Abstract
Purpose of reseach. Modern data collection systems use mobile automated devices, the data from which is encrypted in the data center. Biometric identification methods have several advantages as means of information security in the data center. In particular they are characterized by high reliability, since it is difficult to compromise or lose biometric data. Methods . The method of biometric identification of facial geometry is proposed in the article. This method allows you to build a 3D model of a human face based on 2D images. To determine the accuracy of the biometric identification method, quantitative characteristics of FAR and FRR are proposed. FAR - false acception rate - determines the percentage of situations when the system allows access to a user who is not registered in the database. FRR - false rejection rate - determines the percentage of situations when the system denies access to a user with correct biometric data. There are other characteristics used in the selection of biometric identification systems. They are the ease of use, the speed of the system, the influence of environmental factors on it, the cost of the system and others. Results. The following well-known static identification methods are considered: fingerprint identification method, eye retina identification method, eye iris identification method, face geometry identification method as well as a hand vein identification method. The comparative characteristics of each of them are given. This new method is proposed to increase the accuracy and speed of biometric identification. Conclusion. The article analyzes the modern biometric identification tools of static type. Various parameters for determining the effectiveness of bio-metric identification methods are considered. The principles, on which each of these methods is based, as well as the main advantages and disadvantages, are presented.
Highlights
The following well-known static identification methods are considered: fingerprint identification method, eye retina identification method, eye iris identification method, face geometry identification method as well as a hand vein identification method
Biometric identification methods have several advantages as means of information security in the data center. In particular they are characterized by high reliability, since it is difficult to compromise or lose biometric data
The method of biometric identification of facial geometry is proposed in the article
Summary
В статье предложен метод биометрической идентификации по геометрии лица. Для определения достоверности биометрического метода идентификации предложены количественные характеристики КЛП и КЛО. КЛП – коэффициент ложного пропуска – определяет процент возникновения ситуаций, когда пользователю, не зарегистрированному в базе данных, система разрешает доступ. КЛО – коэффициент ложного отказа – определяет процент возникновения ситуаций, когда пользователю с корректными биометрическими данными система отказывает в доступе. Рассмотрены следующие известные методы статической идентификации: метод идентификации по отпечатку пальца, метод идентификации по сетчатке глаза, метод идентификации по радужной оболочке глаза, метод идентификации по геометрии лица, а также метод идентификации по рисунку вен руки. Позволяющий повысить точность и быстродействие биометрической идентификации. Рассмотрены различные параметры определения эффективности методов биометрической идентификации. Анализ современных статических методов биометрической идентификации // Известия Юго-Западного государственного университета.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.