Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/52450
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNazarkevych, Mariya
dc.contributor.authorKlyujnyk, Ivanna
dc.contributor.authorNazarkevych, Hanna
dc.coverage.temporal21-25 August 2018, Lviv
dc.date.accessioned2020-06-19T12:04:39Z-
dc.date.available2020-06-19T12:04:39Z-
dc.date.created2018-02-28
dc.date.issued2018-02-28
dc.identifier.citationNazarkevych M. Investigation the Ateb-Gabor Filter in Biometric Security Systems / Mariya Nazarkevych, Ivanna Klyujnyk, Hanna Nazarkevych // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Львів : Lviv Politechnic Publishing House, 2018. — P. 580–583. — (Machine Vision and Pattern Recognition).
dc.identifier.isbn© Національний університет „Львівська політехніка“, 2018
dc.identifier.isbn© Національний університет „Львівська політехніка“, 2018
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/52450-
dc.description.abstractBiometric information security systems are analyzed. One of the most important characteristics is the high reliability, which corresponds to the ability of the system to distinguish between biometric characteristics that correspond to different people on also it is safe to find a match. To implement this, at the filtration stage, it is proposed to use the Ateb-Gabor filter, which extends the usual filtering. With this filtering, you can improve the gradation characteristics of biometric models. The Ateb-Gabor filter was constructed and studied, graphs of the new function and corresponding frequency graphs are presented. Filtration experiments are performed. The SNR filtration quality is estimated.
dc.format.extent580-583
dc.language.isoen
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofData stream mining and processing : proceedings of the IEEE second international conference, 2018
dc.subjectImage filtering
dc.subjectAteb-Gabor filter
dc.subjectAtebfunctions
dc.titleInvestigation the Ateb-Gabor Filter in Biometric Security Systems
dc.typeConference Abstract
dc.rights.holder© Національний університет “Львівська політехніка”, 2018
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.affiliationTaras Shevchenko National University of Kyiv
dc.format.pages4
dc.identifier.citationenNazarkevych M. Investigation the Ateb-Gabor Filter in Biometric Security Systems / Mariya Nazarkevych, Ivanna Klyujnyk, Hanna Nazarkevych // Data stream mining and processing : proceedings of the IEEE second international conference, 21-25 August 2018, Lviv. — Lviv Politechnic Publishing House, 2018. — P. 580–583. — (Machine Vision and Pattern Recognition).
dc.relation.references[1] S. Pankanti, R.M. Bolle, and A. Jain. "Biometrics: The future of identification [guest eeditors' introduction]," Computer society, 33.2 pp. 46-49, 2000.
dc.relation.references[2] J. Wayman, et al. "An introduction to biometric authentication systems," Biometric Systems. Springer London,. Pp.1-20, 2005.
dc.relation.references[3] A. Ross, and A. Jain. "Information fusion in biometrics." Pattern recognition letters 24.13 (2003): 2115-2125.
dc.relation.references[4] U. Umut and A.K. Jain. "Attacks on biometric systems: a case study in fingerprints," Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306. International Society for Optics and Photonics, 2004.
dc.relation.references[5] X. Liu, M. Tanaka, and M. Okutomi. "Noise level estimation using weak textured patches of a single noisy image," Image Processing (ICIP), 2012 19th IEEE International Conference on. IEEE, 2012.
dc.relation.references[6] W.F. Lane, "Self-authenticating identification card with fingerprint identification," U.S. Patent No. 5,623,552. 22 Apr. 1997.
dc.relation.references[7] J.E. Thurman, "Biometric security now and in the future," East Carolina University, 2016.
dc.relation.references[8] T. Murakami and K. Takahashi. "High security biometric authentication system," U.S. Patent Application No. 13/706,854.
dc.relation.references[9] J.P. Jones, and L.A. Palmer. "An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex," Journal of neurophysiology, 58.6, pp. 1233-1258, 1987.
dc.relation.references[10] M. Nazarkevych, R. Oliiarnyk, H. Nazarkevych, O., Kramarenko, and I. Onyshschenko, “The method of encryption based on Atebfunctions,” IEEE First International Conference Data Stream Mining & Processing (DSMP), pp. 129-133, August 2016.
dc.relation.references[11] Y. Rashkevych, D. Peleshko, O. Vynokurova, I. Izonin and N. Lotoshynska, "Single-frame image super-resolution based on singular square matrix operator," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kiev, pp. 944-948, 2017. doi: 10.1109/UKRCON.2017.8100390.
dc.relation.references[12] D. Peleshko, T. Rak, M. Peleshko, I. Izonin and D. Batyuk, "Twoframes image superresolution based on the aggregate divergence matrix," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 235-238, 2016. doi: 10.1109/DSMP.2016.7583548
dc.relation.references[13] O. K. Yudin, O. G. Korchenko, G. F. and Konahovich, Information security in data networks. K: TOV “NVP” INTERSERVIS, 2009. [14] O. Riznik, I. Yurchak, E. Vdovenko and A. Korchagina, "Model of stegosystem images on the basis of pseudonoise codes," 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design, Lviv, pp. 51-52, 2010.
dc.relation.references[14] O. Riznyk, I. Yurchak and O. Povshuk, "Synthesis of optimal recoverysystems in distributed computing using ideal ring bundles," XII International Conference on Perspective Technologies and Methods in MEMSDesign (MEMSTECH), Lviv, pp. 220-222, 2016. doi: 10.1109/MEMSTECH.2016.7507545.
dc.relation.referencesen[1] S. Pankanti, R.M. Bolle, and A. Jain. "Biometrics: The future of identification [guest eeditors' introduction]," Computer society, 33.2 pp. 46-49, 2000.
dc.relation.referencesen[2] J. Wayman, et al. "An introduction to biometric authentication systems," Biometric Systems. Springer London,. Pp.1-20, 2005.
dc.relation.referencesen[3] A. Ross, and A. Jain. "Information fusion in biometrics." Pattern recognition letters 24.13 (2003): 2115-2125.
dc.relation.referencesen[4] U. Umut and A.K. Jain. "Attacks on biometric systems: a case study in fingerprints," Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306. International Society for Optics and Photonics, 2004.
dc.relation.referencesen[5] X. Liu, M. Tanaka, and M. Okutomi. "Noise level estimation using weak textured patches of a single noisy image," Image Processing (ICIP), 2012 19th IEEE International Conference on. IEEE, 2012.
dc.relation.referencesen[6] W.F. Lane, "Self-authenticating identification card with fingerprint identification," U.S. Patent No. 5,623,552. 22 Apr. 1997.
dc.relation.referencesen[7] J.E. Thurman, "Biometric security now and in the future," East Carolina University, 2016.
dc.relation.referencesen[8] T. Murakami and K. Takahashi. "High security biometric authentication system," U.S. Patent Application No. 13/706,854.
dc.relation.referencesen[9] J.P. Jones, and L.A. Palmer. "An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex," Journal of neurophysiology, 58.6, pp. 1233-1258, 1987.
dc.relation.referencesen[10] M. Nazarkevych, R. Oliiarnyk, H. Nazarkevych, O., Kramarenko, and I. Onyshschenko, "The method of encryption based on Atebfunctions," IEEE First International Conference Data Stream Mining & Processing (DSMP), pp. 129-133, August 2016.
dc.relation.referencesen[11] Y. Rashkevych, D. Peleshko, O. Vynokurova, I. Izonin and N. Lotoshynska, "Single-frame image super-resolution based on singular square matrix operator," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kiev, pp. 944-948, 2017. doi: 10.1109/UKRCON.2017.8100390.
dc.relation.referencesen[12] D. Peleshko, T. Rak, M. Peleshko, I. Izonin and D. Batyuk, "Twoframes image superresolution based on the aggregate divergence matrix," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 235-238, 2016. doi: 10.1109/DSMP.2016.7583548
dc.relation.referencesen[13] O. K. Yudin, O. G. Korchenko, G. F. and Konahovich, Information security in data networks. K: TOV "NVP" INTERSERVIS, 2009. [14] O. Riznik, I. Yurchak, E. Vdovenko and A. Korchagina, "Model of stegosystem images on the basis of pseudonoise codes," 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design, Lviv, pp. 51-52, 2010.
dc.relation.referencesen[14] O. Riznyk, I. Yurchak and O. Povshuk, "Synthesis of optimal recoverysystems in distributed computing using ideal ring bundles," XII International Conference on Perspective Technologies and Methods in MEMSDesign (MEMSTECH), Lviv, pp. 220-222, 2016. doi: 10.1109/MEMSTECH.2016.7507545.
dc.citation.conferenceIEEE second international conference "Data stream mining and processing"
dc.citation.spage580
dc.citation.epage583
dc.coverage.placenameЛьвів
Appears in Collections:Data stream mining and processing : proceedings of the IEEE second international conference

Files in This Item:
File Description SizeFormat 
2018_Nazarkevych_M-Investigation_the_Ateb_580-583.pdf513.76 kBAdobe PDFView/Open
2018_Nazarkevych_M-Investigation_the_Ateb_580-583__COVER.png577.08 kBimage/pngView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.