DC Field | Value | Language |
dc.contributor.author | Nazarkevych, Mariya | |
dc.contributor.author | Klyujnyk, Ivanna | |
dc.contributor.author | Nazarkevych, Hanna | |
dc.coverage.temporal | 21-25 August 2018, Lviv | |
dc.date.accessioned | 2020-06-19T12:04:39Z | - |
dc.date.available | 2020-06-19T12:04:39Z | - |
dc.date.created | 2018-02-28 | |
dc.date.issued | 2018-02-28 | |
dc.identifier.citation | Nazarkevych M. Investigation the Ateb-Gabor Filter in Biometric Security Systems / Mariya Nazarkevych, Ivanna Klyujnyk, Hanna Nazarkevych // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Львів : Lviv Politechnic Publishing House, 2018. — P. 580–583. — (Machine Vision and Pattern Recognition). | |
dc.identifier.isbn | © Національний університет „Львівська політехніка“, 2018 | |
dc.identifier.isbn | © Національний університет „Львівська політехніка“, 2018 | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/52450 | - |
dc.description.abstract | Biometric information security systems are
analyzed. One of the most important characteristics is the high
reliability, which corresponds to the ability of the system to
distinguish between biometric characteristics that correspond
to different people on also it is safe to find a match. To
implement this, at the filtration stage, it is proposed to use the
Ateb-Gabor filter, which extends the usual filtering. With this
filtering, you can improve the gradation characteristics of
biometric models. The Ateb-Gabor filter was constructed and
studied, graphs of the new function and corresponding
frequency graphs are presented. Filtration experiments are
performed. The SNR filtration quality is estimated. | |
dc.format.extent | 580-583 | |
dc.language.iso | en | |
dc.publisher | Lviv Politechnic Publishing House | |
dc.relation.ispartof | Data stream mining and processing : proceedings of the IEEE second international conference, 2018 | |
dc.subject | Image filtering | |
dc.subject | Ateb-Gabor filter | |
dc.subject | Atebfunctions | |
dc.title | Investigation the Ateb-Gabor Filter in Biometric Security Systems | |
dc.type | Conference Abstract | |
dc.rights.holder | © Національний університет “Львівська політехніка”, 2018 | |
dc.contributor.affiliation | Lviv Polytechnic National University | |
dc.contributor.affiliation | Taras Shevchenko National University of Kyiv | |
dc.format.pages | 4 | |
dc.identifier.citationen | Nazarkevych M. Investigation the Ateb-Gabor Filter in Biometric Security Systems / Mariya Nazarkevych, Ivanna Klyujnyk, Hanna Nazarkevych // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Lviv Politechnic Publishing House, 2018. — P. 580–583. — (Machine Vision and Pattern Recognition). | |
dc.relation.references | [1] S. Pankanti, R.M. Bolle, and A. Jain. "Biometrics: The future of identification [guest eeditors' introduction]," Computer society, 33.2 pp. 46-49, 2000. | |
dc.relation.references | [2] J. Wayman, et al. "An introduction to biometric authentication systems," Biometric Systems. Springer London,. Pp.1-20, 2005. | |
dc.relation.references | [3] A. Ross, and A. Jain. "Information fusion in biometrics." Pattern recognition letters 24.13 (2003): 2115-2125. | |
dc.relation.references | [4] U. Umut and A.K. Jain. "Attacks on biometric systems: a case study in fingerprints," Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306. International Society for Optics and Photonics, 2004. | |
dc.relation.references | [5] X. Liu, M. Tanaka, and M. Okutomi. "Noise level estimation using weak textured patches of a single noisy image," Image Processing (ICIP), 2012 19th IEEE International Conference on. IEEE, 2012. | |
dc.relation.references | [6] W.F. Lane, "Self-authenticating identification card with fingerprint identification," U.S. Patent No. 5,623,552. 22 Apr. 1997. | |
dc.relation.references | [7] J.E. Thurman, "Biometric security now and in the future," East Carolina University, 2016. | |
dc.relation.references | [8] T. Murakami and K. Takahashi. "High security biometric authentication system," U.S. Patent Application No. 13/706,854. | |
dc.relation.references | [9] J.P. Jones, and L.A. Palmer. "An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex," Journal of neurophysiology, 58.6, pp. 1233-1258, 1987. | |
dc.relation.references | [10] M. Nazarkevych, R. Oliiarnyk, H. Nazarkevych, O., Kramarenko, and I. Onyshschenko, “The method of encryption based on Atebfunctions,” IEEE First International Conference Data Stream Mining & Processing (DSMP), pp. 129-133, August 2016. | |
dc.relation.references | [11] Y. Rashkevych, D. Peleshko, O. Vynokurova, I. Izonin and N. Lotoshynska, "Single-frame image super-resolution based on singular square matrix operator," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kiev, pp. 944-948, 2017. doi: 10.1109/UKRCON.2017.8100390. | |
dc.relation.references | [12] D. Peleshko, T. Rak, M. Peleshko, I. Izonin and D. Batyuk, "Twoframes image superresolution based on the aggregate divergence matrix," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 235-238, 2016. doi: 10.1109/DSMP.2016.7583548 | |
dc.relation.references | [13] O. K. Yudin, O. G. Korchenko, G. F. and Konahovich, Information security in data networks. K: TOV “NVP” INTERSERVIS, 2009. [14] O. Riznik, I. Yurchak, E. Vdovenko and A. Korchagina, "Model of stegosystem images on the basis of pseudonoise codes," 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design, Lviv, pp. 51-52, 2010. | |
dc.relation.references | [14] O. Riznyk, I. Yurchak and O. Povshuk, "Synthesis of optimal recoverysystems in distributed computing using ideal ring bundles," XII International Conference on Perspective Technologies and Methods in MEMSDesign (MEMSTECH), Lviv, pp. 220-222, 2016. doi: 10.1109/MEMSTECH.2016.7507545. | |
dc.relation.referencesen | [1] S. Pankanti, R.M. Bolle, and A. Jain. "Biometrics: The future of identification [guest eeditors' introduction]," Computer society, 33.2 pp. 46-49, 2000. | |
dc.relation.referencesen | [2] J. Wayman, et al. "An introduction to biometric authentication systems," Biometric Systems. Springer London,. Pp.1-20, 2005. | |
dc.relation.referencesen | [3] A. Ross, and A. Jain. "Information fusion in biometrics." Pattern recognition letters 24.13 (2003): 2115-2125. | |
dc.relation.referencesen | [4] U. Umut and A.K. Jain. "Attacks on biometric systems: a case study in fingerprints," Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306. International Society for Optics and Photonics, 2004. | |
dc.relation.referencesen | [5] X. Liu, M. Tanaka, and M. Okutomi. "Noise level estimation using weak textured patches of a single noisy image," Image Processing (ICIP), 2012 19th IEEE International Conference on. IEEE, 2012. | |
dc.relation.referencesen | [6] W.F. Lane, "Self-authenticating identification card with fingerprint identification," U.S. Patent No. 5,623,552. 22 Apr. 1997. | |
dc.relation.referencesen | [7] J.E. Thurman, "Biometric security now and in the future," East Carolina University, 2016. | |
dc.relation.referencesen | [8] T. Murakami and K. Takahashi. "High security biometric authentication system," U.S. Patent Application No. 13/706,854. | |
dc.relation.referencesen | [9] J.P. Jones, and L.A. Palmer. "An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex," Journal of neurophysiology, 58.6, pp. 1233-1258, 1987. | |
dc.relation.referencesen | [10] M. Nazarkevych, R. Oliiarnyk, H. Nazarkevych, O., Kramarenko, and I. Onyshschenko, "The method of encryption based on Atebfunctions," IEEE First International Conference Data Stream Mining & Processing (DSMP), pp. 129-133, August 2016. | |
dc.relation.referencesen | [11] Y. Rashkevych, D. Peleshko, O. Vynokurova, I. Izonin and N. Lotoshynska, "Single-frame image super-resolution based on singular square matrix operator," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kiev, pp. 944-948, 2017. doi: 10.1109/UKRCON.2017.8100390. | |
dc.relation.referencesen | [12] D. Peleshko, T. Rak, M. Peleshko, I. Izonin and D. Batyuk, "Twoframes image superresolution based on the aggregate divergence matrix," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 235-238, 2016. doi: 10.1109/DSMP.2016.7583548 | |
dc.relation.referencesen | [13] O. K. Yudin, O. G. Korchenko, G. F. and Konahovich, Information security in data networks. K: TOV "NVP" INTERSERVIS, 2009. [14] O. Riznik, I. Yurchak, E. Vdovenko and A. Korchagina, "Model of stegosystem images on the basis of pseudonoise codes," 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design, Lviv, pp. 51-52, 2010. | |
dc.relation.referencesen | [14] O. Riznyk, I. Yurchak and O. Povshuk, "Synthesis of optimal recoverysystems in distributed computing using ideal ring bundles," XII International Conference on Perspective Technologies and Methods in MEMSDesign (MEMSTECH), Lviv, pp. 220-222, 2016. doi: 10.1109/MEMSTECH.2016.7507545. | |
dc.citation.conference | IEEE second international conference "Data stream mining and processing" | |
dc.citation.spage | 580 | |
dc.citation.epage | 583 | |
dc.coverage.placename | Львів | |
Appears in Collections: | Data stream mining and processing : proceedings of the IEEE second international conference
|