<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ateb-Gabor Filtering Simulation for Biometric Protection Systems</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv National Agrarian University</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Vasyl Stefanyk Precarpathian National University Ivano-Frankivsk</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Personal authentication by fingerprint recognition depends on the correct identification of characteristic points of biometric images. This paper presents a scheme for identifying characteristic points. However, poor fingerprint input quality is generally observed due to unstructured patterns, unclear spine structures, and various background noises that have resulted in poor fingerprint recognition. Therefore, improving the input image is a crucial step for more accurate recognition. This paper proposes a new method of image filtering by filtering by non-periodic Ateb-functions. The functions of hyperbolic sine, cosine, tangent, cotangent are considered. The method of calculation of nonperiodic Ateb-functions is shown. To identify the characteristic points, a set of bifurcation patterns was constructed, oriented along with different directions. The proposed method is implemented and tested on fingerprints The reliability results were tested based on NIST Special Database 302. A data set for estimating the parameters that verify fingerprints obtained from 162 samples of different quality. Experimental results show the effectiveness and accuracy of the method.</p>
      </abstract>
      <kwd-group>
        <kwd>Image Processing</kwd>
        <kwd>Filtration</kwd>
        <kwd>Biometric Images</kwd>
        <kwd>Identification</kwd>
        <kwd>Filtering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The world is developing in the direction of greater informatization of both individual
sectors of the economy and society as a whole. The problem of information security is
especially acute in connection with the rapid introduction of computer technology in
the field of banking, insurance, medicine. The need to address the issue of
information security is also due to various increases in the level of malicious crime, the
result of which is to lead to significant material losses, whether it is a virus attack.</p>
      <p>
        Information security is a young industry that is at the intersection of information
technology and information security [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>Information Technologies in Biometric Protection Systems</title>
      <p>
        One of the common security technologies is biometric information security. These
systems are convenient because they do not require storing complex passwords or
carrying special identifiers (keys, cards, etc.), and it will be enough to say a code
word, put a finger or brush, or substitute a face for the scan to access. It should be
noted that in the theoretical variety of possible biometric methods are many and
applied in practice among them quite a bit. The advantages of biometric systems include
unique human qualities that cannot be forged: to leave a fake fingerprint with your
own or to make the iris of your eye look like someone else’s. Passport, driver’s
license, identity card from a password or personal identification number, biometric
characteristics cannot be forgotten or lost [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        One of the areas of protection of information systems is to equip the premises with
computer equipment and procedures for opening software and databases with access
devices [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Recommendations for the application of these methods in information
security systems are offered.
      </p>
      <p>
        Various approaches to machine learning and neural networks have been proposed
for the collection, detection, classification, and analysis of fingerprints. First, let’s
look at the characteristics of fingerprints and their use in a criminal investigation.
Also, we analyze and compare machine fingerprint learning algorithms in terms of
classification, matching, feature extraction, fingerprint and vein fingerprint
recognition, and counterfeit detection [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>The quality of recognition is the high reliability of recognition—more in-formation
than a normal image, it is the resistance of recognition to the deviation of the face
from the front, it is also the resistance of recognition to the heterogeneity of lighting.
But the most important sign is the absence of the need to contact the device.</p>
      <p>
        Fingerprints are unique features of the skin. We can use it to identify a person
through his unique ridges and formations. The fingerprint begins to form during the
third to four months when the person is not yet born but is a fetus during pregnancy.
Ridges are formed to hold in the fetus, not to slide when we squeeze an object [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
They made a regular arrangement of patterns and have the location and combination
of models of the characteristics of the spine. These structures of the ridges consist of
many pores. Fingerprints are formed when sweat touches another substance on a
smooth surface [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Scanning reliability does not depend only on the sensor. Further
processing of the received data is the key to successful fingerprint recognition. In a
fingerprint scanner with an optical sensor, essentially a monochrome matrix, the
image comes in the form of a photograph. In the simplest scanners, the image is simply
compared to a reference. Further processing is often based on working with several
templates [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The digital code received from the scanner in a system with a linear thermal sensor
is always a different pattern. The scan from the fingerprint is always different, the
recognition quality depends on the angle under. swabbing your finger against
moisture from the finger or the scanner surface [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The data supplied by such a scanner is
a collection of points. No matter how you put your finger on the surface of the
scanner, these points will always have the same bend.
It should be noted that when recognizing fingerprints by any type of sensors and
algorithms, errors are inevitable [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Errors are usually divided into 2 types—not
recognizing the correct print and recognizing the wrong print as correct.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Image Quality Requirements in a Biometric Security System</title>
      <p>
        The fingerprint scan is converted into a template, which is then used for comparison.
Currently, ANSI and US FBI standards are mainly used [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>They define the following requirements for the imprint image:
 Each image is presented in an uncompressed TIF format.
 The image must have a resolution of at least 500 dpi.
 The image should be grayscale with 256 levels of brightness.
 The maximum angle of rotation of the print from the vertical is no more than
15 degrees.
 The main types of minutiae are ending and bifurcation.</p>
      <p>Usually, more than one image is stored in the database, which improves the
recognition quality. Images can be distinguished from each other by shift and rotation. The
scale does not change, since everything from the seal is received from one device.
3.1</p>
      <p>Properties of Aperiodic Ateb-Functions
Aperiodic functions include sine of Ateb-hyperbolic function sha(n, m,*) , the
cosine of Ateb-hyperbolic function cha(m, n,*) , tangent of Ateb-hyperbolic function
tha(n, m,*) , cotangent of Ateb-hyperbolic function ctha(m, n,*) , secant of
Atebhyperbolic function she(m, n,*) , cosecant Ateb-hyperbolic function chse(n, m,*) .</p>
      <p>For aperiodic Ateb functions, the identity is valid, which is a generalization of the
basic identity for ordinary hyperbolic functions.</p>
      <p>cham1(m, n,*)  shan1(n, m,*)  1
Taking into account the relationship (2.18)–(2.21) we obtain the formulas for
differentiation of hyperbolic Ateb-functions.</p>
      <p>d
d *
d
d *
shan1(n, m,*) </p>
      <p>cham (m, n,*)
chan1(m, n,*) </p>
      <p>2
n 1</p>
      <p>2 shan (n, m,*) .
m 1
An important practical task is to calculate aperiodic Ateb-functions. To do this,
Table 1 presents the domains and sets of values of aperiodic Ateb-functions.
(*(m, n); *(m, n))
(*(m, n); *(m, n))
(*(m, n); *(m, n))
(*(m, n);0) (0;*(m, n))
(*(m, n);0) (0;*(m, n))
(*(m, n); *(m, n))</p>
      <p>
        Set of values
(–∞;+∞)
These properties were used to plot aperiodic Ateb-functions with different values of
min parameters. The properties of aperiodic or hyperbolic Ateb-functions generalize
the properties that ordinary hyperbolic functions have.
The numerical representation method [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] describes the example of the function
cha(m, n,  ) . At the beginning we declare variables and assign values to constants,
namely: we set accuracy for calculation of full Beta-functions; declare cycle
variables. In the first stage, we create a text file to record the calculated numerical data. In
the second stage, we calculate constant values for cha(m, n,  ) , these include the
period of the Ateb-function by formula (2.15), the value a, b, c according to formula
(2.28). The calculation is performed with accuracy  =10-10. The next stage—the
basic calculation. We will describe it in detail. We organize a cycle on  the
segment (0;1] with a step of 0.01.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Proposed Method</title>
      <p>
        Filtering based on Ateb functions Select the optimal parameters of Ateb-functions
described in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and filter the image. The image was taken from the database.
      </p>
      <p>
        The schedule of Ateb-Gabor functions is a schedule of modulated fragments of
these functions. The length of the fragments for all frequencies of the Ateb-function is
a constant value, which gives a different number of oscillations for different
harmonics. It follows that a sufficiently well-localized Gabor function cannot be a basic
wavelet transform [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        In this study, Ateb-Gabor Filter filtering with hyperbolic functions was
implemented, which expands the known filtration values [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>The surface with the filter data is shown in Fig. 1. An image was taken from the
freely available NIST Special Database (Fig. 2). The filtered image is shown in Fig. 3.
18
Fig. 1. Prezentation Ateb-Gabor filter with some parameters.</p>
      <p>Fig. 2. Input image from NIST Special Database.</p>
      <p>Fig. 3. Filtered image Ateb-Gabor filter with some parameters.</p>
    </sec>
    <sec id="sec-5">
      <title>Classification of Biometric Images</title>
      <p>Typically, fingerprint patterns can be found for three categories loops, whorls, and
arches and rights loops, left loops, double loop (see Fig. 4–6).</p>
      <p>Fingerprint shaped arch. The arch pattern is found in 5% of all fingerprints. There are
four categories of arch designs: plain arches, radial arches, elbow arches, and tent
arches. The ridges of the plain arches constantly flow from one surface to another
pattern. The ridges begin on one side of the imprint and then slide. As for the radial
arches, the spine is bent towards the thumb but not bent. In elbow sprains, the spines
are placed to the little finger. However, tent arches have an angle, shape with an
upward direction. They do not have the same type of flow as the plain arches, and, in
particular, have an upward direction, directing upward the pattern on the bridges. In
the loop pattern, at least one ridge remains inside the imprint, re-bends or crosses the
line joining from the delta to the heart-fault, and ends at the side where the bridges
begin. The pattern of the radial loop is concentric, the pattern is inclined to the radial
bone, the thick bone from the top of the finger. The direction of the radial loop
leading to the thumb. Radial loops are rare. But in general, we can find it on the index
fingers.</p>
      <p>The central pocket loop, which rotates in this pattern, the bridges create one
incomplete scheme. This pattern can be spiral, oval, or take any type. Rectangles with a
flow line have one or more twisted ridges. An example of the central pocket shown in
Fig. 5.</p>
      <p>Loops. The ridges rotate to form one complete contour with two deltas. Therefore,
monochromatic loops have a round or spiral shape. In random curls, it has two
patterns, as well as two or more deltas. Patterns of random twists are not the same. The
ridges correspond to the characteristics of a specific subgroup. An example of a
circular pattern is shown in Fig. 5.</p>
      <p>Double-loop curls. This pattern consists of two different separate curls. A complete
circuit is created with one or more bridges. An example of a double loop, which is
shown in Fig. 6.</p>
      <p>During this fingerprint analysis process, if the collected fingerprint is not clear,
inaccurate, and incomplete, it can create problems in the recognition process. For this
reason, fingerprint experts decide whether or not there is enough information on the
printed material to identify.</p>
      <p>The analysis involves determining the characteristics of the class and individual
characteristics by comparing one point by one point until they find a match.</p>
      <p>The collected seal falls into one of these three groups by analysis. After grouping,
it again narrows to individual characteristics. Individual characteristics are unique
characteristics for each person. They are very small discrepancies among the
fingerprints. They are also known as details of Galton. They consist of three main types:
ridges, bifurcations (dividing spine), and points. Fingerprint recognition is based on
matching the pattern by identifying certain characteristics of the spine. If there are
unclear differences between the two fingerprints, they remove the unknown
fingerprints from the database. Otherwise, if the characteristics of the class are different, the
imprint may be excluded. If the first characteristics and individual characteristics are
the same between two fingerprints, the system skips them. In some cases, neither of
these two options may be available.</p>
      <p>Yes, it may not be possible to make it cheaper to compare effectively, that is, three
potential outcomes may be available when examining fingerprints: exclusion,
recognition, and ineffectiveness.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>The filtration method based on aperiodic Ateb-Gabor functions is proposed in the
work. The properties of Ateb-Gabor filtration were investigated for different rational
parameters and their influence on filtration was carried out.</p>
      <p>The classification of biometric prints concerning the characteristic distribution
points of the ridges is shown.</p>
      <p>Due to the low quality of the input images, poor recognition properties are
observed. Filtration is used to improve these properties. We offer our method, which we
consider universal, and which combines multiple filtering. So, improving the input
image is a crucial step for more accurate recognition.</p>
      <p>To identify the characteristic points, a set of templates in the form of bifurcations
oriented along different directions was constructed. The proposed method is
implemented and tested on fingerprints from the NIST Special Database 302. Experimental
results show the effectiveness and accuracy of the method.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Buriachok</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , et al.:
          <article-title>Information and Cybersecurity: Sociotechnical Aspect (</article-title>
          <year>2015</year>
          ). [Publication in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Lakhno</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , et al.:
          <article-title>Clustering network attack features in information security analysis tasks</article-title>
          .
          <source>Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>1</volume>
          (
          <issue>9</issue>
          ),
          <fpage>45</fpage>
          -
          <lpage>58</lpage>
          (
          <year>2020</year>
          ). https://doi.org/10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2020</year>
          .
          <volume>9</volume>
          .
          <fpage>4558</fpage>
          . [Publication in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Buriachok</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokolov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mahyar</surname>
          </string-name>
          , T. D.:
          <article-title>Research of caller ID spoofing launch, detection, and defense</article-title>
          .
          <source>Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>3</volume>
          (
          <issue>7</issue>
          ),
          <fpage>6</fpage>
          -
          <lpage>16</lpage>
          (
          <year>2020</year>
          ). https://doi.org/ 10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2020</year>
          .
          <volume>7</volume>
          .
          <fpage>616</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Hryshchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryshchuk</surname>
            ,
            <given-names>O.:</given-names>
          </string-name>
          <article-title>A generalized model of fredholm's cryptosystem</article-title>
          .
          <source>Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>4</volume>
          (
          <issue>4</issue>
          ),
          <fpage>14</fpage>
          -
          <lpage>23</lpage>
          (
          <year>2019</year>
          ). https://doi.org/10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2019</year>
          .
          <volume>4</volume>
          .
          <fpage>1423</fpage>
          . [Publication in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voznyi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytryk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Wavelet transformation Ateb-Gabor filters to biometric images</article-title>
          .
          <source>Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>3</volume>
          (
          <issue>7</issue>
          ),
          <fpage>115</fpage>
          -
          <lpage>130</lpage>
          (
          <year>2020</year>
          ). https://doi.org/10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2020</year>
          .
          <volume>7</volume>
          .
          <fpage>115130</fpage>
          . [Publication in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Manickam</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>Bio-medical and latent fingerprint enhancement and matching using advanced scalable soft computing models</article-title>
          .
          <source>J. Ambient Intell. Humaniz. Comp</source>
          .
          <volume>10</volume>
          (
          <issue>10</issue>
          ),
          <fpage>3983</fpage>
          -
          <lpage>3995</lpage>
          (
          <year>2018</year>
          ). https://doi.org/10.1007/s12652-018-1152-1
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qian</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Latent fingerprint image enhancement based on progressive generative adversarial network</article-title>
          .
          <source>IEEE/CVF Conference on Computer Vision</source>
          and Pattern Recognition Workshops:
          <fpage>800</fpage>
          -
          <lpage>801</lpage>
          (
          <year>2020</year>
          ). https://doi.org/10.1109/cvprw50498.
          <year>2020</year>
          .00408
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Chhabra</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shukla</surname>
            ,
            <given-names>M. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ravulakollu</surname>
            ,
            <given-names>K. K.</given-names>
          </string-name>
          :
          <article-title>Bagging- and boosting-based latent fingerprint image classification and segmentation</article-title>
          .
          <source>International Conference on Innovative Computing and Communications:</source>
          <fpage>189</fpage>
          -
          <lpage>201</lpage>
          (
          <year>2020</year>
          ). https://doi.org/10.1007/
          <fpage>978</fpage>
          -981-15- 5148-2_
          <fpage>17</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , et al.:
          <article-title>Hand classification from fingerprint image using deep neural network</article-title>
          .
          <source>Comp. Mater. Contin</source>
          .
          <volume>63</volume>
          (
          <issue>1</issue>
          ):
          <fpage>17</fpage>
          -
          <lpage>30</lpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Brislawn</surname>
            ,
            <given-names>C. M.</given-names>
          </string-name>
          , et al.:
          <article-title>FBI compression standard for digitized fingerprint images</article-title>
          .
          <source>Applications of Digital Image Processing XIX</source>
          <volume>2847</volume>
          :
          <fpage>344</fpage>
          -
          <lpage>355</lpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.:
          <article-title>Detection of regularities in the parameters of the Ateb-Gabor method for biometric image filtration</article-title>
          .
          <source>East.-Еur. J. Enterp. Technol</source>
          .
          <volume>1</volume>
          (
          <issue>2</issue>
          ):
          <fpage>57</fpage>
          -
          <lpage>65</lpage>
          (
          <year>2019</year>
          ). https://doi.org/10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .154862
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yavourivskiy</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klyuynyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Editing raster images and digital rating with software</article-title>
          .
          <source>The Experience of Designing and Application of CAD Systems in Microelectronics:</source>
          <fpage>439</fpage>
          -
          <lpage>441</lpage>
          (
          <year>2015</year>
          ). https://doi.org/10.1109/cadsm.
          <year>2015</year>
          .7230897
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.:
          <article-title>Complexity evaluation of the Ateb-Gabor filtration algorithm in biometric security systems</article-title>
          .
          <source>IEEE 2nd Ukraine Conference on Electrical and Computer Engineering</source>
          :
          <fpage>961</fpage>
          -
          <lpage>964</lpage>
          (
          <year>2019</year>
          ). https://doi.org/10.1109/ukrcon.
          <year>2019</year>
          .8879945
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>