Time filter

Source Type

Choras M.,Institute of Telecommunications
Pattern Analysis and Applications | Year: 2010

In many cases human identification biometric systems are motivated by real-life criminal and forensic applications. One of the most interesting emerging method of human identification, which originates from the criminal and forensic practice, is human lips recognition. In this paper we consider lips shape and color features in order to determine human identity. We present standard and original geometrical parameters used in lips biometric system. Moreover Zernike and Hu moments as well as color features have been used. The presented results are yet not as good as these achieved in other known biometric systems. However, we believe that both lips biometrics as well as our approach and results, are worth to be presented to a wide research community. © Springer-Verlag London Limited 2009. Source

Choras M.,Institute of Telecommunications
Advances in Intelligent Systems and Computing | Year: 2013

In this paper an overview of image processing methods for feature extraction applied to knuckle biometrics also termed as FKP (finger-knuckle-print) is presented. Knuckle is a part of hand, and therefore, is easily accessible, invariant to emotions and other behavioral aspects (e.g. tiredness) and most importantly is rich in texture features which usually are very distinctive. In this paper a short overview of the known recent approaches to human identification on the basis of knuckle images is given. © Springer International Publishing Switzerland 2013. Source

Kozik R.,Institute of Telecommunications
Advances in Intelligent Systems and Computing | Year: 2014

In this article a simplified model of biologically inspired mechanisms for an object recognition is presented. The proposed approach is based on the HMAX hierarchical cortex model that was proposed by Riesenhuber and Poggio [1] and later extended by Serre et al [2]. The work described in this paper is an extension of a previous research [3, 4, 5, 6] focused on a computer vision software (named SMAS - Stereovision Mobility Aid System) dedicated for visually impaired persons. Therefore, the emphasis here is put on a one-class detection problem of dangerous objects with the possibility of a future deployment of the proposed solution on a mobile device. The conducted experiments show that the introduced modifications of the hierarchical HMAX model allows for an efficient feature extraction and a visual information coding without decreasing the effectiveness of an object detection process. © Springer International Publishing Switzerland 2014. Source

Dobos J.,Pan European University | Rakus M.,Institute of Telecommunications
Current Issues of Science and Research in the Global World - Proceedings of the International Conference on Current Issues of Science and Research in the Global World | Year: 2015

In digital transmission and storage systems, Error-Control Codes (ECC) provide a security mechanism allowing the detection and correction of a certain amount of errors, which can be caused by the presence of noise in these systems. ECC are denoted as [n, k, dmin], where “n” denotes the codeword length, “k” number of information symbols and “dmin” is the minimum code distance. The minimum code distance determines the error correction/ detection capabilities of a given code. Theoretically computed bounds of minimum code distance for many ECC have been found but to find generator matrices for many codes reaching theoretical bounds still remains a research problem. The presented paper describes an improved version of a proposed algorithm used for searching for the generator matrices of binary ECC. The described algorithm is based on an alteration of generator matrices of already found ECC. The presented algorithm reduces the total amount of tests required by the basic algorithm in order to reduce the execution time of the whole search process. The final part of this paper compares the execution time and memory requirements of the basic and improved version of the search algorithm. © 2015 Taylor & Francis Group, London. Source

Szalachowski P.,Maria Curie Sklodowska University | Ksiezopolski B.,Maria Curie Sklodowska University | Kotulski Z.,Polish Institute of Fundamental Technological Research | Kotulski Z.,Institute of Telecommunications
Information Processing Letters | Year: 2010

Symmetric block ciphers are usually used in WSN for security services. This paper puts forward the idea of using advanced modes of operation of symmetric block ciphers to achieve confidentiality and authentication in one cryptographic operation. The modes of operation approved by NIST that is CMAC, CCM, GCM/GMAC are applied here. The benchmarks of these approaches in the terms of efficiency of nodes in WSN are presented. © 2010 Elsevier B.V. All rights reserved. Source

Discover hidden collaborations