On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network tech...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Dagestan State Technical University
2024-01-01
|
| Series: | Вестник Дагестанского государственного технического университета: Технические науки |
| Subjects: | |
| Online Access: | https://vestnik.dgtu.ru/jour/article/view/1393 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849410135329341440 |
|---|---|
| author | O. I. Bokova S. V. Kanavin N. S. Khokhlov I. V. Gilev L. A. Lekar |
| author_facet | O. I. Bokova S. V. Kanavin N. S. Khokhlov I. V. Gilev L. A. Lekar |
| author_sort | O. I. Bokova |
| collection | DOAJ |
| description | Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network technologies in organizing secure access to information systems. Biometric authentication tools can be classified as highly reliable only if they include cryptographic authentication mechanisms that work together with biometric authentication mechanisms through the conversion of biometric images into a unique cryptographic access code; in this case, a set of biometric identifiers of the user’s identity form his fuzzy image, which is used later during authentication. The purpose of the study is to develop an algorithm for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations. Method. The development of the algorithm is based on the use of fuzzy logic methods and neural networks. Result. The work reveals the features of biometric identification of the user of information systems. An algorithm is proposed for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s personality and neural network transformations. Conclusions. Based on two-step authentication of the user’s identity, secure access to the information systems of registered users is implemented. A listing of the program code in Python for creating and training a neural network of a bioidentifier classifier is provided. The materials of the article are of practical value for specialists in the field of providing secure access to information systems using artificial intelligence. |
| format | Article |
| id | doaj-art-182e3162bb4a49ef830cedd4f746278a |
| institution | Kabale University |
| issn | 2073-6185 2542-095X |
| language | Russian |
| publishDate | 2024-01-01 |
| publisher | Dagestan State Technical University |
| record_format | Article |
| series | Вестник Дагестанского государственного технического университета: Технические науки |
| spelling | doaj-art-182e3162bb4a49ef830cedd4f746278a2025-08-20T03:35:15ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2024-01-01504758410.21822/2073-6185-2023-50-4-75-84836On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformationsO. I. Bokova0S. V. Kanavin1N. S. Khokhlov2I. V. Gilev3L. A. Lekar4LLC «Cascade»Voronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaAcademy of Management of the Ministry of Internal Affairs of RussiaObjective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network technologies in organizing secure access to information systems. Biometric authentication tools can be classified as highly reliable only if they include cryptographic authentication mechanisms that work together with biometric authentication mechanisms through the conversion of biometric images into a unique cryptographic access code; in this case, a set of biometric identifiers of the user’s identity form his fuzzy image, which is used later during authentication. The purpose of the study is to develop an algorithm for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations. Method. The development of the algorithm is based on the use of fuzzy logic methods and neural networks. Result. The work reveals the features of biometric identification of the user of information systems. An algorithm is proposed for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s personality and neural network transformations. Conclusions. Based on two-step authentication of the user’s identity, secure access to the information systems of registered users is implemented. A listing of the program code in Python for creating and training a neural network of a bioidentifier classifier is provided. The materials of the article are of practical value for specialists in the field of providing secure access to information systems using artificial intelligence.https://vestnik.dgtu.ru/jour/article/view/1393information securitybiometric authentication mechanismsbiometric identifiersneural network transformation systemcryptographic keyneural network transformation system for biometric identifiers |
| spellingShingle | O. I. Bokova S. V. Kanavin N. S. Khokhlov I. V. Gilev L. A. Lekar On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations Вестник Дагестанского государственного технического университета: Технические науки information security biometric authentication mechanisms biometric identifiers neural network transformation system cryptographic key neural network transformation system for biometric identifiers |
| title | On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations |
| title_full | On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations |
| title_fullStr | On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations |
| title_full_unstemmed | On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations |
| title_short | On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations |
| title_sort | on the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user s identity and neural network transformations |
| topic | information security biometric authentication mechanisms biometric identifiers neural network transformation system cryptographic key neural network transformation system for biometric identifiers |
| url | https://vestnik.dgtu.ru/jour/article/view/1393 |
| work_keys_str_mv | AT oibokova ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations AT svkanavin ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations AT nskhokhlov ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations AT ivgilev ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations AT lalekar ontheissueofensuringsecureaccesstoinformationsystemsusingbiometricauthenticationbasedonafuzzyimageoftheusersidentityandneuralnetworktransformations |