Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2020.10.06.019

A study on Prevent fingerprints Collection in High resolution Image  

Yoon, Won-Seok (Department of Computer Engineering, Sungkyul University)
Kim, Sang-Geun (Department of Computer Engineering, Sungkyul University)
Publication Information
Journal of Convergence for Information Technology / v.10, no.6, 2020 , pp. 19-27 More about this Journal
Abstract
In this study, Developing high resolution camera and Social Network Service sharing image can be easily getting images, it cause about taking fingerprints to easy from images. So I present solution about prevent to taking fingerprints. this technology is develop python using to opencv, blur libraries. First of all 'Hand Key point Detection' algorithm is used to locate the hand in the image. Using this algorithm can be find finger joints that can be protected while minimizing damage in the original image by using the coordinates of separate blurring the area of fingerprints in the image. from now on the development of accurate finger tracking algorithms, fingerprints will be protected by using technology as an internal option for smartphone camera apps from high resolution images.
Keywords
Detecting Finger Joints; Fingerprinting Prevent; Images Security; High Resolution Image Problems; Deep Learning;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 P. Monckton. (2014). Hacker Clones Fingerprint From Politician's Photograph(Online). https://www.forbes.com/sites/paulmonckton/2014/12/30/hacker-clones-fingerprint-from-photograph/#5b9873d46896
2 D. H. Har & H. J. Park. (2009). Effect of Noise Reduction Function in Digital Camera on the Resolution of Digital Image. The Journal of the Korea Contents Association, 9(5), 91-98 DOI : 10.5392/JKCA.2009.9.5.091   DOI
3 J. H. Park, & K. J. Lee. (2017). Realization of user-centered smart factory system using motion recognition. Journal of Convergence for Information Technology, 7(6), 153-158.   DOI
4 C. Zhe, T. Simon, S. E. Wei & Y. Sheikh. (2017). Realtime multi-person 2d pose estimation using part affinity fields. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 7291-7299).
5 S. H. Kim. (2019). Development of Face Recognition System based on Real-time Mini Drone Camera Images. Journal of Convergence for Information Technology, 9(12), 17-23.   DOI
6 J. C. Han & K. J. Cheoi. (2017). Design and Implementation CNN for Hand Shape Recognition. Journal of the Research Institute for Computer and Information Communication, 25(1), 43-45.
7 C. Y. Jang & T. Y. Kim. (2020). Hand Feature Enhancement and User Decision Making for CNN Hand Gesture Recognition Algorithm. Journal of The Institute of Electronics and Information Engineers, 57(2), 60-70. DOI : 10.5573/ieie.2020.57.2.60   DOI
8 T. Simon, H. B. Joo, I. Matthews, & Y. Sheikh. (2017). Hand keypoint detection in single images using multiview bootstrapping. In Proceedings of the IEEE conference on Computer Vision and Pattern Recognition. (pp. 1145-1153).
9 A. Jain, L. Hong & R. Bolle. (1997). On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(4), 302-314.   DOI
10 W. J. Kim. (2019). Recent Technology Trends on Fingerprint Recognition and Forgery. The Institute of Electronics and Information Engineers, 46(8), 31-38.   DOI
11 V. Gupta. (2018). Hand Keypoint Detection using Deep Learning and OpenCV (Online). https://www.learnopencv.com/hand-keypoint-detection-using-deep-learning-and-opencv
12 A. Mordvintsev & K. Abid. (2014). Opencv-python tutorials documentation (Online). https://media.readthedocs.org/pdf/opencv-python-tutroals/latest/opencv-python-tutroals.pdf
13 B. Y. Lee. (2002). Design and analysis of Fuzzy Weighted Median(FWM) filter eliminating image noises. Master dissertation. KonKuk University, Seoul
14 D. Y. Kang. (2020). Image data blur processing through object detection. Master dissertation. HangYang University, Seoul.
15 S. Mallick, (2013). Bitwise AND, OR, XOR and NOT (Online). http://opencvexamples.blogspot.com/2013/10/bitwise-and-or-xor-and-not.html