National Repository of Grey Literature 47 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Liveness Detection of a Hand
Vanický, Jozef ; Kanich, Ondřej (referee) ; Sakin, Martin (advisor)
This thesis solves the security problem of biometric systems which uses biometric data of a hand. It focuses on the absence of liveness detection during verification of a sample by the biometric system. In result this thesis offers to extend the contactless biometric systems by a system of liveness detection, which utilizes specific properties of human skin and its reactions to certain wavelengths of the visible spectrum of electromagnetic radiation. Reactions of the skin on the specific wavelengths of visible spectrum are analyzed and compared with the reactions of inorganic materials which imitates the hand. Outcome of this thesis is a design and implementation of a liveness detection algorithm, which can, based on the analysis of a set of photographs of the human palm, which was exposed to four wavelengths of a visible part of the electromagnetic spectrum, successfully recognize a hand from a counterfeit with an average accuracy rate of 82.20 %.
Extraction of Detailed Information from Plastic Fingerprints
Krsička, Tomáš ; Sakin, Martin (referee) ; Kanich, Ondřej (advisor)
This thesis deals with automatic analysis of plastic fingerprints and extraction of statistic information from them.   The application uses a texture highlighting algorithm to separate the area that includes the fingerprint and extracts the width and density of papillary ridges. These values are then converted into mm and appropriately exported. This information can then be used to estimate the age of the owner of the fingerprint. The results of the analysis of most of the data have shown wider ridges in male fingerprints and a growing width of ridges with the age of the owner.
Morphing of Fingerprints
Dovičic, Denis ; Sakin, Martin (referee) ; Kanich, Ondřej (advisor)
This bachelor`s thesis deals with the creation of a realistic looking fingerprint with a double identity. The goal is the design and subsequent implementation of an algorithm to create such a morphed fingerprint. The morphing consists of three important steps, extracting the information from the fingerprint, morphing the information to generate a new fingerprint, and verifying the morphed fingerprint against both originals to evaluate the double identity rating. As an extension, an algorithm for blurring the edges of a morphed fingerprint was implemented, the Minutia Cylinder-Code SDK was integrated into the application to immediately obtain double identity rating, and the method of obtaining suitable identities from the original fingerprints was modified to improve results. The implemented algorithms were tested on a fingerprint database, where it was shown that in the absence of damage, the information from the fingerprint is reliably extracted, from 90 % cases the morphed fingerprint acquired two identities and from 60 % it also had a realistic appearance.
Extraction of Features from the Palm for Identification of Persons
Pricl, Patrik ; Kanich, Ondřej (referee) ; Sakin, Martin (advisor)
The work deals with the identification of persons using the palm. The specific properties of the skin and blood vessels are used. The response of the skin and blood vessels to electromagnetic radiation is used to capture these properties. Gabor's filter is used to extract skin properties. The LLBP algorithm is used to extract the veins. It uses the Hamming distance, the Euclidean distance and the K-nearest neighbor algorithm to compare properties.
Analysis of Fingerprint Spoofs Created from Mold Done by Burning Technique
Sochová, Terézia ; Sakin, Martin (referee) ; Kanich, Ondřej (advisor)
This work is devoted to the production and analysis of fingerprint spoofs created from mold using a burning technique. The aim of this work is to create fingerprints spoofs from different materials and then to design and to implement an algorithm that compares spoofs with model fingerprints. Spoofs are made using beech wood molds. In order to create the fingerprints, plasteline, silicone and liquid latex are used. The analysis of the differences between fingerprint spoofs and their real fingerprints is based on the minutiae extraction and on their subsequent processing. The results of analysis are represented by three monitored metrics: number and type of minutiae, number of paired minutiae and average distance difference between fingerprint spoof minutiae and real fingerprint minutiae. The created program is tested using a database of produced fingerprint spoofs. The results of the program are compared with the results of the VeriFinger application. Both programs agreed that spoofs made by silicone are the ones of the highest quality.
Presentation Attack Detection on Hand Sensing Technology in Infrared Area
Richtarik, Jakub ; Sakin, Martin (referee) ; Drahanský, Martin (advisor)
When verifying a fingerprint, an attacker can use a counterfeit made of synthetic material. This can be prevented, for example, by using multispectral analysis, when various materials have different reflectance for certain wavelengths. There are several studies that have addressed this, but have always focused on one finger. The aim of this work is liveness detection on the whole palm and fingers, as on a larger object, which will contribute to even higher level of security. In the final solution, a NIR camera was used to capture the dataset, which is used to train a convolutional network to determine whether it is a living hand or a counterfeit.
Localization of People in the Building
Randýsek, Vojtěch ; Orság, Filip (referee) ; Sakin, Martin (advisor)
The aim of this thesis is to create a personal indoor positioning system. In this work, new systembasedonaBluetoothtechnologyisproposed.Personlocalizationisaccomplishedby usingthefingerprintingmethod.Proposedsystemconsistsofadatabase,awebapplication, a hardware layer and communication services. For the purpose of demonstration of the proposed system a video was made. System in the video, using propsed methods, gained standard accuracy of 2.46 m and standard deviation of 2 m. These results show that the combination of used technology leads to a succesful localization of people in buildings.
Pen Design with Hidden Sensors
Senčák, Jakub ; Drahanský, Martin (referee) ; Sakin, Martin (advisor)
In this work we have dealt with dynamic properties of handwriting text, the ways of recording it on different types of devices. The aim of this project was to design a device to capture these properties and saving them for further processing. The motivation for this work was to verify whether it is possible to make a device capable of recording dynamic font properties and then use them for falsifying signatures. The results of this work will provide the reader with necessary theoretical basics and steps to create such device.
Automatic Testing of Software
Hanák, Karel ; Sakin, Martin (referee) ; Korček, Pavol (advisor)
This thesis deals with open source software testing and automation of testing. The goal was to design tests, implement test cases and integrate them into the development environment of a software used to manage Internet of Things (IoT) networks. A new communication component using the TCP protocol was implemented to establish a connection with an IoT network emulator. A tool called Tavern was chosen for testing and automation. The entire solution is split into Docker images. The result can be easily extended with possible future functionality. As a result of testing with the network emulator, a handful of errors were found in both software documentation and the software itself. The main contribution of this thesis is the identification of errors as well as a way to simplify testing in the form of an IoT network emulator, allowing for automation of testing without the need for real IoT devices.
Detection and Recognition of Drone Movement in Video
Lapšanský, Simon ; Sakin, Martin (referee) ; Drahanský, Martin (advisor)
S nárastom dostupnosti dronov, narástlo aj riziko ich využívania na nelegálne aktivity. Na základe týchto rizík bola navrhnutá metóda na ich detekciu a následnú klasifikáciu aplikovateľnú v reálnom čase. Navrhovaný prístup využíva metódu odčítania pozadia, slúžiacu na detekciu objektov, zatiaľ čo klasifikácia je dosiahnutá pomocou hlbokého učenia. MOG2 využíva metódu zmiešaného Gaussovho modelu, ktorý slúži na odčítanie pozadia, za účelom detekcie objektov. YOLOv5 model pracujúci s neurónovými sieťami je využitý na následnú klasifikáciu detegovaných objektov. Implementácia vytvára spôsob detekcie a klasifikácie dronov s využitím procesora dosahujúca výsledky postačujúce na aplikovanie detekcie a klasifikácie dronov v reálnom čase. Metóda vyhodnocujúca záznam v rozlíšení 1080p, využívajúca procesor Intel i5-7600K dosahovala  v priemere 16 snímiek za sekundu, počas detekcie jedného objektu v snímke.

National Repository of Grey Literature : 47 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.