Keywords: authentication, biometrics, facial image, identity recognition, information system
Authentication of information system users by facial image
UDC 004.932
DOI: 10.26102/2310-6018/2023.43.4.017
Authentication belongs to the classical means of information security management of enterprise computer systems, the quality of which determines the security of the information system. This paper describes the authentication procedure of information system users by facial image. The architecture of an artificial neural network has been developed, biometric personal data sets have been formed and trained based on the recognition of information system users by facial image. As part of this research, the functionality of the artificial neural network architecture has been evaluated using international data banks (Dataset). Descriptors such as Local Binary Patterns (LBP) and Histogram of Oriented Gradients (HOG) were extracted when recognizing information system users by facial image. A neural network-training model based on categorical cross-entropy was compiled, and the configuration of the compilation model (mini-sample size, number of epochs, activation function, and optimization function) was generated. The developed software module authenticates users of the information system on “friend-or-for” basis. The use of these image descriptors allows increasing the accuracy of user authentication in the information system (accuracy) and reducing the value of loss function (loss). The program code of the multimodal biometric authentication system has been implemented. To assess the efficiency of the software module, the first and second type error rates are given.
1. Lawrence R. Rabiner, Ronald W. Schafer. Theory and Applications of Digital Speech Processing. Prentice Hall; 2010. 1056 p.
2. Vasiliev V.I., Zhumazhanova S.S., Lozhnikov P.S., Sulavko A.E. Otsenka identifikatsionnyh vozmozhnostei biometricheskikh priznakov ot standartnogo periferiinogo oborudovaniya. Voprosy zashchity informatsii = Information security questions. 2016;112(1):12–20. (In Russ.).
3. Shelupanov A.A., Sabanov A.G. Identifikaciya i autentifikatsiya v tsifrovom mire. Moscow, Gortachaja linita-Telekom; 2022. 355 p. (In Russ.).
4. Mashkina I.V., Belova E.P. Development of the biometric images neural network database for voice authentication system. Problemy informatsionnoi bezopasnosti. Kompiuternye sistemy = Problems of information security. Computer systems. 2019;(2):86–93. (In Russ.).
5. Lozhnikov P.S., Sulavko A.E., Eremenko A.V., Volkov D.A. Experimental evaluation of reliability of signature verification by quadratic form networks, fuzzy extractors and perceptrons. Informatsionno–upravlyaiushhie sistemy = Information and control systems. 2016;84(5):73–85. DOI: 10.15217/issn1684–8853.2016.5.73. (In Russ.).
6. Todisco M., Delgado H., Evans N. A new feature for automatic speaker verification anti-spoofing: Constant Q cepstral coefficients. In: Odyssey 2016: The Speaker and Language Recognition Workshop, 21–24 June 2016, Bilbao, Spain. Bilbao: ISCA SIG; 2016. p. 283–290.
7. Gorbunov A.L. Visual Coherence for Augmented Reality. Advanced Engineering Research (Rostov-on-Don). 2023;23(2):180-190. DOI: 10.23947/2687-1653-2023-23-2-180-190. (In Russ.).
8. Korkmaz S., Binol H. Classification of molecular structure images by using ANN, RF, LBP, HOG, and size reduction methods for early stomach cancer detection. Journal of Molecular Structure. 2018;(1156):255–263. DOI: 10.1016/j.molstruc.2017.11.093.
9. Korkmaz S., Akjijek A., Binol H.B., Korkmaz M. Recognition of the stomach cancer images with probabilistic HOG feature vector histograms by using HOG features. In: 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 14–16 September 2017, Subotica, Serbia. IEEE. p. 339–342. DOI: 10.1109/SISY.2017.8080578.
10. Devitsyna S.N., Eletskaya T.A., Balabanova T.N., Gakhova N.N. The development of intelligent biometric identification system user. Ekonomika. Informatika = Economics. Information technologies. 2019;46(1):148–160. (In Russ.).
11. Anisimova A.S., Anikin I.V. Intelligent biometric user authentication system based on dynamic handwritten signature. In: Mezhdunarodnyi forum Kazan Digital Week–2022, 21–24 September 2022, Kazan, Russia. Kazan: The scientific centre of children’s personal and social safety; 2022. p. 280–285. (In Russ.).
12. Van Hoorick B., Vondrick C. Dissecting Image Crops. Columbia University, New York; 2020.
13. Raveendra M., Nagireddy K. DNN based moth search optimization for video forgery detection. International Journal of Engineering and Advanced Technology. 2019;9(1):1190–1199.
Keywords: authentication, biometrics, facial image, identity recognition, information system
For citation: Guzairov M.B., Ismagilova A.S., Lushnikov N.D. Authentication of information system users by facial image. Modeling, Optimization and Information Technology. 2023;11(4). URL: https://moitvivt.ru/ru/journal/pdf?id=1465 DOI: 10.26102/2310-6018/2023.43.4.017 (In Russ).
Received 06.11.2023
Revised 16.11.2023
Accepted 30.11.2023
Published 31.12.2023