Mathematical model and methods of processing biometric images of fingerprints
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 3, Issue 11
Abstract
Today, using of personal identification technologies based on biometric parameters for access to information resources is becoming topical in connection with the increase of informatization in modern society. Physical characteristics such as face, voice, retina or fingerprints are used to confirm personal identity. The most successful biometric identification technology is fingerprinting - a comparison of fingerprints. It is easy for using, reliable and there is no outside intrusion. The article will consider an analytical probabilistic model of formation and processing of fingerprints portraits taking into account possible natural factors that can distort the image of prints. Also, the model was processed to minimize the distortions’ influence to approximate the distribution type of characteristic points to a similar distribution of the reference sample.
Authors and Affiliations
Emiliia Anishchenko, Serghii Rassomakhin
The research of block ciphers non-injective key schedules properties
The considers non-injective key schedules used in many known block ciphers ("Kalyna", FOX, Twofish, etc.). It is estimated the probability of matching of round keys (formed by non-injective key schedule) set and encrypti...
DATA SINGLE-ERROR CORRECTION METHOD OF A RESIDUE CLASS CODE
The method of correction of single errors in the residue class (RC) is considered in this article. The results of analysis of arithmetic code correcting possibilities showed high efficiency of the use of position-indepen...
ALGEBRAIC IMMUNITY OF SYMMETRIC CIPHERS
A key component of modern symmetric ciphers are nonlinear blocks (non-linear substitutions, substitution tables, S-boxes) that perform functions of hiding statistical links of plaintext and ciphertext, mixing and dissemi...
ЗАСТОСУВАННЯ КРИПТОАЛГОРИТМІВ В ДЕЦЕНТРАЛІЗОВАНИХ МЕРЕЖАХ ТА ПЕРСПЕКТИВИ ЇХ ЗАМІНИ ДЛЯ ПОСТКВАНТОВОГО ПЕРІОДУ
В роботі проведено огляд використовуваних у блокчейн системах електронних підписів та функцій хешування. Наведено криптографічні алгоритми, які використовуються або можуть використовуватися в децентралізованих мережах. П...
The method of a data control in the residual system classes based on use of positional attribute of non-positional code structure
The method of a data control in the residue number system (RNS) are developed in the article, which is based on the use of positional attribute of non-positional code structure. The using variants of the proposed method...