O. I. Bokova, S. Kanavin, N. Khokhlov, I. V. Gilev, L. A. Lekar
{"title":"关于利用基于用户身份模糊图像和神经网络转换的生物鉴别技术确保安全访问信息系统的问题","authors":"O. I. Bokova, S. Kanavin, N. Khokhlov, I. V. Gilev, L. A. Lekar","doi":"10.21822/2073-6185-2023-50-4-75-84","DOIUrl":null,"url":null,"abstract":"Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network technologies in organizing secure access to information systems. Biometric authentication tools can be classified as highly reliable only if they include cryptographic authentication mechanisms that work together with biometric authentication mechanisms through the conversion of biometric images into a unique cryptographic access code; in this case, a set of biometric identifiers of the user’s identity form his fuzzy image, which is used later during authentication. The purpose of the study is to develop an algorithm for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations. Method. The development of the algorithm is based on the use of fuzzy logic methods and neural networks. Result. The work reveals the features of biometric identification of the user of information systems. An algorithm is proposed for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s personality and neural network transformations. Conclusions. Based on two-step authentication of the user’s identity, secure access to the information systems of registered users is implemented. A listing of the program code in Python for creating and training a neural network of a bioidentifier classifier is provided. The materials of the article are of practical value for specialists in the field of providing secure access to information systems using artificial intelligence.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"22 16","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations\",\"authors\":\"O. I. Bokova, S. Kanavin, N. Khokhlov, I. V. Gilev, L. A. Lekar\",\"doi\":\"10.21822/2073-6185-2023-50-4-75-84\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network technologies in organizing secure access to information systems. Biometric authentication tools can be classified as highly reliable only if they include cryptographic authentication mechanisms that work together with biometric authentication mechanisms through the conversion of biometric images into a unique cryptographic access code; in this case, a set of biometric identifiers of the user’s identity form his fuzzy image, which is used later during authentication. The purpose of the study is to develop an algorithm for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations. Method. The development of the algorithm is based on the use of fuzzy logic methods and neural networks. Result. The work reveals the features of biometric identification of the user of information systems. An algorithm is proposed for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s personality and neural network transformations. Conclusions. Based on two-step authentication of the user’s identity, secure access to the information systems of registered users is implemented. A listing of the program code in Python for creating and training a neural network of a bioidentifier classifier is provided. The materials of the article are of practical value for specialists in the field of providing secure access to information systems using artificial intelligence.\",\"PeriodicalId\":202454,\"journal\":{\"name\":\"Herald of Dagestan State Technical University. Technical Sciences\",\"volume\":\"22 16\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Herald of Dagestan State Technical University. Technical Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21822/2073-6185-2023-50-4-75-84\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Herald of Dagestan State Technical University. Technical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21822/2073-6185-2023-50-4-75-84","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network technologies in organizing secure access to information systems. Biometric authentication tools can be classified as highly reliable only if they include cryptographic authentication mechanisms that work together with biometric authentication mechanisms through the conversion of biometric images into a unique cryptographic access code; in this case, a set of biometric identifiers of the user’s identity form his fuzzy image, which is used later during authentication. The purpose of the study is to develop an algorithm for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations. Method. The development of the algorithm is based on the use of fuzzy logic methods and neural networks. Result. The work reveals the features of biometric identification of the user of information systems. An algorithm is proposed for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s personality and neural network transformations. Conclusions. Based on two-step authentication of the user’s identity, secure access to the information systems of registered users is implemented. A listing of the program code in Python for creating and training a neural network of a bioidentifier classifier is provided. The materials of the article are of practical value for specialists in the field of providing secure access to information systems using artificial intelligence.