Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/52435
Title: Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images
Authors: Rassomakhin, Sergey
Kuznetsov, Alexandr
Shlokin, Vladimir
Bilozetsev, Ivan
Serhiienko, Roman
Affiliation: V. N. Karazin Kharkiv National University
National Army Academy named after Hetman Petro Sahaidachnyi
Bibliographic description (Ukraine): Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images / Sergey Rassomakhin, Alexandr Kuznetsov, Vladimir Shlokin, Ivan Bilozetsev, Roman Serhiienko // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Львів : Lviv Politechnic Publishing House, 2018. — P. 514–518. — (Machine Vision and Pattern Recognition).
Bibliographic description (International): Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images / Sergey Rassomakhin, Alexandr Kuznetsov, Vladimir Shlokin, Ivan Bilozetsev, Roman Serhiienko // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Lviv Politechnic Publishing House, 2018. — P. 514–518. — (Machine Vision and Pattern Recognition).
Is part of: Data stream mining and processing : proceedings of the IEEE second international conference, 2018
Conference/Event: IEEE second international conference "Data stream mining and processing"
Issue Date: 28-Feb-2018
Publisher: Lviv Politechnic Publishing House
Place of the edition/event: Львів
Temporal Coverage: 21-25 August 2018, Lviv
Keywords: biometric authentication
fingerprint images
minutiaes
Number of pages: 5
Page range: 514-518
Start page: 514
End page: 518
Abstract: The research involves development of a mathematical model for the probabilistic minutia distribution in biometric fingerprint images. The suggested model is based on heuristic analysis of the fingerprint scanning results with account for the nature of the potential errors.
URI: https://ena.lpnu.ua/handle/ntb/52435
ISBN: © Національний університет „Львівська політехніка“, 2018
© Національний університет „Львівська політехніка“, 2018
Copyright owner: © Національний університет “Львівська політехніка”, 2018
URL for reference material: http://www.cs.haifa.ac.il/~orrd/PrivDay/2015/
http://www.cs.haifa.ac.il/~orrd/PrivDay/
http://bias.csr.unibo.it/fvc2004/databases.asp
https://sourceafis.machinezoo.com/
https://sourceforge.net/projects/sourceafis/
References (Ukraine): [1] Xudong Jiang and Wei-Yun Yau, "Fingerprint minutiae matching based on the local and global structures," 15th Int. Conf. on Pattern Recognition. ICPR-2000, Barcelona, vol. 2, pp. 1038-1041, 2000.
[2] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003.
[3] “Privacy Enhancing Technologies for Biometric Data”, 2015. [Online]. Internet: http://www.cs.haifa.ac.il/~orrd/PrivDay/2015/
[4] “Privacy Enhancing Technologies for Biometric Data”, 2016. [Online]. Internet: http://www.cs.haifa.ac.il/~orrd/PrivDay/
[5] ISO/IEC 19794-3. Information technology – Biometric data interchange formats – Part 3: Finger pattern spectral data.
[6] ISO/IEC 19794-2. Information technology – Biometric data interchange formats – Part 2: Finger minutiae data.
[7] ISO/IEC 19794-4. Information technology – Biometric data interchange formats – Part 4: Finger image data.
[8] N. K. Ratha, K. Karu, Shaoyun Chen and A. K. Jain, "A real-time matching system for large fingerprint databases," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 8, pp. 799-813, Aug 1996.
[9] I. Craw, N. P. Costen, T. Kato, and S. Akamatsu, “How should we represent faces for automatic recognition?”, IEEE Trans. Pat. Anal. Mach. Intel., vol. 21, pp. 725–736, 1999
[10] B. A. Draper, K. Baek, M. S Bartlett, and J. R. Beveridge, “Recognizing faces with PCA and ICA”, Computer Vision and Image Understanding, vol.91, pp. 115-137, 2003.
[11] ISO/IEC 19794-5. Information technology – Biometric data interchange formats – Part 5: Face image data.
[12] C. Xiang, X. A. Fan, and T. H. Lee. “Face recognition using recursive Fisher linear discriminant.” Communications, Circuits and Systems.– vol.2,. pp. 27-29, 2004.
[13] “FVC2004. Fingerprint Verification Competetion. Databases”. [Online]. Internet: http://bias.csr.unibo.it/fvc2004/databases.asp
[14] “SourceAFIS for Java and .NET”. [Online]. Internet: https://sourceafis.machinezoo.com/
[15] “SourceAFIS Fingerprint recognition library for .NET and experimentally for Java”. [Online]. Internet: https://sourceforge.net/projects/sourceafis/
[16] T. Lavrovska and S. Rassomahin, “Physical model of pseudorandom codes in multidimensional Euclidean space,” Third Int. Scien.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 67-70, 2016.
[17] G. Aggarwal, N. K. Ratha and R. M. Bolle, "Biometric Verification: Looking Beyond Raw Similarity Scores," Conf. on Computer Vision and Pattern Recognition Workshop (CVPRW'06), pp.31-31, 2006.
[18] A. A. Kuznetsov, A. A. Smirnov, D.A. Danilenko, and A. Berezovsky. “The statistical analysis of a network traffic for the intrusion detection and prevention systems.” Telecommunications and Radio Engineering, vol, 74, pp. 61-78, 2015.
[19] Jinyu Zuo, N. K. Ratha and J. H. Connell, "A new approach for iris segmentation," IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops, Anchorage, AK, pp.1-6, 2008.
[20] Yu.V. Stasev, and A. A. Kuznetsov. “Asymmetric code-theoretical schemes constructed with the use of algebraic geometric codes,” Kibernetika i Sistemnyi Analiz, no. 3, pp. 47-57, May-June 2005.
[21] S. Biswas, N. K. Ratha, G. Aggarwal and J. Connell, “Exploring Ridge Curvature for Fingerprint Indexing,” IEEE Second Int. Conf. on Biometrics: Theory, Applications and Systems, Arlington, VA, pp. 1-6, 2008.
[22] O. Kuznetsov, Y. Gorbenko and I. Kolovanova, "Combinatorial properties of block symmetric ciphers key schedule," Third Int. Scien.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 55-58, 2016.
[23] A. Kuznetsov, I. Kolovanova and T. Kuznetsova, "Periodic characteristics of output feedback encryption mode," 4th Int. Scient.- Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 193-198, 2017.
[24] I. Gorbenko, A. Kuznetsov, M. Lutsenko and D. Ivanenko, "The research of modern stream ciphers," 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 207-210, 2017.
[25] X. Lin and S. Chen, "Color image segmentation using modified HSI system for road following," IEEE International Conference on Robotics and Automation, Sacramento, CA, vol. 3, pp. 1998-2003, 1991.
[26] A. Yanko, S. Koshman and V. Krasnobayev, “Algorithms of data processing in the residual classes system,” 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 117-121, 2017.
[27] V. M. Grachev, V. I. Esin, N. G. Polukhina, S. G. Rassomakhin. “Technology for developing databases of information systems.” Bulletin of the Lebedev Physics Institute, vol. 41(5), pp. 119-122, May 2014.
[28] A. Kuznetsov, I. Svatovskij, N. Kiyan and A. Pushkar'ov, "Codebased public-key cryptosystems for the post-quantum period," 2017 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 125-130, 2017.
[29] O. Potii, O. Illiashenko, and D. Komin. “Advanced Security Assurance Case Based on ISO/IEC 15408,” Theory and Engineering of Complex Systems and Dependability Advances in Intelligent Systems and Computing, vol. 365, pp. 391-401, 2015.
[30] S. Prabhakar, A. K. Jain, Jianguo Wang, S. Pankanti and R. Bolle, "Minutia verification and classification for fingerprint matching," Proceedings 15th International Conference on Pattern Recognition. ICPR-2000, Barcelona, vol.1, pp. 25-29, 2000.
[31] A. V. Potii, A. K. Pesterev, “A System Approach to Certification of Pseudorandom Numbers Generators Used in Information Protection Systems,” Telecommunications and Radio Engineering, vol. 52, iss. 4, pp 97-102, 1998.
[32] V. A. Krasnobayev, S. A. Koshman, and M. A. Mavrina, “A Method for Increasing the Reliability of Verification of Data Represented in a Residue Number System” Cybernetics and Systems Analysis, vol. 50, iss. 6, pp. 969–976, Nov. 2014.
[33] I. D. Gorbenko, A. A. Zamula, and Ye. A. Semenko, “Ensemble and correlation properties of cryptographic signals for telecommunication system and network applications.” Telecommunications and Radio Engineering, vol. 75, iss. 2, pp. 169-178, 2016.
[34] John Juyang Weng and Shaoyun Chen, "Incremental learning for vision-based navigation," Proceedings of 13th Int. Conf. on Pattern Recognition, Vienna, vol. 4, pp. 45-49, 1996
[35] I. Gorbenko, and V. Ponomar. “Examining a possibility to use and the benefits of post-quantum algorithms dependent on the conditions of their application.” EasternEuropean Journal of Enterprise Technologies, vol 2, no 9 (86), pp. 21-32, 2017.
[36] I. Gorbenko, and R. Hanzia, “Examination and implementation of the fast method for computing the order of elliptic curve,” EasternEuropean Journal of Enterprise Technologies, vol 2, no 9 (86), pp. 11-21, 2017.
[37] N. Sun, N. Haas, J. H. Connell and S. Pankanti, "A model-based sampling and sample synthesis method for auto identification in computer vision," Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05), pp. 160-165, 2005.
[38] I. Gorbenko, M. Yesina, and V. Ponomar. “Anonymous electronic signature method,” Third Int. Scient.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 47-50, 2016.
[39] S. Kavun. “Conceptual fundamentals of a theory of mathematical interpretation.” Int. J. Computing Science and Mathematics, vol. 6, no. 2, pp. 107-121, 2015.
[40] S. Pankanti, S. Prabhakar and A. K. Jain, "On the individuality fingerprints," IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, vol. 1, pp. I-805 - I-812, 2001
[41] Y. Gorbenko, I. Svatovskiy, and O. Shevtsov, “Post-quantum message authentication cryptography based on error-correcting codes,” Third Int. Scient.-Pract. Conf. nce Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 51-54, 2016.
[42] O. Kazymyrov, R. Oliynykov, and H. Raddum. “Influence of addition modulo 2n on algebraic attacks.” Cryptography and Communications, vol. 8, iss. 2, pp. 277-289, April 2016.
[43] A. Kuznetsov, R. Serhiienko and D. Prokopovych-Tkachenko, "Construction of cascade codes in the frequency domain," 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 131-136, 2017.
[44] M. Rodinko, R.Oliynykov, and Y. Gorbenko, “Improvement of the high nonlinear S-boxes generation method,” Third Int. Scient.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 63-66, 2016.
[45] J. J. Weng and Shaoyun Chen, "Autonomous navigation through case-based learning," Proceedings of International Symposium on Computer Vision - ISCV, Coral Gables, FL, pp. 359-364, 1995.
[46] A. Kuznetsov, Y. Gorbenko, A. Andrushkevych and I. Belozersev, "Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2," 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 203-206, 2017.
[47] V. M. Grachev, V. I. Esin, N. G. Polukhina, and S. G. Rassomakhin. “Data security mechanisms implemented in the database with universal model.” Bulletin of the Lebedev Physics Institute, vol. 41, Issue 5, pp. 123-126, May 2014.
[48] V. A. Krasnobayev, A. S. Yanko, and S. A. Koshman. “A Method for arithmetic comparison of data represented in a residue number system.” Cybernetics and Systems Analysis, vol. 52, iss. 1, pp. 145-150, Jan. 2016.
[49] O. Kuznetsov, M. Lutsenko and D. Ivanenko, "Strumok stream cipher: Specification and basic properties," Third Int. Scient.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 59-62, 2016.
[50] A. Andrushkevych, T. Kuznetsova, I .Bilozertsev, and S. Bohucharskyi, “The block symmetric ciphers in the post-quantum period,” Third Int. Scient.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 43-46, 2016.
[51] M. Rodinko and R. Oliynykov, "Open problems of proving security of ARX-based ciphers to differential cryptanalysis," 4th Int. Scient.- Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 228-231, 2017.
[52] V.I. Dolgov, I.V.Lisitska, and K.Ye. Lisitskyi. “The new concept of block symmetric ciphers design,” Telecommunications and Radio Engineering, vol. 76, iss. 2, pp. 157-184, 2017.
[53] I. D. Gorbenko, V. I. Dolgov, V. I. Rublinetskii, and K. V. Korovkin. “Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis.” Telecommunications and Radio Engineering, vol. 52, iss. 4, pp. 89-96, 1998.
[54] A. Nagar, H. Choi and A. K. Jain, "Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1752-1765, Dec. 2012.
References (International): [1] Xudong Jiang and Wei-Yun Yau, "Fingerprint minutiae matching based on the local and global structures," 15th Int. Conf. on Pattern Recognition. ICPR-2000, Barcelona, vol. 2, pp. 1038-1041, 2000.
[2] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003.
[3] "Privacy Enhancing Technologies for Biometric Data", 2015. [Online]. Internet: http://www.cs.haifa.ac.il/~orrd/PrivDay/2015/
[4] "Privacy Enhancing Technologies for Biometric Data", 2016. [Online]. Internet: http://www.cs.haifa.ac.il/~orrd/PrivDay/
[5] ISO/IEC 19794-3. Information technology – Biometric data interchange formats – Part 3: Finger pattern spectral data.
[6] ISO/IEC 19794-2. Information technology – Biometric data interchange formats – Part 2: Finger minutiae data.
[7] ISO/IEC 19794-4. Information technology – Biometric data interchange formats – Part 4: Finger image data.
[8] N. K. Ratha, K. Karu, Shaoyun Chen and A. K. Jain, "A real-time matching system for large fingerprint databases," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 8, pp. 799-813, Aug 1996.
[9] I. Craw, N. P. Costen, T. Kato, and S. Akamatsu, "How should we represent faces for automatic recognition?", IEEE Trans. Pat. Anal. Mach. Intel., vol. 21, pp. 725–736, 1999
[10] B. A. Draper, K. Baek, M. S Bartlett, and J. R. Beveridge, "Recognizing faces with PCA and ICA", Computer Vision and Image Understanding, vol.91, pp. 115-137, 2003.
[11] ISO/IEC 19794-5. Information technology – Biometric data interchange formats – Part 5: Face image data.
[12] C. Xiang, X. A. Fan, and T. H. Lee. "Face recognition using recursive Fisher linear discriminant." Communications, Circuits and Systems, vol.2,. pp. 27-29, 2004.
[13] "FVC2004. Fingerprint Verification Competetion. Databases". [Online]. Internet: http://bias.csr.unibo.it/fvc2004/databases.asp
[14] "SourceAFIS for Java and .NET". [Online]. Internet: https://sourceafis.machinezoo.com/
[15] "SourceAFIS Fingerprint recognition library for .NET and experimentally for Java". [Online]. Internet: https://sourceforge.net/projects/sourceafis/
[16] T. Lavrovska and S. Rassomahin, "Physical model of pseudorandom codes in multidimensional Euclidean space," Third Int. Scien.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 67-70, 2016.
[17] G. Aggarwal, N. K. Ratha and R. M. Bolle, "Biometric Verification: Looking Beyond Raw Similarity Scores," Conf. on Computer Vision and Pattern Recognition Workshop (CVPRW'06), pp.31-31, 2006.
[18] A. A. Kuznetsov, A. A. Smirnov, D.A. Danilenko, and A. Berezovsky. "The statistical analysis of a network traffic for the intrusion detection and prevention systems." Telecommunications and Radio Engineering, vol, 74, pp. 61-78, 2015.
[19] Jinyu Zuo, N. K. Ratha and J. H. Connell, "A new approach for iris segmentation," IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops, Anchorage, AK, pp.1-6, 2008.
[20] Yu.V. Stasev, and A. A. Kuznetsov. "Asymmetric code-theoretical schemes constructed with the use of algebraic geometric codes," Kibernetika i Sistemnyi Analiz, no. 3, pp. 47-57, May-June 2005.
[21] S. Biswas, N. K. Ratha, G. Aggarwal and J. Connell, "Exploring Ridge Curvature for Fingerprint Indexing," IEEE Second Int. Conf. on Biometrics: Theory, Applications and Systems, Arlington, VA, pp. 1-6, 2008.
[22] O. Kuznetsov, Y. Gorbenko and I. Kolovanova, "Combinatorial properties of block symmetric ciphers key schedule," Third Int. Scien.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 55-58, 2016.
[23] A. Kuznetsov, I. Kolovanova and T. Kuznetsova, "Periodic characteristics of output feedback encryption mode," 4th Int. Scient, Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 193-198, 2017.
[24] I. Gorbenko, A. Kuznetsov, M. Lutsenko and D. Ivanenko, "The research of modern stream ciphers," 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 207-210, 2017.
[25] X. Lin and S. Chen, "Color image segmentation using modified HSI system for road following," IEEE International Conference on Robotics and Automation, Sacramento, CA, vol. 3, pp. 1998-2003, 1991.
[26] A. Yanko, S. Koshman and V. Krasnobayev, "Algorithms of data processing in the residual classes system," 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 117-121, 2017.
[27] V. M. Grachev, V. I. Esin, N. G. Polukhina, S. G. Rassomakhin. "Technology for developing databases of information systems." Bulletin of the Lebedev Physics Institute, vol. 41(5), pp. 119-122, May 2014.
[28] A. Kuznetsov, I. Svatovskij, N. Kiyan and A. Pushkar'ov, "Codebased public-key cryptosystems for the post-quantum period," 2017 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 125-130, 2017.
[29] O. Potii, O. Illiashenko, and D. Komin. "Advanced Security Assurance Case Based on ISO/IEC 15408," Theory and Engineering of Complex Systems and Dependability Advances in Intelligent Systems and Computing, vol. 365, pp. 391-401, 2015.
[30] S. Prabhakar, A. K. Jain, Jianguo Wang, S. Pankanti and R. Bolle, "Minutia verification and classification for fingerprint matching," Proceedings 15th International Conference on Pattern Recognition. ICPR-2000, Barcelona, vol.1, pp. 25-29, 2000.
[31] A. V. Potii, A. K. Pesterev, "A System Approach to Certification of Pseudorandom Numbers Generators Used in Information Protection Systems," Telecommunications and Radio Engineering, vol. 52, iss. 4, pp 97-102, 1998.
[32] V. A. Krasnobayev, S. A. Koshman, and M. A. Mavrina, "A Method for Increasing the Reliability of Verification of Data Represented in a Residue Number System" Cybernetics and Systems Analysis, vol. 50, iss. 6, pp. 969–976, Nov. 2014.
[33] I. D. Gorbenko, A. A. Zamula, and Ye. A. Semenko, "Ensemble and correlation properties of cryptographic signals for telecommunication system and network applications." Telecommunications and Radio Engineering, vol. 75, iss. 2, pp. 169-178, 2016.
[34] John Juyang Weng and Shaoyun Chen, "Incremental learning for vision-based navigation," Proceedings of 13th Int. Conf. on Pattern Recognition, Vienna, vol. 4, pp. 45-49, 1996
[35] I. Gorbenko, and V. Ponomar. "Examining a possibility to use and the benefits of post-quantum algorithms dependent on the conditions of their application." EasternEuropean Journal of Enterprise Technologies, vol 2, no 9 (86), pp. 21-32, 2017.
[36] I. Gorbenko, and R. Hanzia, "Examination and implementation of the fast method for computing the order of elliptic curve," EasternEuropean Journal of Enterprise Technologies, vol 2, no 9 (86), pp. 11-21, 2017.
[37] N. Sun, N. Haas, J. H. Connell and S. Pankanti, "A model-based sampling and sample synthesis method for auto identification in computer vision," Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05), pp. 160-165, 2005.
[38] I. Gorbenko, M. Yesina, and V. Ponomar. "Anonymous electronic signature method," Third Int. Scient.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 47-50, 2016.
[39] S. Kavun. "Conceptual fundamentals of a theory of mathematical interpretation." Int. J. Computing Science and Mathematics, vol. 6, no. 2, pp. 107-121, 2015.
[40] S. Pankanti, S. Prabhakar and A. K. Jain, "On the individuality fingerprints," IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, vol. 1, pp. I-805 - I-812, 2001
[41] Y. Gorbenko, I. Svatovskiy, and O. Shevtsov, "Post-quantum message authentication cryptography based on error-correcting codes," Third Int. Scient.-Pract. Conf. nce Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 51-54, 2016.
[42] O. Kazymyrov, R. Oliynykov, and H. Raddum. "Influence of addition modulo 2n on algebraic attacks." Cryptography and Communications, vol. 8, iss. 2, pp. 277-289, April 2016.
[43] A. Kuznetsov, R. Serhiienko and D. Prokopovych-Tkachenko, "Construction of cascade codes in the frequency domain," 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 131-136, 2017.
[44] M. Rodinko, R.Oliynykov, and Y. Gorbenko, "Improvement of the high nonlinear S-boxes generation method," Third Int. Scient.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 63-66, 2016.
[45] J. J. Weng and Shaoyun Chen, "Autonomous navigation through case-based learning," Proceedings of International Symposium on Computer Vision - ISCV, Coral Gables, FL, pp. 359-364, 1995.
[46] A. Kuznetsov, Y. Gorbenko, A. Andrushkevych and I. Belozersev, "Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2," 4th Int. Scient.-Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 203-206, 2017.
[47] V. M. Grachev, V. I. Esin, N. G. Polukhina, and S. G. Rassomakhin. "Data security mechanisms implemented in the database with universal model." Bulletin of the Lebedev Physics Institute, vol. 41, Issue 5, pp. 123-126, May 2014.
[48] V. A. Krasnobayev, A. S. Yanko, and S. A. Koshman. "A Method for arithmetic comparison of data represented in a residue number system." Cybernetics and Systems Analysis, vol. 52, iss. 1, pp. 145-150, Jan. 2016.
[49] O. Kuznetsov, M. Lutsenko and D. Ivanenko, "Strumok stream cipher: Specification and basic properties," Third Int. Scient.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 59-62, 2016.
[50] A. Andrushkevych, T. Kuznetsova, I .Bilozertsev, and S. Bohucharskyi, "The block symmetric ciphers in the post-quantum period," Third Int. Scient.-Pract. Conf. Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, pp. 43-46, 2016.
[51] M. Rodinko and R. Oliynykov, "Open problems of proving security of ARX-based ciphers to differential cryptanalysis," 4th Int. Scient, Pract. Conf. Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, pp. 228-231, 2017.
[52] V.I. Dolgov, I.V.Lisitska, and K.Ye. Lisitskyi. "The new concept of block symmetric ciphers design," Telecommunications and Radio Engineering, vol. 76, iss. 2, pp. 157-184, 2017.
[53] I. D. Gorbenko, V. I. Dolgov, V. I. Rublinetskii, and K. V. Korovkin. "Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis." Telecommunications and Radio Engineering, vol. 52, iss. 4, pp. 89-96, 1998.
[54] A. Nagar, H. Choi and A. K. Jain, "Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1752-1765, Dec. 2012.
Content type: Conference Abstract
Appears in Collections:Data stream mining and processing : proceedings of the IEEE second international conference

Files in This Item:
File Description SizeFormat 
2018_Rassomakhin_S-Mathematical_Model_514-518.pdf282.11 kBAdobe PDFView/Open
2018_Rassomakhin_S-Mathematical_Model_514-518__COVER.png1.81 MBimage/pngView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.