National Repository of Grey Literature 5 records found  Search took 0.01 seconds. 
Processing of iris images for biometric applications
Osičková, Kristýna ; Drahanský, Martin (referee) ; Kolář, Radim (advisor)
Biometrics is a method of recognizing the identity of a person based on unique biological characteristics that are unique to each person. The methods of biometric identification is currently becoming increasingly widespread in various sectors. This work is focused on the identification of a person by iris images. The introductory section describes the principles of the well-known methods for biometric applications and the next part describes the design method and its implementation in Matlab. In the practical part, fast radial symmetry method is used for detection of pupil, from which it derives further image processing. Two dimensional discrete welvet transform is used here. The proposed algorithm is tested on databases CASIA-Iris- Interval and database IITD.
Processing of iris images for biometric applications
Osičková, Kristýna ; Drahanský, Martin (referee) ; Kolář, Radim (advisor)
Biometrics is a method of recognizing the identity of a person based on unique biological characteristics that are unique to each person. The methods of biometric identification is currently becoming increasingly widespread in various sectors. This work is focused on the identification of a person by iris images. The introductory section describes the principles of the well-known methods for biometric applications and the next part describes the design method and its implementation in Matlab. In the practical part, fast radial symmetry method is used for detection of pupil, from which it derives further image processing. Two dimensional discrete welvet transform is used here. The proposed algorithm is tested on databases CASIA-Iris- Interval and database IITD.
Methods of users autentization in IS
Nazaryan, Armen ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
The Objectives were it to inform the work of outsider Even Slightly hip readers of information technology to the Characteristics of authentication technologies, Their Advantages and disadvantages of a Retrospective Comparison of Methods of logging. Paper outlines the Implementation Process and describes its examples. The Practical Part of the Imperfection of Technology Shows Some errors and biometric security Methods. The structure of work is Divided Into 4 Basic Headings, ergot, authentication methods, Basic Characteristics of names and passwords, and Their proper use, and the Implementation Process and Practical part, the two WHERE Attempts to break the biometric security. Both Attempts were also we Contribution on Methods of authentication. The experience I gained Valuable during Their Performance In the future I definitely has more efforts to keep sensitive data and Forms of Access, The Greatest caution.
Description and comparison of biometric methods in IT
Müller, Pavel ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
The main objectives of this work are the elaboration of the basic facts and principles of the field of biometric identification as a basis for further introduction of five selected biometric techniques (fingerprints, hand geometry, face, voice and eye iris) and consequently also their evaluation and selection of the most promising methods based on four selected summary of the evaluation criteria (cost, reliability, security level and other criteria). Which itself will be done on the basis of facts presented throughout the work and will be designed in such a way that it can be used even in case of choosing of biometric identification method for specific use in practice.
Use of Biometrics in the Czech Republic
Šíp, Miroslav ; Doucek, Petr (advisor) ; Novák, Luděk (referee)
Tato práce se zabývá, v nynější době, velmi aktuální a atraktivní vědou ? biometrií. V celém informačním systému podniku je, oprávněně, kladen největší důraz na bezpečnost. Jako nejúčinnější nástroj se v současné době jeví použití biometrik. Prvním cílem této práce je zdůraznění výhod, ale také nevýhod využití biometrik. Využití biometrik se ukazuje jako velmi efektivní nástroj v zabezpečení. Neúčinnější je ovšem využití biometrik v kombinaci s jinými bezpečnostními prvky. Podstatná část mé práce analyzuje jednotlivé biometrické technologie. Zaobírá se nejen technologiemi fyziologickými, ale také behaviorálními. Technologie jsou navzájem porovnávány a hodnoceny. Tato analýza směřuje k hlavnímu cíly mé diplomové práce. Tímto cílem je navržení co nejúčinnějšího využití biometrik v praxi. Doporučení je rozděleno do tří kategorií podle stupně požadovaného zabezpečení. Toto doporučení je poté srovnáno s reálným rozvržením biometrických systémů v praxi. Poslední dvě kapitoly jsou věnovány nejznámějšímu využití biometrie v praxi, tedy pasům v České republice. Zde je rozebrán nejen pohled architektury projektu CDBP, ale především zabezpečení dat uložených v pasu. Poslední kapitola je věnována pohledu do budoucnosti a spojení biometrie s kryptografií.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.