On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations

Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network tech...

Full description

Saved in:
Bibliographic Details
Main Authors: O. I. Bokova, S. V. Kanavin, N. S. Khokhlov, I. V. Gilev, L. A. Lekar
Format: Article
Language:Russian
Published: Dagestan State Technical University 2024-01-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/1393
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849410135329341440
author O. I. Bokova
S. V. Kanavin
N. S. Khokhlov
I. V. Gilev
L. A. Lekar
author_facet O. I. Bokova
S. V. Kanavin
N. S. Khokhlov
I. V. Gilev
L. A. Lekar
author_sort O. I. Bokova
collection DOAJ
description Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network technologies in organizing secure access to information systems. Biometric authentication tools can be classified as highly reliable only if they include cryptographic authentication mechanisms that work together with biometric authentication mechanisms through the conversion of biometric images into a unique cryptographic access code; in this case, a set of biometric identifiers of the user’s identity form his fuzzy image, which is used later during authentication. The purpose of the study is to develop an algorithm for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations. Method. The development of the algorithm is based on the use of fuzzy logic methods and neural networks. Result. The work reveals the features of biometric identification of the user of information systems. An algorithm is proposed for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s personality and neural network transformations. Conclusions. Based on two-step authentication of the user’s identity, secure access to the information systems of registered users is implemented. A listing of the program code in Python for creating and training a neural network of a bioidentifier classifier is provided. The materials of the article are of practical value for specialists in the field of providing secure access to information systems using artificial intelligence.
format Article
id doaj-art-182e3162bb4a49ef830cedd4f746278a
institution Kabale University
issn 2073-6185
2542-095X
language Russian
publishDate 2024-01-01
publisher Dagestan State Technical University
record_format Article
series Вестник Дагестанского государственного технического университета: Технические науки
spelling doaj-art-182e3162bb4a49ef830cedd4f746278a2025-08-20T03:35:15ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2024-01-01504758410.21822/2073-6185-2023-50-4-75-84836On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformationsO. I. Bokova0S. V. Kanavin1N. S. Khokhlov2I. V. Gilev3L. A. Lekar4LLC «Cascade»Voronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaAcademy of Management of the Ministry of Internal Affairs of RussiaObjective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network technologies in organizing secure access to information systems. Biometric authentication tools can be classified as highly reliable only if they include cryptographic authentication mechanisms that work together with biometric authentication mechanisms through the conversion of biometric images into a unique cryptographic access code; in this case, a set of biometric identifiers of the user’s identity form his fuzzy image, which is used later during authentication. The purpose of the study is to develop an algorithm for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations. Method. The development of the algorithm is based on the use of fuzzy logic methods and neural networks. Result. The work reveals the features of biometric identification of the user of information systems. An algorithm is proposed for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s personality and neural network transformations. Conclusions. Based on two-step authentication of the user’s identity, secure access to the information systems of registered users is implemented. A listing of the program code in Python for creating and training a neural network of a bioidentifier classifier is provided. The materials of the article are of practical value for specialists in the field of providing secure access to information systems using artificial intelligence.https://vestnik.dgtu.ru/jour/article/view/1393information securitybiometric authentication mechanismsbiometric identifiersneural network transformation systemcryptographic keyneural network transformation system for biometric identifiers
spellingShingle O. I. Bokova
S. V. Kanavin
N. S. Khokhlov
I. V. Gilev
L. A. Lekar
On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
Вестник Дагестанского государственного технического университета: Технические науки
information security
biometric authentication mechanisms
biometric identifiers
neural network transformation system
cryptographic key
neural network transformation system for biometric identifiers
title On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
title_full On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
title_fullStr On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
title_full_unstemmed On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
title_short On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
title_sort on the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user s identity and neural network transformations
topic information security
biometric authentication mechanisms
biometric identifiers
neural network transformation system
cryptographic key
neural network transformation system for biometric identifiers
url https://vestnik.dgtu.ru/jour/article/view/1393
work_keys_str_mv AT oibokova ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations
AT svkanavin ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations
AT nskhokhlov ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations
AT ivgilev ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations
AT lalekar ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations