Abstract

Purpose of reseach. Modern data collection systems use mobile automated devices, the data from which is encrypted in the data center. Biometric identification methods have several advantages as means of information security in the data center. In particular they are characterized by high reliability, since it is difficult to compromise or lose biometric data. Methods . The method of biometric identification of facial geometry is proposed in the article. This method allows you to build a 3D model of a human face based on 2D images. To determine the accuracy of the biometric identification method, quantitative characteristics of FAR and FRR are proposed. FAR - false acception rate - determines the percentage of situations when the system allows access to a user who is not registered in the database. FRR - false rejection rate - determines the percentage of situations when the system denies access to a user with correct biometric data. There are other characteristics used in the selection of biometric identification systems. They are the ease of use, the speed of the system, the influence of environmental factors on it, the cost of the system and others. Results. The following well-known static identification methods are considered: fingerprint identification method, eye retina identification method, eye iris identification method, face geometry identification method as well as a hand vein identification method. The comparative characteristics of each of them are given. This new method is proposed to increase the accuracy and speed of biometric identification. Conclusion. The article analyzes the modern biometric identification tools of static type. Various parameters for determining the effectiveness of bio-metric identification methods are considered. The principles, on which each of these methods is based, as well as the main advantages and disadvantages, are presented.

Highlights

  • The following well-known static identification methods are considered: fingerprint identification method, eye retina identification method, eye iris identification method, face geometry identification method as well as a hand vein identification method

  • Biometric identification methods have several advantages as means of information security in the data center. In particular they are characterized by high reliability, since it is difficult to compromise or lose biometric data

  • The method of biometric identification of facial geometry is proposed in the article

Read more

Summary

Анализ современных статических методов биометрической идентификации

В статье предложен метод биометрической идентификации по геометрии лица. Для определения достоверности биометрического метода идентификации предложены количественные характеристики КЛП и КЛО. КЛП – коэффициент ложного пропуска – определяет процент возникновения ситуаций, когда пользователю, не зарегистрированному в базе данных, система разрешает доступ. КЛО – коэффициент ложного отказа – определяет процент возникновения ситуаций, когда пользователю с корректными биометрическими данными система отказывает в доступе. Рассмотрены следующие известные методы статической идентификации: метод идентификации по отпечатку пальца, метод идентификации по сетчатке глаза, метод идентификации по радужной оболочке глаза, метод идентификации по геометрии лица, а также метод идентификации по рисунку вен руки. Позволяющий повысить точность и быстродействие биометрической идентификации. Рассмотрены различные параметры определения эффективности методов биометрической идентификации. Анализ современных статических методов биометрической идентификации // Известия Юго-Западного государственного университета.

Methods
Results
Conclusion
Постановка задачи
Анализ основных статических методов идентификации
Материалы и методы решения задачи
Результаты и их обсуждение
Поворот головы условиях освещённость
Список литературы

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.