Abstract
The paper deals with the issues of using the biometric technologies to establish identity of a passenger. The purpose of the article is to analyze the techniques of enhancing reliability of various biometric identification facilities by means of using error correction codes. The basic elements and the principle of the classical biometric system functioning are presented. On the basis of the International Civil Aviation Organization (ICAO) recommendations, the procedure features of pattern recognition are presented. The versions to adopt the biometric passenger authentication procedures are under consideration. The conclusion is drawn that with the centralized biometric databases the issues of confidentiality and information security exist. The problems are characterized by the possibility of biometric images compromise, which can potentially lead to the loss of their confidentiality and the impossibility of their further usage for personal identification. The passenger authentication procedure involving the simultaneous use of biometric parameters and contact-free SMART cards seems more reliable. SMART cards are used for distributed storage of biometric and other additional data, thus neutralizing the disadvantages of access to the centralized databases. It is shown that the subsequent step in the development of this domain is the application of biometric cryptography proposing "linking" encryption keys and passwords with the biometric parameters of the subject. Consideration is given to the principle of "fuzzy extractor" operation as one of the variants for the "biometrics-code" converter. Feasibility and necessity of upgrading the means of noise-resistant coding in the systems being studied are shown. The use of permutation decoding data algorithms capable of adequately corresponding to the particular problems of biometric identification is proposed. On the basis of the results of optical communication channels statistical modeling, the necessary and sufficient conditions for application of the permutation decoding tools for binary codes are determined. The problem to minimize memory amount for the permutation decoder cognitive map due to the permutation orbits allocation and usage of the generated loops combinations as pointers of reference plane is solved. The resulting algorithm for finding a unique orbit number and its corresponding reference plane by means of receiver formation of arbitrary parameters permutation from the set of permissible permutations is proposed.
Highlights
Check and verification of the passenger's identity is one of the procedures of the inspection at an airport
The article deals with the issues of biometrical technologies application for passengers’ personal identification
It is proved that the major problem for the biometrical systems with centralized base of biometrical data is the issue of confidentiality regarding compromise of biometric patterns
Summary
Check and verification of the passenger's identity is one of the procedures of the inspection at an airport This task is currently assigned to the qualified passport control specialists of the aviation security service, who carry out an inspection of travel documents and identification of passenger identity. In this case occurrence of a human factor can lead to embarkation of a person with wrongful intent. An alternative method to avoid forgery of documents, which can be revealed during a passport control, is the illegal use of another person’s passport that has a similar appearance to the potential violator In this case, the detection of falsification depends on experience and training skills of the passport control officer
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.