Search Results - "Ali, Syed Sadaf"

Refine Results
  1. 1

    Facet-Level Segmentation of 3d Textures on Cultural Heritage Objects by Ganapathi, Iyyakutti Iyappan, Sadaf Ali, Syed, Owais, Muhammad, Gour, Neha, Javed, Sajid, Werghi, Naoufel

    “…Textures in 3D meshes exhibit intrinsic surface variations and are indispensable for various applications, such as retrieval, segmentation, and classification…”
    Get full text
    Conference Proceeding
  2. 2

    Polynomial Vault: A Secure and Robust Fingerprint based Authentication by Ali, Syed Sadaf, Ganapathi, Iyyakutti Iyappan, Mahyo, Sajid, Prakash, Surya

    “…Fingerprint matching is one of the extensively used tools to authenticate users. It has been accepted by governments of various countries to authenticate their…”
    Get full text
    Journal Article
  3. 3

    Adaptation of Pair-Polar Structures to Compute a Secure and Alignment-Free Fingerprint Template by Baghel, Vivek Singh, Ali, Syed Sadaf, Prakash, Surya

    “…The unalterable nature of fingerprint biometrics leads to permanent identity loss of a user if an original fingerprint template is compromised. Moreover, it is…”
    Get full text
    Journal Article
  4. 4

    A non‐invertible transformation based technique to protect a fingerprint template by Baghel, Vivek Singh, Ali, Syed Sadaf, Prakash, Surya

    Published in IET image processing (01-11-2023)
    “…A fingerprint‐based authentication system provides security to the applications of numerous fields and usually stores minutiae information in the database as a…”
    Get full text
    Journal Article
  5. 5

    PH-GCN: Boosting Human Action Recognition Through Multi-Level Granularity With Pair-Wise Hyper GCN by Alsarhan, Tamam, Ali, Syed Sadaf, Ganapathi, Iyyakutti Iyappan, Ali, Ahmad, Werghi, Naoufel

    Published in IEEE access (2024)
    “…Recently, there has been a surge of interest in utilizing Graph Convolutional Networks (GCNs) for skeleton- based action recognition, where learning effective…”
    Get full text
    Journal Article
  6. 6

    A Novel Technique for Fingerprint Based Secure User Authentication by Ali, Syed Sadaf, Baghel, Vivek Singh, Ganapathi, Iyyakutti Iyappan, Prakash, Surya, Vu, Ngoc-Son, Werghi, Naoufel

    “…Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique…”
    Get full text
    Journal Article
  7. 7

    3-Dimensional Secured Fingerprint Shell by Ali, Syed Sadaf, Prakash, Surya

    Published in Pattern recognition letters (01-09-2019)
    “…•An analysis of the shortcomings of Fingerprint Shell (an existing technique) are displayed.•Proposed technique is highly secured and robust for fingerprint…”
    Get full text
    Journal Article
  8. 8

    Human Action Recognition with Multi-Level Granularity and Pair-Wise Hyper GCN by Alsarhan, Tamam, Ali, Syed Sadaf, Alsarhan, Ayoub, Ganapathi, Iyyakutti Iyappan, Werghi, Naoufel

    “…Lately, there has been a surge in interest in utilizing Graph Convolutional Networks (GCNs) for the purpose of action recognition using skeletal data. In order…”
    Get full text
    Conference Proceeding
  9. 9

    Enhanced authentication system with robust features for the secure user template by Ali, Syed Sadaf, Ganapathi, Iyyakutti Iyappan, Alsarhan, Tamam, Werghi, Naoufel

    “…Biometrics has evolved into a crucial instrument for a user's authentication in the modern world. Biometrics is gaining prominence as a method of…”
    Get full text
    Conference Proceeding
  10. 10

    3D-TexSeg: Unsupervised Segmentation of 3D Texture Using Mutual Transformer Learning by Ganapathi, Iyyakutti Iyappan, Dharejo, Fayaz Ali, Javed, Sajid, Ali, Syed Sadaf, Werghi, Naoufel

    “…Analysis of the 3D Texture is indispensable for various tasks, such as retrieval, segmentation, classification, and inspection of sculptures, knitted fabrics,…”
    Get full text
    Conference Proceeding
  11. 11

    FinTem: A secure and non-invertible technique for fingerprint template protection by Hayat, Amber, Ali, Syed Sadaf, Bhateja, Ashok Kumar, Werghi, Naoufel

    Published in Computers & security (01-07-2024)
    “…In today’s automated society, authentication has become a necessity. Fingerprint-based authentication is the predominant choice due to its advantages. However,…”
    Get full text
    Journal Article
  12. 12

    B3D-EAR: Binarized 3D descriptors for ear-based human recognition by Ganapathi, Iyyakutti Iyappan, Ali, Syed Sadaf, Prakash, Surya, Bakshi, Sambit, Werghi, Naoufel

    Published in Expert systems with applications (01-09-2024)
    “…Traditional 3D feature descriptors often utilize real-valued vectors, posing challenges in terms of computational complexity and space constraints during…”
    Get full text
    Journal Article
  13. 13

    Unsupervised Dual Transformer Learning for 3-D Textured Surface Segmentation by Ganapathi, Iyyakutti Iyappan, Dharejo, Fayaz Ali, Javed, Sajid, Ali, Syed Sadaf, Werghi, Naoufel

    “…Analysis of the 3-D texture is indispensable for various tasks, such as retrieval, segmentation, classification, and inspection of sculptures, knit fabrics,…”
    Get full text
    Journal Article
  14. 14

    Securing biometric user template using modified minutiae attributes by Ali, Syed Sadaf, Ganapathi, Iyyakutti Iyappan, Prakash, Surya, Consul, Pooja, Mahyo, Sajid

    Published in Pattern recognition letters (01-01-2020)
    “…•Modified Minutiae Attributes are used to secure the fingerprint user template.•The proposed technique is robust to translation and rotation.•The proposed…”
    Get full text
    Journal Article
  15. 15

    Robust biometric authentication system with a secure user template by Ali, Syed Sadaf, Baghel, Vivek Singh, Ganapathi, Iyyakutti Iyappan, Prakash, Surya

    Published in Image and vision computing (01-12-2020)
    “…Biometric feature based human authentication systems provide various advantages over the classical authentication systems. Out of numerous biometric features…”
    Get full text
    Journal Article
  16. 16

    RHEMAT: Robust human ear based multimodal authentication technique by Ganapathi, Iyyakutti Iyappan, Ali, Syed Sadaf, Sharma, Uttam, Tomar, Pradeep, Owais, Muhammad, Werghi, Naoufel

    Published in Computers & security (01-09-2023)
    “…•In this paper, we proposed a technique for 3D ear recognition accompanying their co-registered 2D images.•Texture and geometrical information are combined for…”
    Get full text
    Journal Article
  17. 17

    Geometric statistics-based descriptor for 3D ear recognition by Ganapathi, Iyyakutti Iyappan, Ali, Syed Sadaf, Prakash, Surya

    Published in The Visual computer (2020)
    “…Several feature keypoint detection and description techniques have been proposed in the literature for 3D shape recognition. These techniques work well in…”
    Get full text
    Journal Article
  18. 18

    Learning to localize image forgery using end-to-end attention network by Ganapathi, Iyyakutti Iyappan, Javed, Sajid, Ali, Syed Sadaf, Mahmood, Arif, Vu, Ngoc-Son, Werghi, Naoufel

    Published in Neurocomputing (Amsterdam) (01-11-2022)
    “…Recent advancements have increased the prevalence of digital image tampering. Anyone can manipulate multimedia content using editing software to alter the…”
    Get full text
    Journal Article
  19. 19

    3D-TexSeg: Unsupervised Segmentation of 3D Texture using Mutual Transformer Learning by Ganapathi, Iyyakutti Iyappan, Ali, Fayaz, Javed, Sajid, Ali, Syed Sadaf, Werghi, Naoufel

    Published 17-11-2023
    “…Analysis of the 3D Texture is indispensable for various tasks, such as retrieval, segmentation, classification, and inspection of sculptures, knitted fabrics,…”
    Get full text
    Journal Article
  20. 20

    Enhanced fingerprint shell by Ali, Sadaf Syed, Prakash, Surya

    “…Most of the fingerprint based biometric systems directly store fingerprint information in the form of minutiae template. A fingerprint is permanently…”
    Get full text
    Conference Proceeding