default search action
Nandita Bhattacharjee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j4]Omid Zanganeh, Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Quality Controlled Region-Based PartialFingerprint Recognition. J. Mobile Multimedia 14(2): 123-156 (2018) - [c26]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). ACISP 2018: 558-576 - [c25]Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Parameter Recovery Using Radon Transform. MoMM 2018: 34-43 - [i1]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). IACR Cryptol. ePrint Arch. 2018: 379 (2018) - 2017
- [c24]Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee:
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties. ISPEC 2017: 297-319 - [c23]Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Transformational Approach for Alignment-free Image Matching Applications. MoMM 2017: 49-57 - 2016
- [c22]Komal Komal, David W. Albrecht, Nandita Bhattacharjee, Bala Srinivasan:
A Region-based Alignment-free Partial Fingerprint Matching. MoMM 2016: 63-70 - 2015
- [j3]Wilson Abel Alberto Torres, Nandita Bhattacharjee, Bala Srinivasan:
Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int. J. Pervasive Comput. Commun. 11(2): 151-168 (2015) - [c21]Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan:
Partial Fingerprint Alignment and Matching Through Region-Based Approach. MoMM 2015: 275-284 - 2014
- [c20]Omid Zanganeh, Bala Srinivasan, Nandita Bhattacharjee:
Partial Fingerprint Matching through Region-Based Similarity. DICTA 2014: 1-8 - [c19]Wilson Abel Alberto Torres, Nandita Bhattacharjee, Bala Srinivasan:
Effectiveness of Fully Homomorphic Encryption to Preserve the Privacy of Biometric Data. iiWAS 2014: 152-158 - [c18]Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan:
Partial Fingerprint Identification Through Correlation-based Approach. SECRYPT 2014: 275-284 - 2012
- [c17]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
Increasing level of confidence of iris biometric matching. IJCNN 2012: 1-8 - [c16]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
Fingerprint reference point detection based on local ridge orientation patterns of fingerprints. IJCNN 2012: 1-8 - [c15]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
A method for fingerprint alignment and matching. MoMM 2012: 297-301 - [c14]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
How confident are you to counter uncertainty? SECURIT 2012: 116-125 - 2011
- [j2]Li Wang, Bala Srinivasan, Nandita Bhattacharjee:
Security Analysis and Improvements on WLANs. J. Networks 6(3): 470-481 (2011) - [c13]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
A novel technique for singular point detection based on Poincaré index. MoMM 2011: 12-18 - [c12]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
On the commonality of iris biometrics. MoMM 2011: 19-25 - 2010
- [j1]Nandita Bhattacharjee, Chien Eao Lee:
Fingerprint Image Processing and Fuzzy Vault Implementation. J. Mobile Multimedia 6(4): 314-338 (2010) - [c11]Yang Liang, Nandita Bhattacharjee, Xiaodong Meng:
A Secure Image Watermarking Scheme for Image Copy Control and Copyright Protection Using Biometrics. Security and Management 2010: 123-129 - [c10]Xiaodong Meng, Nandita Bhattacharjee:
Blind Audio Watermarking Based on Neighbouring Energy Feature. Security and Management 2010: 419-425 - [c9]Xiaodong Meng, Nandita Bhattacharjee, Yang Liang:
An Improved Audio Watermarking Against Synchronization Attack. IPCV 2010: 236-241 - [c8]Li Wang, Nandita Bhattacharjee, Gopal Gupta, Bala Srinivasan:
Adaptive approach to fingerprint image enhancement. MoMM 2010: 42-49 - [c7]Parman Sukarno, Mieng Phu, Nandita Bhattacharjee, Bala Srinivasan:
Increasing error tolerance in biometric systems. MoMM 2010: 50-55
2000 – 2009
- 2009
- [c6]Nitin K. Mahadeo, Nandita Bhattacharjee:
An Efficient and Accurate Iris Segmentation Technique. DICTA 2009: 347-352 - [c5]Chien Eao Lee, Nandita Bhattacharjee:
Fingerprint image processing and minutiae extraction for fuzzy vault. MoMM 2009: 36-43 - [c4]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
An effective crypto-biometric system for secure email in wireless environment. MoMM 2009: 241-245 - 2008
- [c3]Qikan Fang, Nandita Bhattacharjee:
Incremental Fingerprint Recognition Model for Distributed Authentication. Security and Management 2008: 41-47 - [c2]Parman Sukarno, Nandita Bhattacharjee:
Authentication Architecture Based on Crypto-Biometric Systems. Security and Management 2008: 638-644 - 2001
- [c1]Andrew P. Paplinski, Nandita Bhattacharjee, Charles Greif:
Rotating Ultrasonic Signal Vectors with a Word-Parallel CORDIC Processor. DSD 2001: 254-261
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 00:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint