Hiding minutiae data using steganography for fingerprint recognition systems
Saved in:
| Main Author: | Salehuddin Abdul Kadir |
|---|---|
| Corporate Authors: | Universiti Pertahanan Nasional Malaysia Fakulti Sains & Teknologi, Universiti Teknologi Malaysia Fakulti Sains & Teknologi |
| Format: | Thesis Book |
| Language: | English |
| Published: |
Kuala Lumpur
Fakulti Sains & Teknologi, UPNM/UTM
2005
|
| Series: | Project Sarjana Muda
Final Year Project Undergraduate Project |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
The fingerprint
by: WenworthlhPatricia
by: WenworthlhPatricia
Audio steganography
by: Muhamad Fazree Sharip
Published: (2013)
by: Muhamad Fazree Sharip
Published: (2013)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
The Science of Fingerprints Classification and Uses
by: United States. Federal Bureau of Investigation
Published: (2006)
by: United States. Federal Bureau of Investigation
Published: (2006)
Fingerprints analysis and understanding
by: Hawthorne, Mark R.
Published: (2009)
by: Hawthorne, Mark R.
Published: (2009)
Digital watermarking and steganography
by: Cox, Ingemar J.
Published: (2008)
by: Cox, Ingemar J.
Published: (2008)
Classifying fingerprints
by: Cook, Nancy
Published: (1995)
by: Cook, Nancy
Published: (1995)
Pengkelasan imej menggunakan data satelit
by: Mohd Nagid @ Najid Daud
Published: (2003)
by: Mohd Nagid @ Najid Daud
Published: (2003)
Hide and Seek
by: Collins, Wilkie, 1824-1889
Published: (2005)
by: Collins, Wilkie, 1824-1889
Published: (2005)
Sistem keselamatan data menggunakan teknik kriptografi
by: Kee, Ing Chung
Published: (2004)
by: Kee, Ing Chung
Published: (2004)
Sistem analisis data ujian kemahiran menembak
by: Nur Hazwani Ramli
Published: (2008)
by: Nur Hazwani Ramli
Published: (2008)
Hide and Seek
by: Patterson, James
Published: (1996)
by: Patterson, James
Published: (1996)
No Hiding Place
by: Smith, Richard R.
Published: (2009)
by: Smith, Richard R.
Published: (2009)
Highways in Hiding
by: Smith, George O., 1911-1981 (George Oliver)
Published: (2007)
by: Smith, George O., 1911-1981 (George Oliver)
Published: (2007)
Modul pembelajaran kawad pedang beranimasi
by: Mohd. Dahroni Abd. Kadir
Published: (2004)
by: Mohd. Dahroni Abd. Kadir
Published: (2004)
'Encrypton' data cap jari dalam proses penghantaran untuk keselamatan rangkaian
by: Salmuazhari Md. Salleh
Published: (2005)
by: Salmuazhari Md. Salleh
Published: (2005)
Prototaip sistem bantuan komunikasi dan penghantaran data menggunakan teknologi manet
by: Azizul Ab Malek
Published: (2009)
by: Azizul Ab Malek
Published: (2009)
Touchless fingerprint biometrics
by: Labati, Ruggero Donida, et al.
Published: (2016)
by: Labati, Ruggero Donida, et al.
Published: (2016)
Peningkatan keselamatan perkasasan untuk pemindahan data imej dari Kementah ke Bukit Aman
by: Ahmad Lutfi Baba
Published: (2003)
by: Ahmad Lutfi Baba
Published: (2003)
Sistem penjadualan latihan penerbangan nuri dan penyimpanan rekod data jam penerbangan Nuri
by: Muhammad Fikri Zakaria
Published: (2009)
by: Muhammad Fikri Zakaria
Published: (2009)
Fingerprint detection with lasers
by: Menzel
Published: (1999)
by: Menzel
Published: (1999)
Pengecaman cap jari menggunakan kaedah nearest neighbour dan feature matching
by: Rohaizam Abdul Hamid
Published: (2002)
by: Rohaizam Abdul Hamid
Published: (2002)
Sistem penyelenggaraan kenderaan 74 woksyop divisyen jurutera letrik jentera
by: Qahfy Abdul Rahman
Published: (2009)
by: Qahfy Abdul Rahman
Published: (2009)
Sistem audit dalaman ISO 9001:9002 UPNM
by: Zulhazrin Abdul Mutalib
Published: (2008)
by: Zulhazrin Abdul Mutalib
Published: (2008)
Pengecaman cap jari menggunakan kaedah pemadanan piksel berdasarkan pengkelas 'nearest neighbour'
by: Abdul Latif Radzaly
Published: (2002)
by: Abdul Latif Radzaly
Published: (2002)
Sistem Keselamatan Utusan dan Berita Tentera menggunakan konsep jadual Vigenere
by: Abdul Haadi Aid
Published: (2004)
by: Abdul Haadi Aid
Published: (2004)
Sistem khutbah Jumaat bermultimedia bagi modul penyediaan teks khutbah
by: Nurul Durrani Abdul Rahim
Published: (2005)
by: Nurul Durrani Abdul Rahim
Published: (2005)
Sistem pengesanan steganografi untuk fail sisipan JPEG yang dihantar menggunakan e-mel (Stegasniff)
by: Mohd Lazim Abdul Raoh
Published: (2009)
by: Mohd Lazim Abdul Raoh
Published: (2009)
Pembelajaran berbantukan komputer senjata M203 Grenade Launcher 40mm
by: Mohamad Fitri Abdul Halim
Published: (2003)
by: Mohamad Fitri Abdul Halim
Published: (2003)
Sistem pengurusan aktiviti kaunseling
by: Muralinthiran Murugan
Published: (2005)
by: Muralinthiran Murugan
Published: (2005)
Sistem jadual waktu tahun asas menggunakan teknik berasaskan kes
by: Mohd. Asraf Abd. Kahar
Published: (2005)
by: Mohd. Asraf Abd. Kahar
Published: (2005)
Sistem jadual waktu tahun asas menggunakan teknik rangkaian neural
by: Ramle Ab. Samat
Published: (2005)
by: Ramle Ab. Samat
Published: (2005)
Khutbah Jumaat bermultimedia bagi modul pengesanan latar belakang paparan (Biometrik) khutbah bermultimedia
by: Hartini Md. Amin
Published: (2005)
by: Hartini Md. Amin
Published: (2005)
Sistem maklumat projek sarjana muda sains komputer secara atas talian
by: Mohd Shaizrai Shukri
Published: (2005)
by: Mohd Shaizrai Shukri
Published: (2005)
Sistem pendaftaran pensyarah dan pegawai di Wisma Pendeta
by: Mohd Isyraqy Mustafa
Published: (2005)
by: Mohd Isyraqy Mustafa
Published: (2005)
Sistem e-pembelajaran taekwondo secara multimedia
by: Janaziah Hasan
Published: (2005)
by: Janaziah Hasan
Published: (2005)
Portal perubatan penyakit kanak-kanak RSAT bagi demam,batuk dan selsema
by: Mohd Arif Ahmad Suparman
Published: (2005)
by: Mohd Arif Ahmad Suparman
Published: (2005)
Keselamatan imej cap jari dengan menggunakan kaedah watermaking
by: Nurzasya Abd Rahim
Published: (2005)
by: Nurzasya Abd Rahim
Published: (2005)
Sistem pembelajaran prosedur percakapan radio (Semboyan) secara e-pembelajaran
by: Adi Mustapha Arifin
Published: (2005)
by: Adi Mustapha Arifin
Published: (2005)
Similar Items
-
Information hiding techniques for steganography and digital watermarking
by: lh -
The fingerprint
by: WenworthlhPatricia -
Audio steganography
by: Muhamad Fazree Sharip
Published: (2013) -
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013) -
The Science of Fingerprints Classification and Uses
by: United States. Federal Bureau of Investigation
Published: (2006)