Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/52450
Title: Investigation the Ateb-Gabor Filter in Biometric Security Systems
Authors: Nazarkevych, Mariya
Klyujnyk, Ivanna
Nazarkevych, Hanna
Affiliation: Lviv Polytechnic National University
Taras Shevchenko National University of Kyiv
Bibliographic description (Ukraine): Nazarkevych M. Investigation the Ateb-Gabor Filter in Biometric Security Systems / Mariya Nazarkevych, Ivanna Klyujnyk, Hanna Nazarkevych // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Львів : Lviv Politechnic Publishing House, 2018. — P. 580–583. — (Machine Vision and Pattern Recognition).
Bibliographic description (International): Nazarkevych M. Investigation the Ateb-Gabor Filter in Biometric Security Systems / Mariya Nazarkevych, Ivanna Klyujnyk, Hanna Nazarkevych // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Lviv Politechnic Publishing House, 2018. — P. 580–583. — (Machine Vision and Pattern Recognition).
Is part of: Data stream mining and processing : proceedings of the IEEE second international conference, 2018
Conference/Event: IEEE second international conference "Data stream mining and processing"
Issue Date: 28-Feb-2018
Publisher: Lviv Politechnic Publishing House
Place of the edition/event: Львів
Temporal Coverage: 21-25 August 2018, Lviv
Keywords: Image filtering
Ateb-Gabor filter
Atebfunctions
Number of pages: 4
Page range: 580-583
Start page: 580
End page: 583
Abstract: Biometric information security systems are analyzed. One of the most important characteristics is the high reliability, which corresponds to the ability of the system to distinguish between biometric characteristics that correspond to different people on also it is safe to find a match. To implement this, at the filtration stage, it is proposed to use the Ateb-Gabor filter, which extends the usual filtering. With this filtering, you can improve the gradation characteristics of biometric models. The Ateb-Gabor filter was constructed and studied, graphs of the new function and corresponding frequency graphs are presented. Filtration experiments are performed. The SNR filtration quality is estimated.
URI: https://ena.lpnu.ua/handle/ntb/52450
ISBN: © Національний університет „Львівська політехніка“, 2018
© Національний університет „Львівська політехніка“, 2018
Copyright owner: © Національний університет “Львівська політехніка”, 2018
References (Ukraine): [1] S. Pankanti, R.M. Bolle, and A. Jain. "Biometrics: The future of identification [guest eeditors' introduction]," Computer society, 33.2 pp. 46-49, 2000.
[2] J. Wayman, et al. "An introduction to biometric authentication systems," Biometric Systems. Springer London,. Pp.1-20, 2005.
[3] A. Ross, and A. Jain. "Information fusion in biometrics." Pattern recognition letters 24.13 (2003): 2115-2125.
[4] U. Umut and A.K. Jain. "Attacks on biometric systems: a case study in fingerprints," Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306. International Society for Optics and Photonics, 2004.
[5] X. Liu, M. Tanaka, and M. Okutomi. "Noise level estimation using weak textured patches of a single noisy image," Image Processing (ICIP), 2012 19th IEEE International Conference on. IEEE, 2012.
[6] W.F. Lane, "Self-authenticating identification card with fingerprint identification," U.S. Patent No. 5,623,552. 22 Apr. 1997.
[7] J.E. Thurman, "Biometric security now and in the future," East Carolina University, 2016.
[8] T. Murakami and K. Takahashi. "High security biometric authentication system," U.S. Patent Application No. 13/706,854.
[9] J.P. Jones, and L.A. Palmer. "An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex," Journal of neurophysiology, 58.6, pp. 1233-1258, 1987.
[10] M. Nazarkevych, R. Oliiarnyk, H. Nazarkevych, O., Kramarenko, and I. Onyshschenko, “The method of encryption based on Atebfunctions,” IEEE First International Conference Data Stream Mining & Processing (DSMP), pp. 129-133, August 2016.
[11] Y. Rashkevych, D. Peleshko, O. Vynokurova, I. Izonin and N. Lotoshynska, "Single-frame image super-resolution based on singular square matrix operator," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kiev, pp. 944-948, 2017. doi: 10.1109/UKRCON.2017.8100390.
[12] D. Peleshko, T. Rak, M. Peleshko, I. Izonin and D. Batyuk, "Twoframes image superresolution based on the aggregate divergence matrix," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 235-238, 2016. doi: 10.1109/DSMP.2016.7583548
[13] O. K. Yudin, O. G. Korchenko, G. F. and Konahovich, Information security in data networks. K: TOV “NVP” INTERSERVIS, 2009. [14] O. Riznik, I. Yurchak, E. Vdovenko and A. Korchagina, "Model of stegosystem images on the basis of pseudonoise codes," 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design, Lviv, pp. 51-52, 2010.
[14] O. Riznyk, I. Yurchak and O. Povshuk, "Synthesis of optimal recoverysystems in distributed computing using ideal ring bundles," XII International Conference on Perspective Technologies and Methods in MEMSDesign (MEMSTECH), Lviv, pp. 220-222, 2016. doi: 10.1109/MEMSTECH.2016.7507545.
References (International): [1] S. Pankanti, R.M. Bolle, and A. Jain. "Biometrics: The future of identification [guest eeditors' introduction]," Computer society, 33.2 pp. 46-49, 2000.
[2] J. Wayman, et al. "An introduction to biometric authentication systems," Biometric Systems. Springer London,. Pp.1-20, 2005.
[3] A. Ross, and A. Jain. "Information fusion in biometrics." Pattern recognition letters 24.13 (2003): 2115-2125.
[4] U. Umut and A.K. Jain. "Attacks on biometric systems: a case study in fingerprints," Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306. International Society for Optics and Photonics, 2004.
[5] X. Liu, M. Tanaka, and M. Okutomi. "Noise level estimation using weak textured patches of a single noisy image," Image Processing (ICIP), 2012 19th IEEE International Conference on. IEEE, 2012.
[6] W.F. Lane, "Self-authenticating identification card with fingerprint identification," U.S. Patent No. 5,623,552. 22 Apr. 1997.
[7] J.E. Thurman, "Biometric security now and in the future," East Carolina University, 2016.
[8] T. Murakami and K. Takahashi. "High security biometric authentication system," U.S. Patent Application No. 13/706,854.
[9] J.P. Jones, and L.A. Palmer. "An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex," Journal of neurophysiology, 58.6, pp. 1233-1258, 1987.
[10] M. Nazarkevych, R. Oliiarnyk, H. Nazarkevych, O., Kramarenko, and I. Onyshschenko, "The method of encryption based on Atebfunctions," IEEE First International Conference Data Stream Mining & Processing (DSMP), pp. 129-133, August 2016.
[11] Y. Rashkevych, D. Peleshko, O. Vynokurova, I. Izonin and N. Lotoshynska, "Single-frame image super-resolution based on singular square matrix operator," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kiev, pp. 944-948, 2017. doi: 10.1109/UKRCON.2017.8100390.
[12] D. Peleshko, T. Rak, M. Peleshko, I. Izonin and D. Batyuk, "Twoframes image superresolution based on the aggregate divergence matrix," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 235-238, 2016. doi: 10.1109/DSMP.2016.7583548
[13] O. K. Yudin, O. G. Korchenko, G. F. and Konahovich, Information security in data networks. K: TOV "NVP" INTERSERVIS, 2009. [14] O. Riznik, I. Yurchak, E. Vdovenko and A. Korchagina, "Model of stegosystem images on the basis of pseudonoise codes," 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design, Lviv, pp. 51-52, 2010.
[14] O. Riznyk, I. Yurchak and O. Povshuk, "Synthesis of optimal recoverysystems in distributed computing using ideal ring bundles," XII International Conference on Perspective Technologies and Methods in MEMSDesign (MEMSTECH), Lviv, pp. 220-222, 2016. doi: 10.1109/MEMSTECH.2016.7507545.
Content type: Conference Abstract
Appears in Collections:Data stream mining and processing : proceedings of the IEEE second international conference

Files in This Item:
File Description SizeFormat 
2018_Nazarkevych_M-Investigation_the_Ateb_580-583.pdf513.76 kBAdobe PDFView/Open
2018_Nazarkevych_M-Investigation_the_Ateb_580-583__COVER.png577.08 kBimage/pngView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.