Dr. David Chek Ling Ngo

Professor
Sunway University, Malaysia


Highest Degree
Ph.D. in Computer Science from Trinity College Dublin, Dublin, Ireland

Share this Profile

Area of Interest:

Computer Sciences
Biometrics
Computational Intelligence
Network
Computer Application

Selected Publications

  1. Song, O,T., A.B.J. Teoh and D.C.L. Ngo, 2008. Application-specific key release scheme from biometrics. Int. J. Network Security, 6: 127-133.
    Direct Link  |  

  2. Yip, W.K., A.B.J. Teoh and D.C.L. Ngo, 2007. Secure hashing of dynamic hand signatures using wavelet-fourier compression with BioPhasor mixing and discretization. EURASIP J. Adv. Signal Process., 2007: 8-10.1155/2007/59125.
    Direct Link  |  

  3. Pang, Y.H., A.B.J. Teoh and D.N.C. Ling, 2007. Two-factor cancelable biometrics authenticator. J. Comput. Sci. Technol., 22: 54-59.
    CrossRef  |  Direct Link  |  

  4. Yip, W.K., A.B.J. Teoh and D.N.C. Ling, 2006. Replaceable and securely hashed keys from online signatures. IEICE Electron. Express, 3: 410-416.
    CrossRef  |  Direct Link  |  

  5. Teoh, A.B.J., A. Goh and D.N.C. Ling, 2006. Random multispace quantization as an analytic mechanism for bioHashing of biometric and random identity inputs. IEEE. Trans. Pattern Anal. Mach. Intell., 28: 1892-1901.
    CrossRef  |  PubMed  |  Direct Link  |  

  6. Teoh, A., B. Jin, T. Connie, D. Ngo and C. Ling, 2006. Remarks on BioHash and its mathematical foundation. Inf. Process. Lett., 100: 145-150.
    CrossRef  |  Direct Link  |  

  7. Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2006. A discriminant pseudo zernike moments in face recognition. J. Res. Pract. Inform. Technol., 38: 197-211.
    Direct Link  |  

  8. Ngo, D.C.L., A.B.J. Teoh and A. Goh, 2006. Biometric hash: High-confidence face recognition. IEEE Trans. Circuits Syst. Video Technol., 16: 771-775.
    CrossRef  |  Direct Link  |  

  9. Chong, S.C., A.B.J. Teoh and D.C.L. Ngo, 2006. High security iris verification system based on random secret integration. Comput. Vision Image Understanding, 102: 169-177.
    CrossRef  |  Direct Link  |  

  10. Abusham, E.E.A.A., D. Ngo and A. Teoh, 2006. Comparing the performance of principal component analysis and rbf network for face recognition using locally linear embedding. Int. J. Comput. Sci. Network Security, 6: 25-29.
    Direct Link  |  

  11. Yuangm, C.T., A.B.J. Teoh, D.C.L. Ngo and M. Goh, 2005. Multi-space random mapping for speaker identification. IEICE Electron. Express, 2: 226-231.
    CrossRef  |  Direct Link  |  

  12. Yip, W.K., A. Goh, D. Ngo and A.B.J. Teoh, 2005. Refreshable cryptographic key generation from dynamic handwritten signature invited paper in special issue on pattern recognition in biometrics and bioinformatics. J., 3: 20-28.

  13. Teoh, A.B.J. and D.N.C. Ling, 2005. Cancellable biometerics featuring with tokenised random number. Pattern Recognition Lett., 26: 1454-1460.
    CrossRef  |  Direct Link  |  

  14. Pang, Y.H., B.J.A.Teoh and D.C.L. Ngo, 2005. Enhanced pseudo Zernike moments in face recognition. IEICE Electron. Express, 2: 70-75.
    CrossRef  |  Direct Link  |  

  15. Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2005. Palmprint authentication system using wavelet based pseudo zernike moments features. Int. J. Comput. Internet Manage., 13: 13-26.
    Direct Link  |  

  16. Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2005. Cancelable palmprint authentication system. Int. J. Signal Process., 1: 98-104.

  17. Ngo, D.C.L., A.B.J. Teoh and A. Goh, 2005. Recognition using robust bit extraction. J. Electr. Imag., 14: 043016-043016.
    CrossRef  |  Direct Link  |  

  18. Connie, T., A.B.J. Teoh, M. Goh and D.C.L. Ngo, 2005. An automated palmprint recognition system. Image Vision Comput., 23: 501-515.
    CrossRef  |  Direct Link  |  

  19. Connie, T., A. Teoh, M. Goh and D. Ngo, 2005. PalmHashing: A novel approach for cancelable biometrics. Inform., Process., Lett., 93: 1-5.
    CrossRef  |  Direct Link  |  

  20. Chong, S.C., A.B.J. Teoh and D.C.L. Ngo, 2005. Tokenised discretisation in iris verification. IEICE Electron. Express, 2: 349-355.
    CrossRef  |  Direct Link  |  

  21. Teoh, A.B.J., D.C.L. Ngo and A. Goh, 2004. Personalised cryptographic key generation based on faceHashing. Comput. Security, 23: 606-614.
    CrossRef  |  Direct Link  |  

  22. Taibi, T. and D.C.L. Ngo, 2004. Towards a balanced specification language for distributed object computing patterns. Int. J. Comput. Appl., 26: 63-70.
    Direct Link  |  

  23. Pang, Y.H., B.J.A. Teoh and C.L.D. Ngo, 2004. Face authentication system using pseudo Zernike moments on wavelet subband. IEICE Electron. Express, 1: 275-280.
    CrossRef  |  Direct Link  |  

  24. Jin, A.T.B., D.N.C. Ling and O.T. Song, 2004. An efficient fingerprint verification system using integrated wavelet and fourier-mellin invariant transform. Image Vision Comput., 22: 503-513.
    CrossRef  |  Direct Link  |  

  25. Jin, A.T.B., D.N.C. Ling and A. Goh, 2004. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37: 2245-2255.
    CrossRef  |  Direct Link  |  

  26. Connie, T., A. Teoh, M. Goh and D. Ngo, 2004. PalmHashing: A novel approach for dual-factor authentication. Pattern Anal. Appli., 7: 255-268.
    CrossRef  |  Direct Link  |  

  27. Taibi, T. and D.C.L. Ngo, 2003. Modeling of distributed objects computing design pattern combinations using a formal specification language. Int. J. Applied Math. Comput. Sci., 13: 239-253.
    Direct Link  |  

  28. Taibi, T. and D.C.L. Ngo, 2003. Formal specification of design patterns-A balanced approach. J. Object Technol., 2: 127-140.
    Direct Link  |  

  29. Taibi, T. and D.C.L. Ngo, 2003. Formal specification of design pattern combination using BPSL. Inf. Software Technol., 45: 157-170.
    CrossRef  |  Direct Link  |