Dr. David Chek Ling Ngo
ProfessorSunway University, Malaysia
Highest Degree
Ph.D. in Computer Science from Trinity College Dublin, Dublin, Ireland
Share this Profile
Area of Interest:
Selected Publications
- Song, O,T., A.B.J. Teoh and D.C.L. Ngo, 2008. Application-specific key release scheme from biometrics. Int. J. Network Security, 6: 127-133.
Direct Link | - Yip, W.K., A.B.J. Teoh and D.C.L. Ngo, 2007. Secure hashing of dynamic hand signatures using wavelet-fourier compression with BioPhasor mixing and discretization. EURASIP J. Adv. Signal Process., 2007: 8-10.1155/2007/59125.
Direct Link | - Pang, Y.H., A.B.J. Teoh and D.N.C. Ling, 2007. Two-factor cancelable biometrics authenticator. J. Comput. Sci. Technol., 22: 54-59.
CrossRef | Direct Link | - Yip, W.K., A.B.J. Teoh and D.N.C. Ling, 2006. Replaceable and securely hashed keys from online signatures. IEICE Electron. Express, 3: 410-416.
CrossRef | Direct Link | - Teoh, A.B.J., A. Goh and D.N.C. Ling, 2006. Random multispace quantization as an analytic mechanism for bioHashing of biometric and random identity inputs. IEEE. Trans. Pattern Anal. Mach. Intell., 28: 1892-1901.
CrossRef | PubMed | Direct Link | - Teoh, A., B. Jin, T. Connie, D. Ngo and C. Ling, 2006. Remarks on BioHash and its mathematical foundation. Inf. Process. Lett., 100: 145-150.
CrossRef | Direct Link | - Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2006. A discriminant pseudo zernike moments in face recognition. J. Res. Pract. Inform. Technol., 38: 197-211.
Direct Link | - Ngo, D.C.L., A.B.J. Teoh and A. Goh, 2006. Biometric hash: High-confidence face recognition. IEEE Trans. Circuits Syst. Video Technol., 16: 771-775.
CrossRef | Direct Link | - Chong, S.C., A.B.J. Teoh and D.C.L. Ngo, 2006. High security iris verification system based on random secret integration. Comput. Vision Image Understanding, 102: 169-177.
CrossRef | Direct Link | - Abusham, E.E.A.A., D. Ngo and A. Teoh, 2006. Comparing the performance of principal component analysis and rbf network for face recognition using locally linear embedding. Int. J. Comput. Sci. Network Security, 6: 25-29.
Direct Link | - Yuangm, C.T., A.B.J. Teoh, D.C.L. Ngo and M. Goh, 2005. Multi-space random mapping for speaker identification. IEICE Electron. Express, 2: 226-231.
CrossRef | Direct Link | - Yip, W.K., A. Goh, D. Ngo and A.B.J. Teoh, 2005. Refreshable cryptographic key generation from dynamic handwritten signature invited paper in special issue on pattern recognition in biometrics and bioinformatics. J., 3: 20-28.
- Teoh, A.B.J. and D.N.C. Ling, 2005. Cancellable biometerics featuring with tokenised random number. Pattern Recognition Lett., 26: 1454-1460.
CrossRef | Direct Link | - Pang, Y.H., B.J.A.Teoh and D.C.L. Ngo, 2005. Enhanced pseudo Zernike moments in face recognition. IEICE Electron. Express, 2: 70-75.
CrossRef | Direct Link | - Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2005. Palmprint authentication system using wavelet based pseudo zernike moments features. Int. J. Comput. Internet Manage., 13: 13-26.
Direct Link | - Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2005. Cancelable palmprint authentication system. Int. J. Signal Process., 1: 98-104.
- Ngo, D.C.L., A.B.J. Teoh and A. Goh, 2005. Recognition using robust bit extraction. J. Electr. Imag., 14: 043016-043016.
CrossRef | Direct Link | - Connie, T., A.B.J. Teoh, M. Goh and D.C.L. Ngo, 2005. An automated palmprint recognition system. Image Vision Comput., 23: 501-515.
CrossRef | Direct Link | - Connie, T., A. Teoh, M. Goh and D. Ngo, 2005. PalmHashing: A novel approach for cancelable biometrics. Inform., Process., Lett., 93: 1-5.
CrossRef | Direct Link | - Chong, S.C., A.B.J. Teoh and D.C.L. Ngo, 2005. Tokenised discretisation in iris verification. IEICE Electron. Express, 2: 349-355.
CrossRef | Direct Link | - Teoh, A.B.J., D.C.L. Ngo and A. Goh, 2004. Personalised cryptographic key generation based on faceHashing. Comput. Security, 23: 606-614.
CrossRef | Direct Link | - Taibi, T. and D.C.L. Ngo, 2004. Towards a balanced specification language for distributed object computing patterns. Int. J. Comput. Appl., 26: 63-70.
Direct Link | - Pang, Y.H., B.J.A. Teoh and C.L.D. Ngo, 2004. Face authentication system using pseudo Zernike moments on wavelet subband. IEICE Electron. Express, 1: 275-280.
CrossRef | Direct Link | - Jin, A.T.B., D.N.C. Ling and O.T. Song, 2004. An efficient fingerprint verification system using integrated wavelet and fourier-mellin invariant transform. Image Vision Comput., 22: 503-513.
CrossRef | Direct Link | - Jin, A.T.B., D.N.C. Ling and A. Goh, 2004. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37: 2245-2255.
CrossRef | Direct Link | - Connie, T., A. Teoh, M. Goh and D. Ngo, 2004. PalmHashing: A novel approach for dual-factor authentication. Pattern Anal. Appli., 7: 255-268.
CrossRef | Direct Link | - Taibi, T. and D.C.L. Ngo, 2003. Modeling of distributed objects computing design pattern combinations using a formal specification language. Int. J. Applied Math. Comput. Sci., 13: 239-253.
Direct Link | - Taibi, T. and D.C.L. Ngo, 2003. Formal specification of design patterns-A balanced approach. J. Object Technol., 2: 127-140.
Direct Link | - Taibi, T. and D.C.L. Ngo, 2003. Formal specification of design pattern combination using BPSL. Inf. Software Technol., 45: 157-170.
CrossRef | Direct Link |