Dr. David Chek Ling Ngo
My Social Links

Dr. David Chek Ling Ngo

Professor
Sunway University, Malaysia


Highest Degree
Ph.D. in Computer Science from Trinity College Dublin, Dublin, Ireland

Share this Profile

Area of Interest:

Computer Sciences
100%
Biometrics
62%
Computational Intelligence
90%
Network
75%
Computer Application
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
38
Abstracts
26

Selected Publications

  1. Song, O,T., A.B.J. Teoh and D.C.L. Ngo, 2008. Application-specific key release scheme from biometrics. Int. J. Network Security, 6: 127-133.
    Direct Link  |  
  2. Yip, W.K., A.B.J. Teoh and D.C.L. Ngo, 2007. Secure hashing of dynamic hand signatures using wavelet-fourier compression with BioPhasor mixing and discretization. EURASIP J. Adv. Signal Process., 2007: 8-10.1155/2007/59125.
    Direct Link  |  
  3. Pang, Y.H., A.B.J. Teoh and D.N.C. Ling, 2007. Two-factor cancelable biometrics authenticator. J. Comput. Sci. Technol., 22: 54-59.
    CrossRef  |  Direct Link  |  
  4. Yip, W.K., A.B.J. Teoh and D.N.C. Ling, 2006. Replaceable and securely hashed keys from online signatures. IEICE Electron. Express, 3: 410-416.
    CrossRef  |  Direct Link  |  
  5. Teoh, A.B.J., A. Goh and D.N.C. Ling, 2006. Random multispace quantization as an analytic mechanism for bioHashing of biometric and random identity inputs. IEEE. Trans. Pattern Anal. Mach. Intell., 28: 1892-1901.
    CrossRef  |  PubMed  |  Direct Link  |  
  6. Teoh, A., B. Jin, T. Connie, D. Ngo and C. Ling, 2006. Remarks on BioHash and its mathematical foundation. Inf. Process. Lett., 100: 145-150.
    CrossRef  |  Direct Link  |  
  7. Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2006. A discriminant pseudo zernike moments in face recognition. J. Res. Pract. Inform. Technol., 38: 197-211.
    Direct Link  |  
  8. Ngo, D.C.L., A.B.J. Teoh and A. Goh, 2006. Biometric hash: High-confidence face recognition. IEEE Trans. Circuits Syst. Video Technol., 16: 771-775.
    CrossRef  |  Direct Link  |  
  9. Chong, S.C., A.B.J. Teoh and D.C.L. Ngo, 2006. High security iris verification system based on random secret integration. Comput. Vision Image Understanding, 102: 169-177.
    CrossRef  |  Direct Link  |  
  10. Abusham, E.E.A.A., D. Ngo and A. Teoh, 2006. Comparing the performance of principal component analysis and rbf network for face recognition using locally linear embedding. Int. J. Comput. Sci. Network Security, 6: 25-29.
    Direct Link  |  
  11. Yuangm, C.T., A.B.J. Teoh, D.C.L. Ngo and M. Goh, 2005. Multi-space random mapping for speaker identification. IEICE Electron. Express, 2: 226-231.
    CrossRef  |  Direct Link  |  
  12. Yip, W.K., A. Goh, D. Ngo and A.B.J. Teoh, 2005. Refreshable cryptographic key generation from dynamic handwritten signature invited paper in special issue on pattern recognition in biometrics and bioinformatics. J., 3: 20-28.
  13. Teoh, A.B.J. and D.N.C. Ling, 2005. Cancellable biometerics featuring with tokenised random number. Pattern Recognition Lett., 26: 1454-1460.
    CrossRef  |  Direct Link  |  
  14. Pang, Y.H., B.J.A.Teoh and D.C.L. Ngo, 2005. Enhanced pseudo Zernike moments in face recognition. IEICE Electron. Express, 2: 70-75.
    CrossRef  |  Direct Link  |  
  15. Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2005. Palmprint authentication system using wavelet based pseudo zernike moments features. Int. J. Comput. Internet Manage., 13: 13-26.
    Direct Link  |  
  16. Pang, Y.H., A.B.J. Teoh and D.C.L. Ngo, 2005. Cancelable palmprint authentication system. Int. J. Signal Process., 1: 98-104.
  17. Ngo, D.C.L., A.B.J. Teoh and A. Goh, 2005. Recognition using robust bit extraction. J. Electr. Imag., 14: 043016-043016.
    CrossRef  |  Direct Link  |  
  18. Connie, T., A.B.J. Teoh, M. Goh and D.C.L. Ngo, 2005. An automated palmprint recognition system. Image Vision Comput., 23: 501-515.
    CrossRef  |  Direct Link  |  
  19. Connie, T., A. Teoh, M. Goh and D. Ngo, 2005. PalmHashing: A novel approach for cancelable biometrics. Inform., Process., Lett., 93: 1-5.
    CrossRef  |  Direct Link  |  
  20. Chong, S.C., A.B.J. Teoh and D.C.L. Ngo, 2005. Tokenised discretisation in iris verification. IEICE Electron. Express, 2: 349-355.
    CrossRef  |  Direct Link  |  
  21. Teoh, A.B.J., D.C.L. Ngo and A. Goh, 2004. Personalised cryptographic key generation based on faceHashing. Comput. Security, 23: 606-614.
    CrossRef  |  Direct Link  |  
  22. Taibi, T. and D.C.L. Ngo, 2004. Towards a balanced specification language for distributed object computing patterns. Int. J. Comput. Appl., 26: 63-70.
    Direct Link  |  
  23. Pang, Y.H., B.J.A. Teoh and C.L.D. Ngo, 2004. Face authentication system using pseudo Zernike moments on wavelet subband. IEICE Electron. Express, 1: 275-280.
    CrossRef  |  Direct Link  |  
  24. Jin, A.T.B., D.N.C. Ling and O.T. Song, 2004. An efficient fingerprint verification system using integrated wavelet and fourier-mellin invariant transform. Image Vision Comput., 22: 503-513.
    CrossRef  |  Direct Link  |  
  25. Jin, A.T.B., D.N.C. Ling and A. Goh, 2004. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37: 2245-2255.
    CrossRef  |  Direct Link  |  
  26. Connie, T., A. Teoh, M. Goh and D. Ngo, 2004. PalmHashing: A novel approach for dual-factor authentication. Pattern Anal. Appli., 7: 255-268.
    CrossRef  |  Direct Link  |  
  27. Taibi, T. and D.C.L. Ngo, 2003. Modeling of distributed objects computing design pattern combinations using a formal specification language. Int. J. Applied Math. Comput. Sci., 13: 239-253.
    Direct Link  |  
  28. Taibi, T. and D.C.L. Ngo, 2003. Formal specification of design patterns-A balanced approach. J. Object Technol., 2: 127-140.
    Direct Link  |  
  29. Taibi, T. and D.C.L. Ngo, 2003. Formal specification of design pattern combination using BPSL. Inf. Software Technol., 45: 157-170.
    CrossRef  |  Direct Link  |