{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:15:53Z","timestamp":1730258153700,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/icsipa.2013.6708031","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T20:06:33Z","timestamp":1389384393000},"page":"349-353","source":"Crossref","is-referenced-by-count":3,"title":["Experimental approach on thresholding using reverse biorthogonal wavelet decomposition for eye image"],"prefix":"10.1109","author":[{"given":"Zaheera Zainal","family":"Abidin","sequence":"first","affiliation":[]},{"given":"Mazani","family":"Manaf","sequence":"additional","affiliation":[]},{"given":"Abdul Samad","family":"Shibhgatullah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68017-8_111"},{"key":"17","first-page":"16","volume":"1","author":"ghasemi","year":"2011","journal-title":"High Capacity Image Steganography UsingWavelet Transform and Genetic Algorithm"},{"key":"18","first-page":"132","volume":"1","author":"pathania","year":"2012","journal-title":"Approach for Finding Residual of Image with the Help of 2-D Wavelet Compression System in Order to Display Level of Tendency and"},{"key":"15","first-page":"1","author":"zujovic","year":"2013","journal-title":"Structural Texture Similarity Metrics for Image Analysis and Retrieval"},{"key":"16","first-page":"661","article-title":"Iris Biometrics Recognition Application in Security Management","author":"shinde","year":"2008","journal-title":"2008 Congress on Image and Signal Processing"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753135"},{"key":"14","volume":"2","author":"judice","year":"2013","journal-title":"A Novel Approach on Image Steganographic Methods for Optimum Hiding Capacity"},{"journal-title":"1D Wavelet Transform and Geosciences","year":"2011","author":"ouadfeul","key":"11"},{"journal-title":"National Biometrics Technology Roadmap","year":"2008","author":"berhad","key":"12"},{"journal-title":"On Exploiting Wavelet Bases in Statistical Region-based Segmentation","year":"0","author":"stegmann","key":"21"},{"key":"20","first-page":"10","volume":"39","author":"kejgir","year":"2012","journal-title":"Lifting Wavelet Transform with Singular Value Decomposition for Robust Digital Image Watermarking"},{"key":"22","first-page":"135","author":"malayeri","year":"0","journal-title":"Noise Wavelet Evaluating Near to Zero by Thresholding Method Analyzing"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689508"},{"journal-title":"Segmentation of Bone Structures in Magnetic Resonance Images (MRI) for Human Hand Skeletal Kinematics Modelling","year":"2011","author":"rusu","key":"24"},{"journal-title":"Image Processing with Wreath Products","year":"2004","author":"chang","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1006"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176324452"},{"journal-title":"From model selection to adaptive estimation","year":"1981","author":"birg","key":"28"},{"key":"3","first-page":"22","volume":"58","author":"jabade","year":"2012","journal-title":"Logo Based Image Copyright Protection Using Discrete Wavelet Transform and Fuzzy Inference System"},{"key":"2","first-page":"32","author":"bojamma","year":"2013","journal-title":"Biometric System Security"},{"key":"10","first-page":"129","article-title":"Optimized Hybrid Image Security Scheme For Copyright Protection","volume":"9","author":"kuppusamy","year":"2013","journal-title":"Authentication and Confidentiality Using PSO"},{"key":"1","first-page":"88","volume":"15","author":"manikandan","year":"2013","journal-title":"A New Approach for Secure Data Transfer Based on Wavelet Transform"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.5121\/ijcis.2013.3103"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166069"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI-CC.2012.6311152"},{"key":"4","first-page":"105","volume":"7","author":"taherian","year":"2013","journal-title":"Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network"},{"key":"9","first-page":"633","author":"keat","year":"2007","journal-title":"Enhance Performance of Secure Image Using Wavelet Compression"},{"key":"8","first-page":"757","author":"arabia","year":"2012","journal-title":"Pixel-Value Differencing Steganography Attacks and Improvements"}],"event":{"name":"2013 IEEE International Conference on Signal and Image Processing Applications (ICSIPA)","start":{"date-parts":[[2013,10,8]]},"location":"Melaka, Malaysia","end":{"date-parts":[[2013,10,10]]}},"container-title":["2013 IEEE International Conference on Signal and Image Processing Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6690583\/6707955\/06708031.pdf?arnumber=6708031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T18:05:43Z","timestamp":1490205943000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6708031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icsipa.2013.6708031","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}