


default search action
ISBAST 2014: Kuala Lumpur, Malaysia
- 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014. IEEE 2014, ISBN 978-1-4799-6444-4

- Shukor Abd Razak

:
Preface. iii
Track 1: Biometric Technologies
- Xi Chen, Wen Li, Zengli Liu, Zaihong Zhou:

Fractional low-order independent component analysis for face recognition robust to partial occlusion. 1-5 - Xi Chen, Luping Zheng, Zengli Liu, Jiashu Zhang:

Privacy-preserving biometrics using matrix random low-rank approximation approach. 6-12 - Eduardo Cermeño, Silvana Mallor, Juan A. Sigüenza

:
Offline handwriting segmentation for writer identification. 13-17 - Hengjian Li, Jinwen Dong, Jinping Li:

Two-dimensional direct discriminant locality preserving projection analysis for face recognition. 18-23 - C. P. Sumathi, M. Mahadevi

:
Comparative analysis of skin color model for face detection. 24-28 - Mohd. Zamri Osman

, Mohd Aizaini Maarof, Mohd. Foad Rohani:
Improved skin detection based on dynamic threshold using multi-colour space. 29-34 - Isao Nakanishi, Takashi Inada, Shigang Li:

New dedicated measuring devices for intra-palm propagation signals. 35-38 - Sim Hiew Moi, Hishammuddin Asmuni, Rohayanti Hassan, Razib M. Othman:

A unified approach for unconstrained off-angle iris recognition. 39-44 - Malek Najib Omar, Mazleena Salleh, Majid Bakhtiari:

Biometric encryption to enhance confidentiality in Cloud computing. 45-50 - Sisanda Makinana, Johannes J. Van Der Merwe, Tendani Malumedzha:

A fourier transform quality measure for iris images. 51-56 - Fajri Kurniawan, Mohd Shafry Mohd Rahim, Mohammed S. Khalil

:
Geometrical and eigenvector features for ear recognition. 57-62 - Robert T. Hans

:
Using a biometric system to check-in and check-out luggage at airports. 63-66 - Selma Elnasir

, Siti Mariyam Shamsuddin:
Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier. 67-72 - Ali Sharifara, Mohd Shafry Mohd Rahim, Yasaman Anisi:

A general review of human face detection including a study of neural networks and Haar feature-based cascade classifier in face detection. 73-78 - Eimad Abdu Abusham

:
Face verification using Local Graph Stucture (LGS). 79-83 - Cynthia S. Mlambo, Fulufhelo V. Nelwamondo, Mmamolatelo E. Mathekga:

Comparison of effective hough transform-based fingerprint alignment approaches. 84-89 - Syed Mohd Zahid Syed Zainal Ariffin

, Nursuriati Jamil
:
Cross-band ear recognition in low or variant illumination environments. 90-94 - Behzad Shoarian Satari, Nor Azlina Abd Rahman

, Zety Marla Zainal Abidin:
Face recognition for security efficiency in managing and monitoring visitors of an organization. 95-101
Track 2: Security Mechanisms
- Ahmad A. H. El Farra, Edmond Zahedi:

Interactive educational tool for teaching a simple cipher. 102-105 - Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol Abdullah

:
A review of cloud security based on cryptographic mechanisms. 106-111 - Rong-Jian Chen, Jhen-Wun Fan, Chin-Hao Liao:

Reconfigurable Galois Field multiplier. 112-115 - Saru Kumari

, Muhammad Khurram Khan
, Xiong Li
, Rahul Kumar:
Notes on "a password-based remote user authentication scheme without smart card". 116-119 - Xiong Li

, Muhammad Khurram Khan
, Saru Kumari
, Junguo Liao, Wei Liang
:
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture. 120-123 - Lu Leng, Ming Li, Andrew Beng Jin Teoh

:
Matching reduction of 2DPalmHash Code. 124-128 - Natasha Arjumand Shoaib Mirza, Haider Abbas

, Farrukh Aslam Khan
, Jalal Al-Muhtadi
:
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms. 129-132 - Xianfeng Guo, Xiaomin Wang:

Cryptanalysis and improvement of a chaotic key agreement scheme. 133-136 - Dieynaba Mall, Karim Konaté, Al-Sakib Khan Pathan

:
SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks. 137-143 - Saeid Bakhtiari, Subariah Ibrahim, Mazleena Salleh, Majid Bakhtiari:

JPEG mage encryption with Elliptic Curve Cryptography. 144-149 - Wenyang Liu, Xiaomin Wang, Wenfang Zhang, Xianfeng Guo:

A lightweight blockcipher based on chaotic maps. 150-155 - Noor Afiza Mohd Ariffin

, Nor Fazlida Mohd Sani:
Plan recognition scheme using multi-factors authentication for smart card online system. 156-160 - Chng Chern Wei:

DNA approach for password conversion generator. 161-165 - Yuan Tian, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma

:
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration. 166-170 - Seyed-Mohsen Ghoreishi, Shukor Abd Razak

, Ismail Fauzi Isnin, Hassan Chizari:
Security evaluation over lightweight cryptographic protocols. 171-175 - Shabnam Kasra Kermanshahi

, Mazleena Salleh:
An enhanced certificateless cryptosystem for mobile ad hoc networks. 176-181 - Waleed Halboob, Ali Mamat, Ramlan Mahmod:

Push-based XML access control policy languages: A review. 182-187 - Seyed-Mohsen Ghoreishi, Shukor Abd Razak

, Ismail Fauzi Isnin, Hassan Chizari:
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings. 188-192
Track 3: Information Security Solutions
- Ali Feizollah

, Nor Badrul Anuar
, Rosli Salleh
, Fairuz Amalina
:
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. 193-197 - Adeyemi R. Ikuesan

, Shukor Abd Razak
, Mazleena Salleh:
A psychographic framework for online user identification. 198-203 - Reza Adinehnia, Nur Izura Udzir

, Lilly Suriani Affendey, Iskandar Ishak, Zurina Mohd Hanapi
:
Effective mining on large databases for intrusion detection. 204-207 - Muhammad Syafiq bin Samsi, Shukor Abd Razak

:
A mechanism for privacy preserving in healthcare organizations. 208-213 - Hiba Zuhair Zeydan, Ali Selamat, Mazleena Salleh:

Survey of anti-phishing tools with detection capabilities. 214-219 - Seyed-Mohsen Ghoreishi, Shukor Abd Razak

, Ismail Fauzi Isnin, Hassan Chizari:
Rushing attack against routing protocols in Mobile Ad-Hoc Networks. 220-224 - Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyu Ho Park:

I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification. 225-231 - Warusia Yassin

, Nur Izura Udzir
, Azizol Abdullah
, Mohd Taufik Abdullah, Hazura Zulzalil
, Zaiton Muda:
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers. 232-237 - Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof:

Malware behavior image for malware variant identification. 238-243 - Taqwa Ahmed, Maheyzah Md Siraj, Anazida Binti Zainal, Mazura Mat Din

:
A taxonomy on intrusion alert aggregation techniques. 244-249 - Abba Babakura, Md Nasir Sulaiman, Mahmud A. Yusuf:

Improved method of classification algorithms for crime prediction. 250-255 - Biao Song, Yuan Tian, Bingyin Zhou

:
Design and Evaluation of Remote Video Surveillance System on Private Cloud. 256-262 - Mohammed A. Saleh

, Azizah Abdul Manaf:
Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks. 263-267 - Mehdi Barati, Azizol Abdullah

, Nur Izura Udzir
, Ramlan Mahmod, Norwati Mustapha:
Distributed Denial of Service detection using hybrid machine learning technique. 268-273 - Mohammd Reza Rostami, Meisam Eslahi, Bharanidharan Shanmugam

, Zuraini Ismail:
Botnet evolution: Network traffic indicators. 274-279 - Mohammed Faez Al-Jaberi, Anazida Zainal:

Data integrity and privacy model in cloud computing. 280-284
Track 4: Secure Image Processing
- Iman Omidvar Tehrani, Subariah Ibrahim:

An enhanced fuzzy c-means medical segmentation algorithm. 285-289 - Fajri Kurniawan, Mohammed S. Khalil

, Muhammad Khurram Khan
, Yasser M. Alginahi:
DWT+LSB-based fragile watermarking method for digital Quran images. 290-297 - Nelmiawati, Mazleena Salleh, Malek Najib Omar:

Pixel-based dispersal scheme for medical image survivability and confidentiality. 298-303 - Omar Tayan

, Yasser M. Alginahi:
A review of recent advances on multimedia watermarking security and design implications for digital Quran computing. 304-309
Track 5: Security Management
- Doaa Saleh Abobakr Baras, Siti Hajar Othman, Mohammad Nazir Ahmad

, Norafida Ithnin
:
Towards managing information security knowledge through metamodelling approach. 310-315 - Ahmed Yousuf Jama

, Maheyzah Md Siraj, Rashidah Kadir:
Towards metamodel-based approach for Information Security Awareness Management. 316-321 - Arafat Mohammed Rashad Al-Dhaqm, Siti Hajar Othman, Shukor Abd Razak

, Md. Asri Ngadi:
Towards adapting metamodelling technique for database forensics investigation domain. 322-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














