Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images

The research involves development of a mathematical model for the probabilistic minutia distribution in biometric fingerprint images. The suggested model is based on heuristic analysis of the fingerprint scanning results with account for the nature of the potential errors.

[1]  V. Dolgov,et al.  THE NEW CONCEPT OF BLOCK SYMMETRIC CIPHERS DESIGN , 2017 .

[2]  Xueyin Lin,et al.  Color image segmentation using modified HSI system for road following , 1991, Proceedings. 1991 IEEE International Conference on Robotics and Automation.

[3]  Shaoyun Chen,et al.  Autonomous navigation through case-based learning , 1995, Proceedings of International Symposium on Computer Vision - ISCV.

[4]  Yuriy Gorbenko,et al.  Post-quantum message authentication cryptography based on error-correcting codes , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[5]  Ivan Gorbenko,et al.  Examining a possibility to use and the benefits of post-quantum algorithms dependent on the conditions of their application , 2017 .

[6]  Mariia Rodinko,et al.  Improvement of the high nonlinear S-boxes generation method , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[7]  Anil K. Jain,et al.  Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Roman Oliynykov,et al.  Influence of addition modulo 2n on algebraic attacks , 2016, Cryptography and Communications.

[9]  I. Gorbenko,et al.  Examination and implementation of the fast method for computing the order of elliptic curve , 2017 .

[10]  A. V. Potii,et al.  A System Approach to Certification of Pseudorandom Numbers Generators Used in Information Protection Systems , 1998 .

[11]  A. A. Kuznetsov,et al.  THE STATISTICAL ANALYSIS OF A NETWORK TRAFFIC FOR THE INTRUSION DETECTION AND PREVENTION SYSTEMS , 2015 .

[12]  Oleg Illiashenko,et al.  Advanced Security Assurance Case Based on ISO/IEC 15408 , 2015, DepCoS-RELCOMEX.

[13]  Xudong Jiang,et al.  Fingerprint minutiae matching based on the local and global structures , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[14]  V. A. Krasnobayev,et al.  A Method for Increasing the Reliability of Verification of Data Represented in a Residue Number System , 2014 .

[15]  Nalini K. Ratha,et al.  A new approach for iris segmentation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[16]  Olexandr Kuznetsov,et al.  Combinatorial properties of block symmetric ciphers key schedule , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[17]  Alexandr Kuznetsov,et al.  The research of modern stream ciphers , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[18]  Olexandr Kuznetsov,et al.  Strumok stream cipher: Specification and basic properties , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[19]  Mariia Rodinko,et al.  Open problems of proving security of ARX-based ciphers to differential cryptanalysis , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[20]  Y. Stasev,et al.  Asymmetric Code-Theoretical Schemes Constructed with the Use of Algebraic Geometric Codes , 2005 .

[21]  Alexandr Kuznetsov,et al.  Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2 , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[22]  I. Gorbenko,et al.  Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis , 1998 .

[23]  Bruce A. Draper,et al.  Recognizing faces with PCA and ICA , 2003, Comput. Vis. Image Underst..

[24]  J. Connell,et al.  Exploring Ridge Curvature for Fingerprint Indexing , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[25]  Nalini K. Ratha,et al.  Biometric Verification: Looking Beyond Raw Similarity Scores , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[26]  Alina Andrushkevych,et al.  The block symmetric ciphers in the post-quantum period , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[27]  Tong Heng Lee,et al.  Face recognition using recursive Fisher linear discriminant , 2006, IEEE Transactions on Image Processing.

[28]  Sharath Pankanti,et al.  A model-based sampling and sample synthesis method for auto identification in computer vision , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[29]  Tamila Lavrovska,et al.  Physical model of pseudorandom codes in multidimensional Euclidean space , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[30]  V. Krasnobayev,et al.  A Method for Arithmetic Comparison of Data Represented in a Residue Number System , 2016 .

[31]  Alexandr Kuznetsov,et al.  Periodic characteristics of output feedback encryption mode , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[32]  Juyang Weng,et al.  Incremental learning for vision-based navigation , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[33]  Alexandr Kuznetsov,et al.  Code-based public-key cryptosystems for the post-quantum period , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[34]  Sergii Kavun Conceptual fundamentals of a theory of mathematical interpretation , 2015, Int. J. Comput. Sci. Math..

[35]  V. M. Grachev,et al.  Technology for developing databases of information systems , 2014 .

[36]  Sharath Pankanti,et al.  On the individuality fingerprints , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[37]  Nicholas Costen,et al.  How Should We RepresentFaces for Automatic Recognition? , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[38]  I. D. Gorbenko,et al.  ENSEMBLE AND CORRELATION PROPERTIES OF CRYPTOGRAPHIC SIGNALS FOR TELECOMMUNICATION SYSTEM AND NETWORK APPLICATIONS , 2016 .

[39]  Alexandr Kuznetsov,et al.  Construction of cascade codes in the frequency domain , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[40]  V. M. Grachev,et al.  Data security mechanisms implemented in the database with universal model , 2014 .

[41]  Anil K. Jain,et al.  A Real-Time Matching System for Large Fingerprint Databases , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[42]  Sharath Pankanti,et al.  Minutia verification and classification for fingerprint matching , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[43]  Alina Yanko,et al.  Algorithms of data processing in the residual classes system , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[44]  Ivan Gorbenko,et al.  Anonymous electronic signature method , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).