Biometric authentication method based on cepstral characteristics of external ear echograms and biometrics-to-code neural converter

IF 0.4 Q4 MATHEMATICS, APPLIED
A. Sulavko, A. A. Khramov
{"title":"Biometric authentication method based on cepstral characteristics of external ear echograms and biometrics-to-code neural converter","authors":"A. Sulavko, A. A. Khramov","doi":"10.37791/2687-0649-2022-17-1-69-82","DOIUrl":null,"url":null,"abstract":"Open biometric images (fingerprint, iris, face) are \"in sight\" and therefore compromised in the natural environment. In this work, it is proposed to use data on the internal structure of the outer ear obtained using echography as biometric images. The individual characteristics of the ear canal of subjects are hidden from direct observation and cannot be copied by photographing. The proposed authentication method is based on cepstral analysis of echograms of the ear canal using neural network biometrics to code converters, trained in accordance with GOST R 52633.5. The neural network biometrics-code converter allows you to associate a user's cryptographic key or password with his biometric image. This is a shallow neural network of one or two layers of neurons, which is configured to generate a key specified during training when an image of a known user arrives, and when an unknown image arrives at its inputs, generate a random code with high entropy. At the entrance to this network, cepstral signs of echograms were received. To apply the method in practice, you need a special device that combines a headphone with a sound-proof housing and a microphone. The results obtained can be called optimistic EER = 0.031 (FAR = 0.001 at FRR = 0.23). The use of neural network converters biometrics-code showed a relatively higher percentage of errors in comparison with multilayer neural networks and the naive Bayes classification scheme, however, neural network biometrics to code converters allows you to implement authentication in a protected mode. This means that the subject's biometric data will be protected from compromise at the stages of storage, execution and transmission via communication channels.","PeriodicalId":44195,"journal":{"name":"Journal of Applied Mathematics & Informatics","volume":"26 1","pages":""},"PeriodicalIF":0.4000,"publicationDate":"2022-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Applied Mathematics & Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37791/2687-0649-2022-17-1-69-82","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
引用次数: 0

Abstract

Open biometric images (fingerprint, iris, face) are "in sight" and therefore compromised in the natural environment. In this work, it is proposed to use data on the internal structure of the outer ear obtained using echography as biometric images. The individual characteristics of the ear canal of subjects are hidden from direct observation and cannot be copied by photographing. The proposed authentication method is based on cepstral analysis of echograms of the ear canal using neural network biometrics to code converters, trained in accordance with GOST R 52633.5. The neural network biometrics-code converter allows you to associate a user's cryptographic key or password with his biometric image. This is a shallow neural network of one or two layers of neurons, which is configured to generate a key specified during training when an image of a known user arrives, and when an unknown image arrives at its inputs, generate a random code with high entropy. At the entrance to this network, cepstral signs of echograms were received. To apply the method in practice, you need a special device that combines a headphone with a sound-proof housing and a microphone. The results obtained can be called optimistic EER = 0.031 (FAR = 0.001 at FRR = 0.23). The use of neural network converters biometrics-code showed a relatively higher percentage of errors in comparison with multilayer neural networks and the naive Bayes classification scheme, however, neural network biometrics to code converters allows you to implement authentication in a protected mode. This means that the subject's biometric data will be protected from compromise at the stages of storage, execution and transmission via communication channels.
基于外耳回声图倒谱特征和生物识别-编码神经转换器的生物识别认证方法
开放的生物特征图像(指纹、虹膜、面部)是“可见的”,因此在自然环境中受到损害。在这项工作中,建议使用使用超声技术获得的外耳内部结构数据作为生物识别图像。被试耳道的个体特征是隐藏的,无法直接观察,也无法通过摄影复制。所提出的认证方法基于耳道回声图的倒谱分析,使用神经网络生物识别技术对转换器进行编码,并根据GOST R 52633.5进行训练。神经网络生物识别代码转换器允许您将用户的加密密钥或密码与他的生物识别图像关联起来。这是一个由一层或两层神经元组成的浅神经网络,它被配置为在训练过程中,当已知用户的图像到达时生成指定的密钥,当未知图像到达其输入时,生成高熵的随机代码。在这个网络的入口处,接收到回声图的倒谱信号。为了在实践中应用这种方法,你需要一种特殊的设备,它将耳机与隔音外壳和麦克风结合在一起。所得结果为乐观EER = 0.031 (FAR = 0.001, FRR = 0.23)。与多层神经网络和朴素贝叶斯分类方案相比,神经网络生物识别代码转换器的使用显示出相对较高的错误率,然而,神经网络生物识别代码转换器允许您在受保护的模式下实现身份验证。这意味着受试者的生物特征数据将在存储、执行和通过通信渠道传输的各个阶段受到保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
0.70
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信