https://oldena.lpnu.ua/handle/ntb/52450
Title: | Investigation the Ateb-Gabor Filter in Biometric Security Systems |
Authors: | Nazarkevych, Mariya Klyujnyk, Ivanna Nazarkevych, Hanna |
Affiliation: | Lviv Polytechnic National University Taras Shevchenko National University of Kyiv |
Bibliographic description (Ukraine): | Nazarkevych M. Investigation the Ateb-Gabor Filter in Biometric Security Systems / Mariya Nazarkevych, Ivanna Klyujnyk, Hanna Nazarkevych // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Львів : Lviv Politechnic Publishing House, 2018. — P. 580–583. — (Machine Vision and Pattern Recognition). |
Bibliographic description (International): | Nazarkevych M. Investigation the Ateb-Gabor Filter in Biometric Security Systems / Mariya Nazarkevych, Ivanna Klyujnyk, Hanna Nazarkevych // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Lviv Politechnic Publishing House, 2018. — P. 580–583. — (Machine Vision and Pattern Recognition). |
Is part of: | Data stream mining and processing : proceedings of the IEEE second international conference, 2018 |
Conference/Event: | IEEE second international conference "Data stream mining and processing" |
Issue Date: | 28-Feb-2018 |
Publisher: | Lviv Politechnic Publishing House |
Place of the edition/event: | Львів |
Temporal Coverage: | 21-25 August 2018, Lviv |
Keywords: | Image filtering Ateb-Gabor filter Atebfunctions |
Number of pages: | 4 |
Page range: | 580-583 |
Start page: | 580 |
End page: | 583 |
Abstract: | Biometric information security systems are analyzed. One of the most important characteristics is the high reliability, which corresponds to the ability of the system to distinguish between biometric characteristics that correspond to different people on also it is safe to find a match. To implement this, at the filtration stage, it is proposed to use the Ateb-Gabor filter, which extends the usual filtering. With this filtering, you can improve the gradation characteristics of biometric models. The Ateb-Gabor filter was constructed and studied, graphs of the new function and corresponding frequency graphs are presented. Filtration experiments are performed. The SNR filtration quality is estimated. |
URI: | https://ena.lpnu.ua/handle/ntb/52450 |
ISBN: | © Національний університет „Львівська політехніка“, 2018 © Національний університет „Львівська політехніка“, 2018 |
Copyright owner: | © Національний університет “Львівська політехніка”, 2018 |
References (Ukraine): | [1] S. Pankanti, R.M. Bolle, and A. Jain. "Biometrics: The future of identification [guest eeditors' introduction]," Computer society, 33.2 pp. 46-49, 2000. [2] J. Wayman, et al. "An introduction to biometric authentication systems," Biometric Systems. Springer London,. Pp.1-20, 2005. [3] A. Ross, and A. Jain. "Information fusion in biometrics." Pattern recognition letters 24.13 (2003): 2115-2125. [4] U. Umut and A.K. Jain. "Attacks on biometric systems: a case study in fingerprints," Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306. International Society for Optics and Photonics, 2004. [5] X. Liu, M. Tanaka, and M. Okutomi. "Noise level estimation using weak textured patches of a single noisy image," Image Processing (ICIP), 2012 19th IEEE International Conference on. IEEE, 2012. [6] W.F. Lane, "Self-authenticating identification card with fingerprint identification," U.S. Patent No. 5,623,552. 22 Apr. 1997. [7] J.E. Thurman, "Biometric security now and in the future," East Carolina University, 2016. [8] T. Murakami and K. Takahashi. "High security biometric authentication system," U.S. Patent Application No. 13/706,854. [9] J.P. Jones, and L.A. Palmer. "An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex," Journal of neurophysiology, 58.6, pp. 1233-1258, 1987. [10] M. Nazarkevych, R. Oliiarnyk, H. Nazarkevych, O., Kramarenko, and I. Onyshschenko, “The method of encryption based on Atebfunctions,” IEEE First International Conference Data Stream Mining & Processing (DSMP), pp. 129-133, August 2016. [11] Y. Rashkevych, D. Peleshko, O. Vynokurova, I. Izonin and N. Lotoshynska, "Single-frame image super-resolution based on singular square matrix operator," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kiev, pp. 944-948, 2017. doi: 10.1109/UKRCON.2017.8100390. [12] D. Peleshko, T. Rak, M. Peleshko, I. Izonin and D. Batyuk, "Twoframes image superresolution based on the aggregate divergence matrix," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 235-238, 2016. doi: 10.1109/DSMP.2016.7583548 [13] O. K. Yudin, O. G. Korchenko, G. F. and Konahovich, Information security in data networks. K: TOV “NVP” INTERSERVIS, 2009. [14] O. Riznik, I. Yurchak, E. Vdovenko and A. Korchagina, "Model of stegosystem images on the basis of pseudonoise codes," 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design, Lviv, pp. 51-52, 2010. [14] O. Riznyk, I. Yurchak and O. Povshuk, "Synthesis of optimal recoverysystems in distributed computing using ideal ring bundles," XII International Conference on Perspective Technologies and Methods in MEMSDesign (MEMSTECH), Lviv, pp. 220-222, 2016. doi: 10.1109/MEMSTECH.2016.7507545. |
References (International): | [1] S. Pankanti, R.M. Bolle, and A. Jain. "Biometrics: The future of identification [guest eeditors' introduction]," Computer society, 33.2 pp. 46-49, 2000. [2] J. Wayman, et al. "An introduction to biometric authentication systems," Biometric Systems. Springer London,. Pp.1-20, 2005. [3] A. Ross, and A. Jain. "Information fusion in biometrics." Pattern recognition letters 24.13 (2003): 2115-2125. [4] U. Umut and A.K. Jain. "Attacks on biometric systems: a case study in fingerprints," Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306. International Society for Optics and Photonics, 2004. [5] X. Liu, M. Tanaka, and M. Okutomi. "Noise level estimation using weak textured patches of a single noisy image," Image Processing (ICIP), 2012 19th IEEE International Conference on. IEEE, 2012. [6] W.F. Lane, "Self-authenticating identification card with fingerprint identification," U.S. Patent No. 5,623,552. 22 Apr. 1997. [7] J.E. Thurman, "Biometric security now and in the future," East Carolina University, 2016. [8] T. Murakami and K. Takahashi. "High security biometric authentication system," U.S. Patent Application No. 13/706,854. [9] J.P. Jones, and L.A. Palmer. "An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex," Journal of neurophysiology, 58.6, pp. 1233-1258, 1987. [10] M. Nazarkevych, R. Oliiarnyk, H. Nazarkevych, O., Kramarenko, and I. Onyshschenko, "The method of encryption based on Atebfunctions," IEEE First International Conference Data Stream Mining & Processing (DSMP), pp. 129-133, August 2016. [11] Y. Rashkevych, D. Peleshko, O. Vynokurova, I. Izonin and N. Lotoshynska, "Single-frame image super-resolution based on singular square matrix operator," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kiev, pp. 944-948, 2017. doi: 10.1109/UKRCON.2017.8100390. [12] D. Peleshko, T. Rak, M. Peleshko, I. Izonin and D. Batyuk, "Twoframes image superresolution based on the aggregate divergence matrix," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 235-238, 2016. doi: 10.1109/DSMP.2016.7583548 [13] O. K. Yudin, O. G. Korchenko, G. F. and Konahovich, Information security in data networks. K: TOV "NVP" INTERSERVIS, 2009. [14] O. Riznik, I. Yurchak, E. Vdovenko and A. Korchagina, "Model of stegosystem images on the basis of pseudonoise codes," 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design, Lviv, pp. 51-52, 2010. [14] O. Riznyk, I. Yurchak and O. Povshuk, "Synthesis of optimal recoverysystems in distributed computing using ideal ring bundles," XII International Conference on Perspective Technologies and Methods in MEMSDesign (MEMSTECH), Lviv, pp. 220-222, 2016. doi: 10.1109/MEMSTECH.2016.7507545. |
Content type: | Conference Abstract |
Appears in Collections: | Data stream mining and processing : proceedings of the IEEE second international conference |
File | Description | Size | Format | |
---|---|---|---|---|
2018_Nazarkevych_M-Investigation_the_Ateb_580-583.pdf | 513.76 kB | Adobe PDF | View/Open | |
2018_Nazarkevych_M-Investigation_the_Ateb_580-583__COVER.png | 577.08 kB | image/png | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.