The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The research was carried out and the Cyrillic typeface, based on the handwriting, was developed. The font-building software was investigated. Sketches of the font were drawn and converted to the vector format. Afterward, the characters and glyphs, ligatures, tracking, kerning pairs of the handwritten font were constructed. The FineReader was learned to recognize the developed font.
There is an image filtration using an Ateb-Gabor method realized. Filtration in the frequency area requires implementation of such changes sequence: discrete two-dimensional image transformation from spatial area to the frequency area. Filtration makes it possible to realize more combinations of filtering and conduct more qualitative transformation. Proposed method allows to expend a Gabor filter...
Vectorization is happened by a wave method. The wave method is to analyze the path of the way to the spherical wave in the image. At every step is analyzed offset center of point's mass forming a new step wave relative to the previous position of the center of mass. Offered of the perfected wave tracing algorithm is to use a spherical wave on the combined raster image while creating skeleton. The...
A method of protecting information using poligraphy encryption tools based on Ateb-functions what was created as thin lines. The basic requirements for cryptosystems were showed. The main methods of encryption were analysed. The analysis of major attacks on protected information was realised. Encryption was carried out in stages. Aperiodic Ateb-function were used to create keys.
In this paper we propose a method of cryptographic protection of information which is based on encrypting blocks. The threats that mostly influence the loss of information are analyzed, therefore, one of the potential threats to information in information systems should be considered accidental or deliberate destructive actions of staff. Block cipher, which is based on certain key, is built. The essence...
The authors developed a new data protection method, which is based on the theory of Ateb functions. This method can be employed for protecting financial documents such as banknotes and securities in general. The protection method creates hidden messages or images, which become visible on counterfeited documents.
Analysis of modern methods information protection based on printed documents. It is shown that methods of protection provide reliable and effective protection by gaining new protection technology that is displayed in the optical acceleration motion layers. Latent images can securely protect paper documents. Introduce a system of equations to calculate curvilinear patterns, where the optical formula...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.