Author of the publication

AN EFFICIENT FEATURE EXTRACTION METHOD WITH PSEUDO-ZERNIKE MOMENT FOR FACIAL RECOGNITION OF IDENTICAL TWINS

, and . International Journal of Computational Science and Information Technology (IJCSITY), 2 (1): 1 -7 (February 2014)
DOI: 10.5121/ijcsity.2014.2101

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Fractal Codes in Recognition of Isolated Handwritten Farsi/Arabic Characters and Numerals., , and . PRIS, page 202-209. INSTICC Press, (2004)Local Region Pseudo-Zernike Moment- Based Feature Extraction for Facial Recognition of Identical Twins, and . Advanced Computational Intelligence: An International Journal (ACII), 1 (1): 8 (July 2014)Digital realization of the proposed linear model of the Hodgkin-Huxley neuron., , and . I. J. Circuit Theory and Applications, 47 (3): 483-497 (2019)Towards Fountain Codes. Part II: Belief Propagation Decoding., , and . Wireless Personal Communications, 77 (2): 1563-1584 (2014)A novel threshold-based scan detection method using genetic algorithm., , and . SIN, page 436-439. ACM, (2013)Gender Classification Using a Novel Gait Template: Radon Transform of Mean Gait Energy Image., and . ICIAR (2), volume 6754 of Lecture Notes in Computer Science, page 161-169. Springer, (2011)A New Steganography Based on chi2 Technic., , and . CIARP, volume 5856 of Lecture Notes in Computer Science, page 1062-1069. Springer, (2009)Deformable Generic Elastic Models from a single 2D image for facial expression and large pose face together synthesis and recognition., , and . ICDSC, page 1-6. IEEE, (2013)Image Encryption through Using Chaotic Function and Graph., and . ICCVG (1), volume 6374 of Lecture Notes in Computer Science, page 352-359. Springer, (2010)Detection of perturbed quantization (PQ) steganography based on empirical matrix., , and . ISeCure, 2 (2): 119-128 (2010)