Аутентификация пользователей информационной системы по изображению лица
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

Authentication of information system users by facial image

Guzairov M.B.,  idIsmagilova A.S., idLushnikov N.D.

UDC 004.932
DOI: 10.26102/2310-6018/2023.43.4.017

  • Abstract
  • List of references
  • About authors

Authentication belongs to the classical means of information security management of enterprise computer systems, the quality of which determines the security of the information system. This paper describes the authentication procedure of information system users by facial image. The architecture of an artificial neural network has been developed, biometric personal data sets have been formed and trained based on the recognition of information system users by facial image. As part of this research, the functionality of the artificial neural network architecture has been evaluated using international data banks (Dataset). Descriptors such as Local Binary Patterns (LBP) and Histogram of Oriented Gradients (HOG) were extracted when recognizing information system users by facial image. A neural network-training model based on categorical cross-entropy was compiled, and the configuration of the compilation model (mini-sample size, number of epochs, activation function, and optimization function) was generated. The developed software module authenticates users of the information system on “friend-or-for” basis. The use of these image descriptors allows increasing the accuracy of user authentication in the information system (accuracy) and reducing the value of loss function (loss). The program code of the multimodal biometric authentication system has been implemented. To assess the efficiency of the software module, the first and second type error rates are given.

1. Lawrence R. Rabiner, Ronald W. Schafer. Theory and Applications of Digital Speech Processing. Prentice Hall; 2010. 1056 p.

2. Vasiliev V.I., Zhumazhanova S.S., Lozhnikov P.S., Sulavko A.E. Otsenka identifikatsionnyh vozmozhnostei biometricheskikh priznakov ot standartnogo periferiinogo oborudovaniya. Voprosy zashchity informatsii = Information security questions. 2016;112(1):12–20. (In Russ.).

3. Shelupanov A.A., Sabanov A.G. Identifikaciya i autentifikatsiya v tsifrovom mire. Moscow, Gortachaja linita-Telekom; 2022. 355 p. (In Russ.).

4. Mashkina I.V., Belova E.P. Development of the biometric images neural network database for voice authentication system. Problemy informatsionnoi bezopasnosti. Kompiuternye sistemy = Problems of information security. Computer systems. 2019;(2):86–93. (In Russ.).

5. Lozhnikov P.S., Sulavko A.E., Eremenko A.V., Volkov D.A. Experimental evaluation of reliability of signature verification by quadratic form networks, fuzzy extractors and perceptrons. Informatsionno–upravlyaiushhie sistemy = Information and control systems. 2016;84(5):73–85. DOI: 10.15217/issn1684–8853.2016.5.73. (In Russ.).

6. Todisco M., Delgado H., Evans N. A new feature for automatic speaker verification anti-spoofing: Constant Q cepstral coefficients. In: Odyssey 2016: The Speaker and Language Recognition Workshop, 21–24 June 2016, Bilbao, Spain. Bilbao: ISCA SIG; 2016. p. 283–290.

7. Gorbunov A.L. Visual Coherence for Augmented Reality. Advanced Engineering Research (Rostov-on-Don). 2023;23(2):180-190. DOI: 10.23947/2687-1653-2023-23-2-180-190. (In Russ.).

8. Korkmaz S., Binol H. Classification of molecular structure images by using ANN, RF, LBP, HOG, and size reduction methods for early stomach cancer detection. Journal of Molecular Structure. 2018;(1156):255–263. DOI: 10.1016/j.molstruc.2017.11.093.

9. Korkmaz S., Akjijek A., Binol H.B., Korkmaz M. Recognition of the stomach cancer images with probabilistic HOG feature vector histograms by using HOG features. In: 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 14–16 September 2017, Subotica, Serbia. IEEE. p. 339–342. DOI: 10.1109/SISY.2017.8080578.

10. Devitsyna S.N., Eletskaya T.A., Balabanova T.N., Gakhova N.N. The development of intelligent biometric identification system user. Ekonomika. Informatika = Economics. Information technologies. 2019;46(1):148–160. (In Russ.).

11. Anisimova A.S., Anikin I.V. Intelligent biometric user authentication system based on dynamic handwritten signature. In: Mezhdunarodnyi forum Kazan Digital Week–2022, 21–24 September 2022, Kazan, Russia. Kazan: The scientific centre of children’s personal and social safety; 2022. p. 280–285. (In Russ.).

12. Van Hoorick B., Vondrick C. Dissecting Image Crops. Columbia University, New York; 2020.

13. Raveendra M., Nagireddy K. DNN based moth search optimization for video forgery detection. International Journal of Engineering and Advanced Technology. 2019;9(1):1190–1199.

Guzairov Murat Bakeevich
Doctor of Technical Sciences, Professor

Ufa University of Science and Technology

Ufa, the Russian Federation

Ismagilova Albina Sabiryanovna
Doctor of Physical and Mathematical Sciences, Professor

ORCID |

Ufa University of Science and Technology

Ufa, the Russian Federation

Lushnikov Nikita Dmitrievich

ORCID |

Ufa University of Science and Technology

Ufa, the Russian Federation

Keywords: authentication, biometrics, facial image, identity recognition, information system

For citation: Guzairov M.B., Ismagilova A.S., Lushnikov N.D. Authentication of information system users by facial image. Modeling, Optimization and Information Technology. 2023;11(4). URL: https://moitvivt.ru/ru/journal/pdf?id=1465 DOI: 10.26102/2310-6018/2023.43.4.017 (In Russ).

257

Full text in PDF

Received 06.11.2023

Revised 16.11.2023

Accepted 30.11.2023

Published 31.12.2023