MODEL OF THE FACIAL RECOGNITION PROCEDURE MODEL AND THE IRIS OF THE EYE DURING BIOMETRIC AUTHENTICATION OF PERSONNEL OF CRITICAL INFRASTRUCTURE FACILITIES USING NEURAL NETWORK TOOLS.
DOI:
https://doi.org/10.18372/2410-7840.26.18839Keywords:
model, critical infrastructure, face image, iris, neural network, biometric authentication, information protection, information securityAbstract
Today's challenges determine the need to improve the means of biometric authentication of personnel of critical infrastructure facilities. Common means of biometric authentication, which are usually based on the use of neural network technologies for facial image analysis, in many cases are not sufficiently adapted to the conditions of recognition during the performance of the personnel's functional duties, which are characterized by the influence of various interferences during video recording and an increase in the probability of attacks using dummies . Another promising direction of improvement is determined by the availability of modern means of video registration, which provide an additional possibility of recognizing a person by the iris of the eye and the possibility of recognizing emotions, which allows assessing the psycho-emotional state of staff representatives. It is shown that the first stage of improving neural network means of biometric authentication is the development of a formalized description of the recognition procedure, which takes into account promising areas of improvement. An appropriate model is proposed that provides a formalized description and criteria for evaluating the effectiveness of each of the operations and the recognition procedure as a whole. At the same time, for the first time, the list of criteria for assessing the quality of pre-processing of images, subject to neural network analysis in the biometric authentication system, has been substantiated, and for the first time, approaches to determining the parameters of interference and recognizing attacks using dummies have been proposed. The approach to determining the parameters of obstacles involves comparing the parameters of obstacles with the location and number of key and control faces that they overlap. Recognition of attacks is proposed to be implemented based on the analysis of the dynamics of basic emotions, the dynamics of eye movement parameters and the environment. The results of this study are important in the context of the development of effective biometric authentication tools, as they provide a formalized description of the requirements for the functionality of the main components of this procedure for recognizing the identity and emotions of personnel of critical infrastructure facilities.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).