Tohari Ahmad
Tohari Ahmad
Verified email at
TitleCited byYear
Pair-polar coordinate-based cancelable fingerprint templates
T Ahmad, J Hu, S Wang
Pattern Recognition 44 (10-11), 2555-2564, 2011
A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment
K Xi, T Ahmad, F Han, J Hu
Security and Communication Networks 4 (5), 487-499, 2011
Hybrid Association Rule Learning and Process Mining for Fraud Detection.
R Sarno, RD Dewandono, T Ahmad, MF Naufal, F Sinaga
IAENG International Journal of Computer Science 42 (2), 2015
An efficient mobile voting system security scheme based on elliptic curve cryptography
T Ahmad, J Hu, S Han
2009 Third International Conference on Network and System Security, 474-479, 2009
Generating cancelable biometrie templates using a projection line
T Ahmad, J Hu
2010 11th International Conference on Control Automation Robotics & Vision, 7-12, 2010
Falls detection and notification system using tri-axial accelerometer and gyroscope sensors of a smartphone
W Wibisono, DN Arifin, BA Pratomo, T Ahmad, RM Ijtihadie
2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013
String-based cancelable fingerprint templates
T Ahmad, J Hu, S Wang
2011 6th IEEE Conference on Industrial Electronics and Applications, 1028-1033, 2011
Fuzzy MADM approach for Rating of Process-based Fraud
S Huda, R Sarno, T Ahmad
Journal of ICT Research and Applications 9 (2), 111-128, 2015
An Improved Quad and RDE-based Medical Data Hiding Method
T Ahmad, M Holil, W Wibisono, RM Ijtihadie
CYBERNETICSCOM, 141-145, 2013
Identification of Process-based Fraud Patterns in Credit Application
S Huda, T Ahmad, R Sarno, HA Santoso
Cartesian and polar transformation-based cancelable fingerprint template
T Ahmad, F Han
IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society …, 2011
Increasing accuracy of process-based fraud detection using a behavior model
S Huda, R Sarno, T Ahmad
International Journal of Software Engineering and Its Applications 10 (5 …, 2016
Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images
MHA Al Huti, T Ahmad, S Djanali
2015 International Conference on Information & Communication Technology and …, 2015
Secret data hiding by optimizing general smoothness difference expansion-based method
M Holil, T Ahmad
Journal of Theoretical and Applied Information Technology 72 (2), 155-163, 2015
Medical Record Protection with Improved GRDE Data Hiding Method on Audio Files.
MB Andra, T Ahmad, T Usagawa
Engineering Letters 25 (2), 2017
Shared secret-based steganography for protecting medical data
T Ahmad, H Studiawan, HS Ahmad, RM Ijtihadie, W Wibisono
2014 International Conference on Computer, Control, Informatics and Its …, 2014
Increasing the Performance of Difference Expansion-based Steganography when Securing Medical Data
T Ahmad, M Holil
Smart Computing Review 4 (4), 307-322, 2014
Audio Data Hiding Based on Sample Value Modification Using Modulus Function.
A Al-Hooti, M Hatem, S Djanali, T Ahmad
Journal of information processing systems 12 (3), 2016
An improved neighbouring similarity method for video steganography
DM Firmansyah, T Ahmad
2016 4th International Conference on Cyber and IT Service Management, 1-5, 2016
Enhancing the Capability of Data Hiding Method Based on Reduced Difference Expansion.
P Maniriho, T Ahmad
Engineering Letters 26 (1), 2018
The system can't perform the operation now. Try again later.
Articles 1–20