Evaluation of the effectiveness of different image skeletonization methods in biometric security systems

Author(s):  
Mariya Nazarkevych ◽  
Serhii Dmytruk ◽  
Volodymyr Hrytsyk ◽  
Olha Vozna ◽  
Anzhela Kuza ◽  
...  

Background: Systems of the Internet of Things are actively implementing biometric systems. For fast and high-quality recognition in sensory biometric control and management systems, skeletonization methods are used at the stage of fingerprint recognition. The analysis of the known skeletonization methods of Zhang-Suen, Hilditch, Ateb-Gabor with the wave skeletonization method has been carried out and it shows a good time and qualitative recognition results. Methods: The methods of Zhang-Suen, Hildich and thinning algorithm based on Ateb-Gabor filtration, which form the skeletons of biometric fingerprint images, are considered. The proposed thinning algorithm based on Ateb-Gabor filtration showed better efficiency because it is based on the best type of filtering, which is both a combination of the classic Gabor function and the harmonic Ateb function. The combination of this type of filtration makes it possible to more accurately form the surroundings where the skeleton is formed. Results: Along with the known ones, a new Ateb-Gabor filtering algorithm with the wave skeletonization method has been developed, the recognition results of which have better quality, which allows to increase the recognition quality from 3 to 10%. Conclusion: The Zhang-Suen algorithm is a 2-way algorithm, so for each iteration, it performs two sets of checks during which pixels are removed from the image. Zhang-Suen's algorithm works on a plot of black pixels with eight neighbors. This means that the pixels found along the edges of the image are not analyzed. Hilditch thinning algorithm occurs in several passages, where the algorithm checks all pixels and decides whether to replace a pixel from black to white if certain conditions are satisfied. This Ateb-Gabor filtering will provide better performance, as it allows to obtain more hollow shapes, organize a larger range of curves. Numerous experimental studies confirm the effectiveness of the proposed method.

Author(s):  
Donghui Zhang ◽  
Ruijie Liu

Abstract Orienteering has gradually changed from a professional sport to a civilian sport. Especially in recent years, orienteering has been widely popularized. Many colleges and universities in China have also set up this course. With the improvement of people’s living conditions, orienteering has really become a leisure sport in modern people’s life. The reduced difficulty of sports enables more people to participate, but it also exposes a series of problems. As the existing positioning technology is relatively backward, the progress in personnel tracking, emergency services, and other aspects is slow. To solve these problems, a new intelligent orienteering application system is developed based on the Internet of things. ZigBee network architecture is adopted in the system. ZigBee is the mainstream scheme in the current wireless sensor network technology, which has many advantages such as convenient carrying, low power consumption, and signal stability. Due to the complex communication environment in mobile signal, the collected information is processed by signal amplification and signal anti-interference technology. By adding anti-interference devices, video isolators and other devices, the signal is guaranteed to the maximum extent. In order to verify the actual effect of this system, through a number of experimental studies including the relationship between error and traffic radius and the relationship between coverage and the number of anchor nodes, the data shows that the scheme studied in this paper has a greater improvement in comprehensive performance than the traditional scheme, significantly improving the accuracy and coverage. Especially the coverage is close to 100% in the simulation experiment. This research has achieved good results and can be widely used in orienteering training and competition.


2011 ◽  
Vol 271-273 ◽  
pp. 1509-1513 ◽  
Author(s):  
Mei Xiu Lu ◽  
Fu Rong Wang ◽  
Feng Li

Image thinning is one of important steps of fingerprint preprocessing. Most of fingerprint recognition algorithms checked the characteristic points on thinning image. In this paper, we discover some shortages in OPTA and mathematical morphology thinning algorithm and find out the reasons for some shortages such as many glitches and snags, defective thinning, and so on. A new improved algorithm is proposed in the paper, which is an ideal algorithm because it is faster, produces less glitch, and thins completely.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


Author(s):  
John R. Regola ◽  
John K. Mitchell III ◽  
Brandon R. Baez ◽  
Syed S. Rizvi

In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.


2019 ◽  
Vol 160 ◽  
pp. 30-37 ◽  
Author(s):  
Mariya Nazarkevych ◽  
Hanna Nazarkevych ◽  
Vincent Karovic ml.

Sign in / Sign up

Export Citation Format

Share Document