Malaysia
- 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014. IEEE 2014, ISBN 978-1-4799-6444-4
- Shukor Abd Razak:
Preface. iii
Track 1: Biometric Technologies
- Xi Chen, Wen Li, Zengli Liu, Zaihong Zhou:
Fractional low-order independent component analysis for face recognition robust to partial occlusion. 1-5 - Xi Chen, Luping Zheng, Zengli Liu, Jiashu Zhang:
Privacy-preserving biometrics using matrix random low-rank approximation approach. 6-12 - Eduardo Cermeño, Silvana Mallor, Juan A. Sigüenza:
Offline handwriting segmentation for writer identification. 13-17 - Hengjian Li, Jinwen Dong, Jinping Li:
Two-dimensional direct discriminant locality preserving projection analysis for face recognition. 18-23 - C. P. Sumathi, M. Mahadevi:
Comparative analysis of skin color model for face detection. 24-28 - Mohd. Zamri Osman, Mohd Aizaini Maarof, Mohd. Foad Rohani:
Improved skin detection based on dynamic threshold using multi-colour space. 29-34 - Isao Nakanishi, Takashi Inada, Shigang Li:
New dedicated measuring devices for intra-palm propagation signals. 35-38 - Sim Hiew Moi, Hishammuddin Asmuni, Rohayanti Hassan, Razib M. Othman:
A unified approach for unconstrained off-angle iris recognition. 39-44 - Malek Najib Omar, Mazleena Salleh, Majid Bakhtiari:
Biometric encryption to enhance confidentiality in Cloud computing. 45-50 - Sisanda Makinana, Johannes J. Van Der Merwe, Tendani Malumedzha:
A fourier transform quality measure for iris images. 51-56 - Fajri Kurniawan, Mohd Shafry Mohd Rahim, Mohammed S. Khalil:
Geometrical and eigenvector features for ear recognition. 57-62 - Robert T. Hans:
Using a biometric system to check-in and check-out luggage at airports. 63-66 - Selma Elnasir, Siti Mariyam Shamsuddin:
Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier. 67-72 - Ali Sharifara, Mohd Shafry Mohd Rahim, Yasaman Anisi:
A general review of human face detection including a study of neural networks and Haar feature-based cascade classifier in face detection. 73-78 - Eimad Abdu Abusham:
Face verification using Local Graph Stucture (LGS). 79-83 - Cynthia S. Mlambo, Fulufhelo V. Nelwamondo, Mmamolatelo E. Mathekga:
Comparison of effective hough transform-based fingerprint alignment approaches. 84-89 - Syed Mohd Zahid Syed Zainal Ariffin, Nursuriati Jamil:
Cross-band ear recognition in low or variant illumination environments. 90-94 - Behzad Shoarian Satari, Nor Azlina Abd Rahman, Zety Marla Zainal Abidin:
Face recognition for security efficiency in managing and monitoring visitors of an organization. 95-101
Track 2: Security Mechanisms
- Ahmad A. H. El Farra, Edmond Zahedi:
Interactive educational tool for teaching a simple cipher. 102-105 - Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol Abdullah:
A review of cloud security based on cryptographic mechanisms. 106-111 - Rong-Jian Chen, Jhen-Wun Fan, Chin-Hao Liao:
Reconfigurable Galois Field multiplier. 112-115 - Saru Kumari, Muhammad Khurram Khan, Xiong Li, Rahul Kumar:
Notes on "a password-based remote user authentication scheme without smart card". 116-119 - Xiong Li, Muhammad Khurram Khan, Saru Kumari, Junguo Liao, Wei Liang:
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture. 120-123 - Lu Leng, Ming Li, Andrew Beng Jin Teoh:
Matching reduction of 2DPalmHash Code. 124-128 - Natasha Arjumand Shoaib Mirza, Haider Abbas, Farrukh Aslam Khan, Jalal Al-Muhtadi:
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms. 129-132 - Xianfeng Guo, Xiaomin Wang:
Cryptanalysis and improvement of a chaotic key agreement scheme. 133-136 - Dieynaba Mall, Karim Konaté, Al-Sakib Khan Pathan:
SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks. 137-143 - Saeid Bakhtiari, Subariah Ibrahim, Mazleena Salleh, Majid Bakhtiari:
JPEG mage encryption with Elliptic Curve Cryptography. 144-149 - Wenyang Liu, Xiaomin Wang, Wenfang Zhang, Xianfeng Guo:
A lightweight blockcipher based on chaotic maps. 150-155 - Noor Afiza Mohd Ariffin, Nor Fazlida Mohd Sani:
Plan recognition scheme using multi-factors authentication for smart card online system. 156-160 - Chng Chern Wei:
DNA approach for password conversion generator. 161-165 - Yuan Tian, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma:
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration. 166-170 - Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari:
Security evaluation over lightweight cryptographic protocols. 171-175 - Shabnam Kasra Kermanshahi, Mazleena Salleh:
An enhanced certificateless cryptosystem for mobile ad hoc networks. 176-181 - Waleed Halboob, Ali Mamat, Ramlan Mahmod:
Push-based XML access control policy languages: A review. 182-187 - Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari:
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings. 188-192
Track 3: Information Security Solutions
- Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Fairuz Amalina:
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. 193-197 - Adeyemi R. Ikuesan, Shukor Abd Razak, Mazleena Salleh:
A psychographic framework for online user identification. 198-203 - Reza Adinehnia, Nur Izura Udzir, Lilly Suriani Affendey, Iskandar Ishak, Zurina Mohd Hanapi:
Effective mining on large databases for intrusion detection. 204-207 - Muhammad Syafiq bin Samsi, Shukor Abd Razak:
A mechanism for privacy preserving in healthcare organizations. 208-213 - Hiba Zuhair Zeydan, Ali Selamat, Mazleena Salleh:
Survey of anti-phishing tools with detection capabilities. 214-219 - Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari:
Rushing attack against routing protocols in Mobile Ad-Hoc Networks. 220-224 - Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyu Ho Park:
I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification. 225-231 - Warusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Hazura Zulzalil, Zaiton Muda:
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers. 232-237 - Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof:
Malware behavior image for malware variant identification. 238-243 - Taqwa Ahmed, Maheyzah Md Siraj, Anazida Zainal, Mazura Mat Din:
A taxonomy on intrusion alert aggregation techniques. 244-249 - Abba Babakura, Md Nasir Sulaiman, Mahmud A. Yusuf:
Improved method of classification algorithms for crime prediction. 250-255 - Biao Song, Yuan Tian, Bingyin Zhou:
Design and Evaluation of Remote Video Surveillance System on Private Cloud. 256-262 - Mohammed A. Saleh, Azizah Abdul Manaf:
Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks. 263-267 - Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Ramlan Mahmod, Norwati Mustapha:
Distributed Denial of Service detection using hybrid machine learning technique. 268-273 - Mohammd Reza Rostami, Meisam Eslahi, Bharanidharan Shanmugam, Zuraini Ismail:
Botnet evolution: Network traffic indicators. 274-279 - Mohammed Faez Al-Jaberi, Anazida Zainal:
Data integrity and privacy model in cloud computing. 280-284
Track 4: Secure Image Processing
- Iman Omidvar Tehrani, Subariah Ibrahim:
An enhanced fuzzy c-means medical segmentation algorithm. 285-289 - Fajri Kurniawan, Mohammed S. Khalil, Muhammad Khurram Khan, Yasser M. Alginahi:
DWT+LSB-based fragile watermarking method for digital Quran images. 290-297 - Nelmiawati, Mazleena Salleh, Malek Najib Omar:
Pixel-based dispersal scheme for medical image survivability and confidentiality. 298-303 - Omar Tayan, Yasser M. Alginahi:
A review of recent advances on multimedia watermarking security and design implications for digital Quran computing. 304-309
Track 5: Security Management
- Doaa Saleh Abobakr Baras, Siti Hajar Othman, Mohammad Nazir Ahmad, Norafida Ithnin:
Towards managing information security knowledge through metamodelling approach. 310-315 - Ahmed Yousuf Jama, Maheyzah Md Siraj, Rashidah Kadir:
Towards metamodel-based approach for Information Security Awareness Management. 316-321 - Arafat Mohammed Rashad Al-Dhaqm, Siti Hajar Othman, Shukor Abd Razak, Md. Asri Ngadi:
Towards adapting metamodelling technique for database forensics investigation domain. 322-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.