<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Image Processing in Information Security</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Damdinova T.Ts.</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bazaron S.A.</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abatnin A.A.</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>East-Siberia State University of Technology and Management ESSUTM Ulan-Ude</institution>
          ,
          <addr-line>Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <fpage>16</fpage>
      <lpage>19</lpage>
      <abstract>
        <p>-The article discusses the task of image processing in relation to information security. The results of the analysis of recent literature are presented, and it is shown the methods and means of digital images processing continue to evolve and find new areas of application. The main tasks are related to information security in biometric systems and copyright protection. Object detection on video is one of the key factors for protection against unauthorized access. Due to increase of calculating power of computer accurately determine of object from a background is continue improve. In this article we propose a method for object detection using accurate edge description. The edge detection algorithm is based on curve fitting by cubic polynomial with 1st degree of smoothness (C1). The method allows obtaining object's edge description and the feature for effective recognition such as curvature. Using curvature makes possible to recognize partially visible objects successfully.</p>
      </abstract>
      <kwd-group>
        <kwd>information security</kwd>
        <kwd>biometric system</kwd>
        <kwd>copyright</kwd>
        <kwd>digital image processing</kwd>
        <kwd>digital watermark</kwd>
        <kwd>aberration of digital image</kwd>
        <kwd>image segmentation</kwd>
        <kwd>edge detection</kwd>
        <kwd>curve fitting</kwd>
        <kwd>pattern recognition</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>INTRODUCTION</title>
      <p>In the field of information security image processing tasks
are used to organize technical protection against unauthorized
access. One of the most effective and widely used means of
information unauthorized access is the installation of video
cameras. This topic is devoted to many scientific works of
recent years aimed at improving the quality of video
information. In addition, there are a number of works in the
field of protecting video information from unauthorized use
and the copyright of video and other information.</p>
      <p>II.</p>
    </sec>
    <sec id="sec-2">
      <title>IIMAGE PROCESSING IN THE FIELD OF INFORMATION</title>
    </sec>
    <sec id="sec-3">
      <title>SECURITY.</title>
      <p>To protect the information as the property methods adding
of special marks on video, digital images, electronic text are
used. As this means of information protecting from
unauthorized access methods for introducing of digital
watermark are being developed [1, 2]. A code of digital
watermark is analyzed by special decoder. This determines
whether information about the legal owner, other data,
confirming the authenticity or copyright of video or image
containing pictures or text.</p>
      <p>When processing data from a video stream received from
security cameras, in addition to the task of analyzing scene
changes and detecting motion on video [3, 4], it is necessary to
perform frame-by-frame data analysis in order to search and
recognize objects. Automation of these tasks significantly
reduces time of processing.</p>
      <p>
        Image processing is also used in biometric systems as a
means of user identification and authentication. The most
popular identification systems are scanning of fingerprints,
palms, retina and iris, analysis of a person’s face [5]. In relation
to the processes of scanning and analysis of fingerprints, there
are many works devoted to methods of improving quality for
solving such problems [
        <xref ref-type="bibr" rid="ref10">6-9</xref>
        ].
      </p>
      <p>
        Recognition of objects on biometric data, processing of
scenes of video frames is based on the analysis of contours or
edges [
        <xref ref-type="bibr" rid="ref8">10-12</xref>
        ]. This stage of image processing plays a key role
for further analysis for recognition. It is known that image
formation interference may influence the image [
        <xref ref-type="bibr" rid="ref11">13, 14</xref>
        ]. To
improve image quality in order to correct for hardware
interference, it is necessary to compensate the aberrations that
have occurred [15].
      </p>
      <p>To analyze the edges of the selected objects, many different
methods have been implemented, the main requirement for
which is accuracy or compliance with the permissible deviation
of points - residual. One of the significant indicators in the
description of the contour is its smoothness [16]. The
computing power of today’s computers makes it possible to
perform the calculation with sufficiently high speed that allows
the use of the developed methods in real-time systems.</p>
      <p>In connection with the development of 3D scanning and 3D
printing technologies, new opportunities appear in the field of
design and manufacturing of products, significantly affecting
the speed and reducing of time and material resources in
production. Accordingly, new tasks appear in the field of
information protection [17, 18]. Firstly, this relates to the issue
of copyright protection, especially with regard to the
production of designer products with privacy stamps. Second,
improved methods of processing and creation of models, the
emergence of new materials for 3D printing jeopardize the
effectiveness of biometric systems [19, 20]. This will
contribute to further development and new research to improve
information security. Overview of recent years articles shows
that researches are based on color and texture analyzing
[2123]</p>
      <p>III.</p>
    </sec>
    <sec id="sec-4">
      <title>EDGES DESCRIPTION</title>
      <p>
        There are many different methods of edge detection and
contour description applied to recognition of objects in
different fields [24 - 26]. Many researches in field of pattern
recognition are based on comparative study between some of
contour. Therefore, the accuracy of contour description is very
important in this problem. There are many different methods to
get information on contour points of object. One of the most
popular is curve approximation to the contours with studying
of curve’s features [
        <xref ref-type="bibr" rid="ref4">27 - 30</xref>
        ].
      </p>
      <p>We propose a recognition approach that is based on
deriving polynomials of 3rd degrees fitted to the object edges.</p>
      <p>First it’s necessary to find all special points on object edges
– corner points and points with vertical or horizontal tangent on
convex part of the contour. These points determine conditions
of curve fitting. Corner point must be on fitting curve and has
no fitting error that means the value of residual equals zero.
Other points’ residual value should be less than the value of
permissible tolerance ε. This check improves edge detection
accuracy. The value of the tolerance is different and depends
on solving problem. When modeling fitting curve, in order to
ensure smoothness a value of tangent to the curve is calculated.
The value of tangent affects on the next polynomial segment.
The point of calculated tangent marked as a point with tangent
and become the first point for next segment.</p>
      <p>Depending on types of point at the end of edge 6 cases of
curve fitting are determined. Curve fitting on edge points
always starts with condition when both the 1st and the last
points are of corner type – case 1. On figure 1 these points are
shown in red color. All points of the edge are in local
coordinate system. The fitting curve is 3rd degree polynomial
modeling by least square method. All points are checked on
fitting error. If there is no point with residual value more than
ε , then number of the curve segment on this edge is equal to 1
and we consider next edge. If curve fitting error occurs then
number of point in array is reduced and it is the 2nd case with
first point as corner (case 2). After successful fitting at the last
point the curve tangent is calculated. This value determines the
polynomial coefficient on the next segment of the edge with
tangent on first point (sown in blue color) and corner point at
the end (case 3).</p>
      <p>1.
2.
3.
4.
5.
6.</p>
      <p>The 4th case fitting curve has first point and tangent in the
first point requirements. The end of the curve is free but for
best smoothness we include to array several next points of the
edge additionally. Cases 5 and 6 appear when the edge has
point with vertical or horizontal tangent at the last point. On
Fig.1 they are in the local coordinate system and shown in blue
color. In case 5 the first point is of corner point type. In case 6
the first point has tangent calculated on the previous step.</p>
      <p>The algorithm of proposed method is presented on figure 2
and figure 3. For every segment of the fitting curve it’s
necessary to calculate curvatures of curve and object
recognition is performed by a comparative graph of curvature.</p>
      <p>The method of curve fitting described above substitutes
edge points, gives a fitting curve with the 1st degree of
smoothness (C1). This allows to obtain the values of curvature
invariant to rotation, scale and useful to recognize partially
visible objects. Changes of curvature value are used to measure
similarities of shape of recognized object and reference object.</p>
      <p>Using points with vertical or horizontal tangents and
tangent to curve on previous step simplify the computational
complexity and edge description of complex shape. The
program implementation of the algorithm presented above
shows good results for complex shape description.</p>
    </sec>
    <sec id="sec-5">
      <title>CONCLUSION</title>
      <p>For successful recognition of two-dimensional object the
key role plays accurate description of edges by curve fitting.
Curve modeling process important to obtain necessary
information on edge shape. One of the feature invariant to
rotation, scale is curvature of fitting curve with the 1st degree of
smoothness (C1) which allows recognizing of partially visible
object</p>
      <p>Methods and means for processing digital information are
widely used in the field of information security. With
development of information technology of 3D printing new
challenges in the field of copyright protection and improving
information protection appears.
system //
[Electronic</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Gorbenko R. K</surname>
          </string-name>
          .
          <article-title>Investigation of the mechanisms for protecting digital video information during its transmission in distributed computer networks</article-title>
          // Young Scientist.
          <article-title>- 2018</article-title>
          . No.
          <volume>9</volume>
          . - pp.
          <fpage>29</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Abasova A. M.</given-names>
            ,
            <surname>Babenko</surname>
          </string-name>
          <string-name>
            <surname>L. K.</surname>
          </string-name>
          <article-title>Development of an algorithm for implementing a digital watermark based on morphological image processing and modular arithmetic to counter the threats of theft of intellectual property //</article-title>
          <source>International Journal of Applied and Fundamental Research</source>
          . -
          <year>2018</year>
          . -№6 - pp.
          <fpage>9</fpage>
          -
          <lpage>14</lpage>
          Kozlov V. A.,
          <string-name>
            <surname>Potapov</surname>
            <given-names>A. S.</given-names>
          </string-name>
          <article-title>Analysis of methods for highlighting moving objects on video sequences with noise // Scientific and</article-title>
          <source>Technical Journal of Information Technologies, Mechanics and Optics</source>
          , No.
          <volume>3</volume>
          (
          <issue>73</issue>
          ),
          <year>2011</year>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Makarov</surname>
            <given-names>M. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berestneva</surname>
            <given-names>O. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andreev</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>The solution to the problem of describing and classifying the contours of moving objects in video</article-title>
          . // Bulletin of the Tomsk Polytechnic University. Information Technology.
          <year>2014</year>
          .V.
          <volume>325</volume>
          . No.
          <issue>5</issue>
          . pp.
          <fpage>77</fpage>
          -
          <lpage>83</lpage>
          Barabanov A.,
          <string-name>
            <surname>Markov</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Modern Trends in the Regulatory Framework of the Information Security Compliance Assessment in Russia Based on Common Criteria</article-title>
          .
          <source>In Proceedings of the 8th International Conference on Security of Information and Networks (Sochi, Russian Federation, September 08-10</source>
          ,
          <year>2015</year>
          ).
          <source>SIN '15</source>
          . ACM New York, NY, USA,
          <year>2015</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          30-
          <fpage>33</fpage>
          . DOI:
          <volume>10</volume>
          .1145/2799979.2799980.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Gudkov</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .
          <source>Methods of mathematical description and identification of fingerprints. // Proceedings of ISA RAS</source>
          <year>2008</year>
          .V.
          <volume>38</volume>
          p.
          <fpage>336</fpage>
          -
          <lpage>356</lpage>
          Rykanov
          <string-name>
            <surname>A. S.</surname>
          </string-name>
          <article-title>Analysis of fingerprint recognition methods</article-title>
          .
          <source>Sistemi obrobki Informácie</source>
          <year>2010</year>
          , Key infrastructure
          <volume>6</volume>
          (
          <issue>87</issue>
          ) .- pp.
          <fpage>164</fpage>
          -
          <lpage>171</lpage>
          Fam Zui Thai .
          <article-title>Some issues of using fingerprint comparison methods for biometric identification systems</article-title>
          // International Research Journal.
          <article-title>-</article-title>
          <year>2015</year>
          . - No.
          <volume>7</volume>
          (
          <issue>38</issue>
          )
          <article-title>Part 1</article-title>
          . - pp.
          <fpage>127</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>Behtold O. V.</given-names>
            ,
            <surname>Gudkov</surname>
          </string-name>
          <string-name>
            <given-names>V.</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>Modification of the frequency domain analysis algorithm for fingerprints</article-title>
          . // Proceeding of the conference GraphiCon ,
          <year>2017</year>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>102</lpage>
          10.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>Gonzalez R.</given-names>
            ,
            <surname>Woods</surname>
          </string-name>
          <string-name>
            <surname>R.</surname>
          </string-name>
          ,
          <source>Digital Image Processing</source>
          . - M .:
          <string-name>
            <surname>Technosphere</surname>
          </string-name>
          ,
          <year>2005</year>
          ,
          <year>2006</year>
          .-- 1072 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          11.
          <string-name>
            <surname>Fours H. E.</surname>
          </string-name>
          <article-title>Method search objects in the image with the help of contour analysis on specify the characteristics of their contours</article-title>
          .
          <source>Open information and computer integrated technologies No. 64</source>
          ,
          <year>2014</year>
          . p.
          <fpage>172</fpage>
          -
          <lpage>175</lpage>
          12.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>Novikov A. I.</given-names>
            ,
            <surname>Sablna</surname>
          </string-name>
          <string-name>
            <given-names>V. A.</given-names>
            ,
            <surname>Goryachev</surname>
          </string-name>
          <string-name>
            <surname>E. O.</surname>
          </string-name>
          <article-title>The use of contour analysis to combine images</article-title>
          .
          <source>Izvestiya TulGU . Technical science</source>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>Issue . 9. Part 1</source>
          . - pp.
          <fpage>260</fpage>
          -
          <lpage>269</lpage>
          14.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          13.
          <string-name>
            <surname>Jahne</surname>
            <given-names>Bernd</given-names>
          </string-name>
          , Haussecker Horst.,
          <source>Computer Vision</source>
          and Applications. A Guide for Students and Practitioners - Academic Press,
          <fpage>2000</fpage>
          - 702 p.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Damdinova</surname>
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Ts</surname>
          </string-name>
          .
          <article-title>Methods for forming digital iso used expressions and analyze their errors</article-title>
          . // Issues of cybersecurity .-
          <source>2014</source>
          . - No. 5. - pp.
          <fpage>43</fpage>
          -
          <lpage>46</lpage>
          . - ISSN 2311-3456/ DOI: 10.7256/
          <fpage>2454</fpage>
          -
          <lpage>0714</lpage>
          .
          <year>2019</year>
          .
          <volume>1</volume>
          .28815
          <string-name>
            <given-names>Tatiana</given-names>
            <surname>Ts</surname>
          </string-name>
          . Damdinova ,
          <string-name>
            <given-names>Liubov D.</given-names>
            <surname>Zhimbueva</surname>
          </string-name>
          , Innokentii T. Bubeev ,
          <string-name>
            <given-names>Nasak N.</given-names>
            <surname>Dampilov</surname>
          </string-name>
          .
          <article-title>Correction of Digital Images Distortion</article-title>
          .
          <source>In CEUR Workshop Proceedings</source>
          ,
          <year>2017</year>
          , Vol-
          <volume>2081</volume>
          (
          <article-title>Selected Papers of the VIII All- Russian Scientific</article-title>
          and Technical Conference on Secure Information Technologies,
          <string-name>
            <surname>BIT</surname>
          </string-name>
          <year>2017</year>
          ), pp.
          <fpage>45</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Damdinova</surname>
            <given-names>TC</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bubeev</surname>
            <given-names>IT</given-names>
          </string-name>
          .,
          <string-name>
            <surname>Motoshkin</surname>
            <given-names>PV</given-names>
          </string-name>
          .
          <article-title>The method of modeling a curve of the first order of smoothness</article-title>
          .
          <source>// Software systems and computational methods</source>
          .
          <source>- 2019</source>
          .-
          <fpage>issue</fpage>
          17. pp.
          <fpage>12</fpage>
          -
          <lpage>17</lpage>
          Nikolaeva
          <string-name>
            <surname>N. I.</surname>
          </string-name>
          <article-title>3D printing and intellectual property: legal protection of 3d models</article-title>
          . // Digital Technology February
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>Amila</given-names>
            <surname>Jakubović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Jasmin</given-names>
            <surname>Velagić</surname>
          </string-name>
          .
          <article-title>Image Feature Matching and Object Detection Using Brute-Force Matchers</article-title>
          ,
          <source>International Symposium ELMAR</source>
          ,
          <year>2018</year>
          , DOI: 10.23919/ELMAR.
          <year>2018</year>
          .8534641
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>