National Repository of Grey Literature 54 records found  beginprevious45 - 54  jump to record: Search took 0.02 seconds. 
Detection of Papillary Line Width by Fingerprints
Homola, Antonín ; Drahanský, Martin (referee) ; Lodrová, Dana (advisor)
This work outlines a method of detection of the papillary line width in fingerprints. This method is one of the possible methods of liveness detection. The first part of the work with deals defining of the fingerprint, attacks on today's systems and possibilities to improve security. The next section detection describes of the papillary line width. During the process of resolving, the first thing to do was to start operation of the scanning device and to read the database for tests and experiments. An independent application was created on this purpose. Further, there were projected methods for detection and measuring of the papillary line width. Use of the Canny edge detector with the Sobel operator and the Gaussian filter proved the best. Then, there is described implementation of individual methods. The next part of the work describes and assesses the results of the tests. The last chapter summarizes the work and proposes further possibilities of development.
Core of the Multimodal Biometric System
Pokorný, Karel ; Drahanský, Martin (referee) ; Váňa, Jan (advisor)
The aim of this thesis is a design and realization of the core of multimodal biometric system. First part of the thesis sumarizes contemporary knowledge about biometric systems and about combination of their outputs. Second part introduces concept and implementation of multimodal biometric system, which uses weighted score combination and user-specific weights.
Fingerprint Damage Simulation
Kanich, Ondřej ; Doležel, Michal (referee) ; Drahanský, Martin (advisor)
Cílem této práce je návrh a implementace aplikace pro simulaci poškození umělého otisku prstu. Při studiu jsem se soustředil hlavně na projekt SFinGe, který je průkopníkem v této oblasti. Specifikoval jsem přesněji oblast zájmu na optický či kapacitní senzor a poškození otisků prstů v závislosti na tlaku a vlhkosti, poškození a pošpinění senzoru a deformaci pokožky. Navrhl jsem způsob implementace těchto vlivů poškozujících umělý otisk prstu tak, aby se lépe podobal reálným otiskům. Tyto metody využívají morfologické operátory a model plastického zkreslení u otisků prstů. Výsledky nejúspěšnějších metod mají o 62.5% horší skóre v komerčním produktu oproti originálu a o jednu třídu horší hodnocení dle normy pro kvalitu obrazu otisku prstu. Přínosem této práce je tedy poškození umělých otisků tak, že prokazatelně dosahují horších výsledků než originál a návrh aplikace, která umožňuje rozšíření o další metody.
Support for Fingerprint Authentication
Bartoň, Jaroslav ; Beran, Vítězslav (referee) ; Mlích, Jozef (advisor)
The goal of the thesis is the finger-print authentication support within the Linux operating system and the K Desktop Environment (KDE). Theoretical part of the thesis firstly explains main IT security terms and ways to proof the identity. Secondly it describes biometric systems and types of processed biometric characteristics. Lastly the features of finger-prints, their markants as well as types of scanners used in scanning the finger-prints and ways to analyze the scanned material have been elaborated. Practical solution part of the thesis develops and establishes finger-print management application and plugin for KDM graphics login manager.
Forensic Optical Fingerprint Comparator
Dvořák, Marek ; Klubal, Ondřej (referee) ; Drahanský, Martin (advisor)
My Bachelor Thesis deals with the design and creation of an application that replaces the function of forensic optical comparator. It also describes features of fingerprints and their prominent points, which are used for recognition of individuals. Work with fingerprints is very sensitive as for the quality of images. For this reason a Gabor filter has been implemented and described. Furthermore, the thesis describes basic functions used for work with images.
Liveness Detection on Fingers Using Vein Pattern
Dohnálek, Tomáš ; Váňa, Jan (referee) ; Drahanský, Martin (advisor)
Tato práce se zabývá rozšířením snímače otisků prstů Touchless Biometric Systems 3D-Enroll o jednotku detekce živosti prstu na základě žil. Bylo navrhnuto a zkonstruováno hardwarové řešení s využitím infračervených diod. Navržené softwarové řešení pracuje ve dvou různých režimech: detekce živosti na základě texturních příznaků a verifikace uživatelů na základě porovnávání žilních vzorů. Datový soubor obsahující přes 1100 snímků jak živých prstů tak jejich falsifikátů vznikl jako součást této práce a výkonnost obou zmíněných režimů byla vyhodnocena na tomto datovém souboru. Na závěr byly navrhnuty materiály vhodné k výrobě falsifikátů otisků prstů umožňující oklamání detekce živosti pomocí žilních vzorů.
Biometrics as a security element in banking
Pavliščák, Matúš ; Albrecht, Jakub (advisor) ; Voříšek, Jiří (referee)
The aim of my Bachelor thesis is to provide a comprehensive overview of biometrics as an applied security element within the banking sector. It describes various methods of biometrics-centric identification and data-processing. The main contribution of this thesis is its analysis of the case study conducted by Innovatrics, "The Introduction of Apple Pay and MasterCard Platforms," both of which implement biometrics in banking. The result is an assessment of the current state of usage of biometrics in banks around the world, compared to those within the Czech Republic and Slovakia, and suggestions for what local banks should focus on within the field.
Methods of users autentization in IS
Nazaryan, Armen ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
The Objectives were it to inform the work of outsider Even Slightly hip readers of information technology to the Characteristics of authentication technologies, Their Advantages and disadvantages of a Retrospective Comparison of Methods of logging. Paper outlines the Implementation Process and describes its examples. The Practical Part of the Imperfection of Technology Shows Some errors and biometric security Methods. The structure of work is Divided Into 4 Basic Headings, ergot, authentication methods, Basic Characteristics of names and passwords, and Their proper use, and the Implementation Process and Practical part, the two WHERE Attempts to break the biometric security. Both Attempts were also we Contribution on Methods of authentication. The experience I gained Valuable during Their Performance In the future I definitely has more efforts to keep sensitive data and Forms of Access, The Greatest caution.
Phonetics and fingerprints in criminology
Kratochvíl, David ; Doucek, Petr (advisor) ; Veber, Jaromír (referee)
In today's world biometrics are not only applied in the commercial sphere, but their technological advantages and opportunities permeate also into forensic practice. Some of them are even at such a high technological level, which can be used as the court evidence. The contribution of this work is in providing information and evaluation procedure for the extraction, identification or reliability of the tracks for forensic application. This work responds to the question of how to proceed in processing tracks and what can be read from it. After an introduction dealing with identity in general, the work follows in second part with two selected biometrics, which are analyze and evaluate from technological and forensic aspects.
The use of biometrics in IT
Bílý, Petr ; Balada, Jakub (advisor) ; Šedivá, Zuzana (referee)
Biometrics is increasingly applied in IT (biometric methods today generally use computer technology), mostly used to authenticate users. The aim of this thesis is to describe and compare two selected biometric methods. These methods are fingerprints and scanning of human face. The contribution of this work is to provide information on biometric identification methods, their advantages and disadvantages, and deployment options. If an organization decides to strengthen their security systems with introduction of biometric identification / verification systems, they can find information about these systems, types of sensing devices and their advantages and disadvantages. This work will provide an answer WHY introdukce and use these systems to persons who are responsible for the security policy. The first part after the introduction contains basic concepts in the field of biometric identification, followed by a general overview of the stages of biometric processing (from data collection to their storage), the main areas of use of biometric identification (corporate sphere, security of persons and property, law enforcement agencies and the courts, banking and e-commerce, travel and tourism, and telecommunications), measuring performance in biometrics. Then follow the main chapters of work consisting of two chosen methods of biometric identification (fingerprints and face) and their summaries in the form of mapping advantages and disadvantages.

National Repository of Grey Literature : 54 records found   beginprevious45 - 54  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.