Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures
暂无分享,去创建一个
A. A. Zaidan | O. S. Albahri | A. S. Albahri | M. A. Alsalem | A. H. Mohsin | A. H. Alamoodi | E. M. Almahdi | M. J. Baqer | Ali Najm Jasim | N. S. Jalood | Ali. H. Shareef | B. B. Zaidan | A. H. Mohsin | A. A. Zaidan | K. I. Mohammed | H. A. Ameen | Salem Garfan | Shamsul Arrieya Bin Ariffin | Ahmed Alemran | Odai Enaizan | Ali H. Shareef | A. H. Mohsin | B. Zaidan | Ahmed Alemran | O. Enaizan | O. Albahri | A. Albahri | A. Alamoodi | M. Alsalem | S. Ariffin | K. Mohammed | M. Baqer | E. Almahdi | Salem Garfan | A. N. Jasim | Nawar S. Jalood
[1] B. B. Zaidan,et al. Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects , 2018, Journal of Medical Systems.
[2] A. A. Zaidan,et al. New Technique of Hidden Data in PE-File with in Unused Area One , 2009 .
[3] Mounim A. El-Yacoubi,et al. Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification , 2017, IEEE Transactions on Information Forensics and Security.
[4] A. A. Zaidan,et al. Investigate the Capability of Applying Hidden Data in Text File: An Overview , 2010 .
[5] B. B. Zaidan,et al. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1 , 2013, Journal of Medical Systems.
[6] Gongping Yang,et al. Finger Vein Verification with Vein Textons , 2015, Int. J. Pattern Recognit. Artif. Intell..
[7] Hamid A. Jalab,et al. An Overview on Hiding Information Technique in Images , 2010 .
[8] B. B. Zaidan,et al. Real-Time Remote-Health Monitoring Systems: a Review on Patients Prioritisation for Multiple-Chronic Diseases, Taxonomy Analysis, Concerns and Solution Procedure , 2019, Journal of Medical Systems.
[9] B. B. Zaidan,et al. Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[10] Marzuki Khalid,et al. Multimodal face and finger veins biometric authentication , 2010 .
[11] A. A. Zaidan,et al. Comprehensive Insights Into the Criteria of Student Performance in Various Educational Domains , 2018, IEEE Access.
[12] B. B. Zaidan,et al. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture , 2014, Journal of Medical Systems.
[13] B. B. Zaidan,et al. Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.
[14] Zarinah Mohd Kasirun,et al. Hiding Data in Video File: An Overview , 2010 .
[15] B. Zaidan,et al. New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm , 2009 .
[16] Zhi Liu,et al. Finger vein verification system based on sparse representation. , 2012, Applied optics.
[17] Fazida Othman,et al. An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture , 2009, 2009 International Conference on Future Computer and Communication.
[18] A. A. Zaidan,et al. Review of mobile short message service security issues and techniques towards the solution , 2011 .
[19] B. B. Zaidan,et al. Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.
[20] Abdullah Gani. Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .
[21] Nor Badrul Anuar,et al. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks , 2016, Pervasive Mob. Comput..
[22] B. B. Zaidan,et al. Intrusion Detection System: Overview , 2010, ArXiv.
[23] Dzati Athiar Ramli,et al. Sharpness Enhancement of Finger-Vein Image Based on Modified Un-sharp Mask with Log-Gabor Filter , 2018, KES.
[24] Mehdi Nasri,et al. A multibiometric finger vein verification system based on score level fusion strategy , 2015, 2015 International Congress on Technology, Communication and Knowledge (ICTCK).
[25] A. A. Zaidan,et al. High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm , 2009 .
[26] A. A. Zaidan,et al. A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on ‘large‐scale data’ , 2017, Softw. Pract. Exp..
[27] Fathi E. Abd El-Samie,et al. Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering , 2016, Wireless Personal Communications.
[28] M. Khalil-Hani,et al. FPGA embedded hardware system for finger vein biometric recognition , 2013, IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society.
[29] Laiha Binti Mat Kiah,et al. High Rate Video Streaming Steganography , 2009, 2009 International Conference on Information Management and Engineering.
[30] Miss Laiha Mat Kiah. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .
[31] A. A. Zaidan,et al. Securing peer-to-peer mobile communications using public key cryptography: New security strategy , 2011 .
[32] Jian-Da Wu,et al. Driver identification using finger-vein patterns with Radon transform and neural network , 2009, Expert Syst. Appl..
[33] A. A. Zaidan,et al. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .
[34] Gongping Yang,et al. A Systematic Review of Finger Vein Recognition Techniques , 2018, Inf..
[35] M. Khalil-Hani,et al. FPGA-based embedded system implementation of finger vein biometrics , 2010, 2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA).
[36] Ahmed A. Abd El-Latif,et al. Multimodal biometric authentication based on score level fusion of finger biometrics , 2014 .
[37] T. Madhloom,et al. Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis , 2009 .
[38] B. B. Zaidan,et al. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.
[39] Othman Omran Khalifa,et al. A review on multimedia communications cryptography , 2011 .
[40] Naixue Xiong,et al. Exploring finger vein based personal authentication for secure IoT , 2017, Future Gener. Comput. Syst..
[41] Hongbing Li,et al. Finger-vein verification based on the curvature in Radon space , 2017, Expert Syst. Appl..
[42] Wira Hidayat Mohd Saad,et al. A Review of Finger-Vein Biometrics Identification Approaches , 2016 .
[43] A. A. Zaidan,et al. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .
[44] Ahmed Wathik Naji,et al. Optimizing security and flexibility by designing a high security system for e-government servers , 2009 .
[45] Jiankun Hu,et al. A fingerprint and finger-vein based cancelable multi-biometric system , 2018, Pattern Recognit..
[46] Shuxu Guo,et al. Segmentation for finger vein image based on PDEs denoising , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.
[47] N. Sugandhi,et al. Real time authentication system using advanced finger vein recognition technique , 2014, 2014 International Conference on Communication and Signal Processing.
[48] B. B. Zaidan,et al. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients , 2018, Health and Technology.
[49] Yilong Yin,et al. Finger vein recognition with manifold learning , 2010, J. Netw. Comput. Appl..
[50] Wei Jia,et al. Finger Vein Presentation Attack Detection Using Total Variation Decomposition , 2018, IEEE Transactions on Information Forensics and Security.
[51] B. B. Zaidan,et al. A security framework for mHealth apps on Android platform , 2018, Comput. Secur..
[52] B. B. Zaidan,et al. Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects , 2018, Journal of Medical Systems.
[53] A. A. Zaidan,et al. A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared , 2010 .
[54] B. B. Zaidan,et al. Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review , 2019, Journal of Medical Systems.
[55] A. A. Zaidan,et al. A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution , 2018, Health and Technology.
[56] Miss Laiha Mat Kiah,et al. Comprehensive review and analysis of anti-malware apps for smartphones , 2019, Telecommunication Systems.
[57] B. B. Zaidan,et al. Conceptual framework for the security of mobile health applications on Android platform , 2018, Telematics Informatics.
[58] D. Saraswady,et al. Biometric Authentication Using Fused Multimodal Biometric , 2016 .
[59] A. A. Zaidan,et al. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .
[60] Hiroyuki Suzuki,et al. Secure biometric image sensor and authentication scheme based on compressed sensing. , 2013, Applied optics.
[61] Mrunali Jadhav,et al. Implementation of an embedded hardware of FVRS on FPGA , 2015, 2015 International Conference on Information Processing (ICIP).
[62] Ahmed Wathik Naji,et al. Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography , 2009 .
[63] Christoph Busch,et al. Feature extraction from vein images using spatial information and chain codes , 2012, Inf. Secur. Tech. Rep..
[64] Kenta Takahashi,et al. Optimal sequential fusion for multibiometric cryptosystems , 2016, Inf. Fusion.
[65] A. A. Zaidan,et al. StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .
[66] Devarasan Ezhilmaran,et al. A smart computing algorithm for finger vein matching with affine invariant features using fuzzy image retrieval , 2018 .
[67] 刘通,et al. Finger-vein Pattern Restoration with Direction-Variance-Boundary Constraint Search , 2015 .
[68] B. B. Zaidan,et al. Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review , 2018, Journal of Medical Systems.
[69] A. A. Zaidan,et al. A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .
[70] B. B. Zaidan,et al. Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review , 2019, Journal of Medical Systems.
[71] Gongping Yang,et al. Singular value decomposition based minutiae matching method for finger vein recognition , 2014, Neurocomputing.
[72] Wenxin Li,et al. Finger vein verification using Occurrence Probability Matrix (OPM) , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).
[73] N. Radha,et al. Multimodal biometric template authentication of finger vein and signature using visual cryptography , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).
[74] Yihua Shi,et al. Accurate ROI localization and hierarchical hyper-sphere model for finger-vein recognition , 2019, Neurocomputing.
[75] Shahrel Azmin Suandi,et al. Finger Vein Recognition Using Local Line Binary Pattern , 2011, Sensors.
[76] Gongping Yang,et al. Finger vein verification based on a personalized best patches map , 2014, IEEE International Joint Conference on Biometrics.
[77] A. A. Zaidan,et al. Mobile Patient Monitoring Systems from a Benchmarking Aspect: Challenges, Open Issues and Recommended Solutions , 2019, Journal of Medical Systems.
[78] Zarinah Mohd Kasirun,et al. On the capacity and security of steganography approaches: An overview , 2010 .
[79] A. A. Zaidan,et al. Security improvement of credit card online purchasing system , 2011 .
[80] B. B. Zaidan,et al. Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard , 2019, Journal of Medical Systems.
[81] Bo-Chao Cheng,et al. Special point representations for reducing data space requirements of finger-vein recognition applications , 2016, Multimedia Tools and Applications.
[82] M. Z. Ibrahim,et al. A Review of Finger Vein Recognition System , 2018 .
[83] Kiran B. Raja,et al. Novel finger vascular pattern imaging device for robust biometric verification , 2014, 2014 IEEE International Conference on Imaging Systems and Techniques (IST) Proceedings.
[84] Jian Shen,et al. Finger vein secure biometric template generation based on deep learning , 2018, Soft Comput..
[85] B. B. Zaidan,et al. Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).
[86] A. A. Zaidan,et al. On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .
[87] A. A. Zaidan,et al. New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique , 2009 .
[88] Omar Zakaria,et al. An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography , 2011 .
[89] Riza Sulaiman,et al. Vein matching using artificial neural network in vein authentication systems , 2011, International Conference on Graphic and Image Processing.
[90] B. B. Zaidan,et al. Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication , 2019, Comput. Stand. Interfaces.
[91] B. B. Zaidan,et al. Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review , 2018, Journal of Medical Systems.
[92] Fei Zhou,et al. Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion , 2014, Inf. Sci..
[93] B. B. Zaidan,et al. New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.
[94] Bilal Bahaa Zaidan,et al. Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing , 2010 .
[95] B. B. Zaidan,et al. Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects , 2018, Journal of Medical Systems.
[96] Hamid A. Jalab,et al. A new system for hidden data within header space for EXE-File using object oriented technique , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[97] Hamid A. Jalab,et al. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance , 2010 .
[98] Fazida Othman,et al. Stego-Image vs Stego-Analysis System , 2009 .
[99] A. A. Zaidan,et al. Challenges of Hidden Data in the Unused Area Two within Executable Files , 2009 .
[100] Kiran B. Raja,et al. A low-cost multimodal biometric sensor to capture finger vein and fingerprint , 2014, IEEE International Joint Conference on Biometrics.
[101] Hee Chan Kim,et al. A finger-vein verification system using mean curvature , 2011, Pattern Recognit. Lett..
[102] A. A. Zaidan,et al. Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques , 2018 .
[103] Andrew Beng Jin Teoh,et al. Multi-instance finger vein recognition using minutiae matching , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[104] Yi Zhang,et al. DeepVein: Novel finger vein verification methods based on Deep Convolutional Neural Networks , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[105] Shahrel Azmin Suandi,et al. Fusion of Band Limited Phase Only Correlation and Width Centroid Contour Distance for finger based biometrics , 2014, Expert Syst. Appl..
[106] Gongping Yang,et al. Finger Vein Recognition With Anatomy Structure Analysis , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[107] Mounim A. El-Yacoubi,et al. Finger-Vein Quality Assessment by Representation Learning from Binary Images , 2015, ICONIP.
[108] B. B. Zaidan,et al. Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis , 2018, Health and Technology.
[109] B. B. Zaidan,et al. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing , 2014, Journal of Medical Systems.
[110] B. B. Zaidan,et al. A survey on communication components for IoT-based technologies in smart homes , 2018, Telecommunication Systems.
[111] Jian-Da Wu,et al. Finger-vein pattern identification using SVM and neural network technique , 2011, Expert Syst. Appl..
[112] Kang Ryoung Park,et al. Multimodal Biometric Recognition Based on Convolutional Neural Network by the Fusion of Finger-Vein and Finger Shape Using Near-Infrared (NIR) Camera Sensor , 2018, Sensors.
[113] Ahmed A. Abd El-Latif,et al. Finger-vein Verification Using Gabor Filter and SIFT Feature Matching , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[114] B. B. Zaidan,et al. Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions , 2019, Comput. Stand. Interfaces.
[115] Liu Di,et al. Two modality-based bi-finger vein verification system , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.
[116] Omar Zakaria,et al. Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard , 2010, ArXiv.
[117] Puneet Gupta,et al. An accurate finger vein based verification system , 2015, Digit. Signal Process..
[118] Mohamed Khalil,et al. Personal verification using finger vein biometrics in FPGA-based-system-on-chip , 2011 .
[119] B. B. Zaidan,et al. Overview: Main Fundamentals for Steganography , 2010, ArXiv.
[120] Jian-Da Wu,et al. Finger-vein pattern identification using principal component analysis and the neural network technique , 2011, Expert Syst. Appl..
[121] A. A. Zaidan,et al. A review of audio based steganography and digital watermarking , 2011 .
[122] Amitabh Wahi,et al. Finger vein extraction and authentication based on gradient feature selection algorithm , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).
[123] A. A. Zaidan,et al. Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review , 2013 .
[124] Jinfeng Yang,et al. Finger-vein image matching based on adaptive curve transformation , 2017, Pattern Recognit..
[125] Wenxin Li,et al. A Person Retrieval Solution Using Finger Vein Patterns , 2010, 2010 20th International Conference on Pattern Recognition.
[126] B. B. Zaidan,et al. New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files , 2010, ArXiv.
[127] Md Rafiqul Islam,et al. "Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[128] B. B. Zaidan,et al. Secure Topology for Electronic Medical Record Transmissions , 2010 .
[129] B. B. Zaidan,et al. Optimization Digital Image Watermarking Technique for Patent Protection , 2010, ArXiv.
[130] Yilong Yin,et al. Learning discriminative binary codes for finger vein recognition , 2017, Pattern Recognit..
[131] A. A. Zaidan,et al. "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[132] B. B. Zaidan,et al. Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..
[133] B. B. Zaidan,et al. Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations , 2018, Journal of Medical Systems.
[134] B. B. Zaidan,et al. Multi-Criteria Evaluation and Benchmarking for Active Queue Management Methods: Open Issues, Challenges and Recommended Pathway Solutions , 2019, Int. J. Inf. Technol. Decis. Mak..
[135] Thian Song Ong,et al. Finger Vein verification using local histogram of hybrid texture descriptors , 2015, 2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA).
[136] Ting Wu,et al. Generating stable biometric keys for flexible cloud computing authentication using finger vein , 2016, Inf. Sci..
[137] Othman Omran Khalifa,et al. Suitability of using symmetric key to secure multimedia data: an overview, , 2010 .
[138] Ya-Wen Chang,et al. Development of neural network techniques for finger-vein pattern classification , 2010, International Conference on Digital Image Processing.
[139] A. A. Zaidan,et al. New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .
[140] Mahmood Fathy,et al. A novel approach for Finger Vein verification based on self-taught learning , 2015, 2015 9th Iranian Conference on Machine Vision and Image Processing (MVIP).
[141] Jing Xiao,et al. Discriminative and generative vocabulary tree: With application to vein image authentication and recognition , 2015, Image Vis. Comput..
[142] Bilal Zaidan,et al. Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.
[143] Miss Laiha Mat Kiah,et al. Suitability of using SOAP protocol to secure electronic medical record databases transmission , 2010 .
[144] Ahmed A. Abd El-Latif,et al. Finger multibiometric cryptosystems: fusion strategy and template security , 2014, J. Electronic Imaging.
[145] Zarinah Mohd Kasirun,et al. On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .
[146] A. A. Zaidan,et al. High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain , 2018, Multimedia Tools and Applications.
[147] Jinfeng Yang,et al. Personal identification based on finger-vein features , 2011, Comput. Hum. Behav..
[148] Alejandro García-González,et al. Embedded biometric cryptosystem based on finger vein patterns , 2015, 2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).
[149] A. A. Zaidan,et al. Medical emergency triage and patient prioritisation in a telemedicine environment: a systematic review , 2019, Health and Technology.
[150] Fazidah Othman,et al. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .