{"title":"Biometric Technology in Securing the Internet Using Large Neural Network Technology","authors":"B. Akhmetov, A. Doszhanova, A. Ivanov, T. Kartbayev, A. Malygin","volume":79,"journal":"International Journal of Computer and Information Engineering","pagesStart":1063,"pagesEnd":1073,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/16573","abstract":"
The article examines the methods of protection of
\r\ncitizens' personal data on the Internet using biometric identity
\r\nauthentication technology. It`s celebrated their potential danger due
\r\nto the threat of loss of base biometric templates. To eliminate the
\r\nthreat of compromised biometric templates is proposed to use neural
\r\nnetworks large and extra-large sizes, which will on the one hand
\r\nsecurely (Highly reliable) to authenticate a person by his biometrics,
\r\nand on the other hand make biometrics a person is not available for
\r\nobservation and understanding. This article also describes in detail
\r\nthe transformation of personal biometric data access code. It`s formed
\r\nthe requirements for biometrics converter code for his work with the
\r\nimages of "Insider," "Stranger", all the "Strangers". It`s analyzed the
\r\neffect of the dimension of neural networks on the quality of
\r\nconverters mystery of biometrics in access code.<\/p>\r\n","references":"
[1] Chugunov A.V. \u201cE-government: the formation of its legal framework in\r\nRussia\u201d, Bulletin of the FSI \"State Registration Chamber\", no. 4, pp. 34\r\n\u2013 46, 2009.\r\n[2] Shlyakhtina S. \u201cInternet Facts and Figures\u201d, Computer Press, no. 2, pp.\r\n8-19, 2003.\r\n[3] Prokhorov. A. \u201cE-Government at a Glance\u201d, Computer Press, no. 5,\r\npp.144-150, 2006.\r\n[4] Irkhin Y.V. \"Electronic Government: theory and practice\u201d, Public\r\nservice, no. 4, pp. 163-173, 2008.\r\n[5] Srivastava, A. From Manuscript to Electronic Signature: Background,\r\nTechnology and Case Laws. In Electronic Signatures for B2B Contracts,\r\n(pp. 7-30). Springer India.\r\n[6] Sano, T., Kakizaki, Y., Inamura, M., & Iwamura, K. Digital Signature\r\nScheme Enabling Pre-Control of Content Editing for Secondary Use.\r\n[7] Barik, N., & Karforma, S. (2012). A Study on Efficient Digital\r\nSignature Scheme for E-Governance Security. Global Journal of\r\nComputer Science and Technology, 12(3).\r\n[8] Akhmetov B.S., Ivanov A.I., Trifonov S.E. Biometric identity centers\r\nwalking distance \/ \/ News Science of Kazakhstan. - 2011. - \u2116 3-4. - S.\r\n34-41\r\n[9] Bautin V.M. ,Tabolina M.S. (2012). Ways to Improve the Quality of\r\nPublic Services in russia. Series \"Innovation Economy: The Human\r\nDimension '51.\r\n[10] Soutar, C. (1999). D. roberge, A. Stoianov, R. Gilroy, and BVK Vijaya\r\nKumar,\u201cBiometric Encryption\u201d, ICSA Guide to Cryptography.\r\n[11] A. Cavoukian, A. Stoianov, \"Biometric Encryption: A Positive-Sum\r\nTechnology That Achieves Strong Authentication, Security And\r\nPrivacy,\" White Paper, Office of the Information and Privacy\r\nCommissioner of Ontario, 2007\r\n[12] Ivanov A.I. Biometric identification on the dynamics of unconscious\r\nmovements. - Penza: Publishing House Penz. State. University Press,\r\n2000. - 188 p.\r\n[13] Nixon, M. Gait biometrics. Biometric Technology Today, Volume 16,\r\nIssue 7-8, 2008-07-01, Pages 8-9\r\n[14] Ball Rood and others. Management on biometrics. \/ Ball Rood,\r\nJonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W.\r\nSenior \/ \/ Moscow: Technosphere, 2007. p-368.\r\n[15] Akhmetov B.S., Volchikhin V.I., Ivanov A.S., Malygin A.Y. Highly\r\nreliable multi-biometric authentication of the human person authorized\r\nto support the interaction of citizens with e-government and e-business \/\r\n\/ Bulletin of KazNTU, 2012. - N3. - P.181-184.\r\n[16] Volchikhin V.I., Ivanov A.I., Funtikov V.A. Fast algorithms for\r\nlearning neural mechanisms\r\n[17] Malygin A.Y., Volchikhin V.I., Ivanov A.I., Funtikov A.Y. Fast\r\nalgorithms for testing neural mechanisms of biometrics, cryptographic\r\nprotection of information \/ Penza, 2006, Publisher of Penza State\r\nUniversity, 161 p.\r\n[18] Ivanov A.I. Neural network algorithms for biometric identification.\r\nBook 15, the series \"Neurocomputers and their Applications\" M. radio\r\nengineering, 2004, p.144.\r\n[19] GOST R 52633.4-2011 Information Security. Security technique.\r\nInteraction interfaces with neural network converters Biometrics Access\r\nCode\r\n[20] GOST R 52633.0-2006 \"The protection of information. Security\r\ntechnique. The requirements for a highly reliable means of biometric\r\nauthentication \"\r\n[21] GOST R 52633.1 \"The protection of information. Security technique.\r\nRequirements for the formation of the natural bases of biometric images\r\ndesigned to test a highly reliable means of biometric authentication \"\r\n[22] GOST R 52633.5-2011 \"The protection of information. Security\r\ntechnique. Automatic learning of neural transmitters Biometrics Access\r\nCode \"\r\n[23] R. Duda, Hart P. Pattern recognition and scene analysis. \u2013 M., Mir.\r\n1976, p.511.\r\n[24] Fukanaga K. Introduction to the theory of statistical pattern recognition.\r\nNauka, Moscow, 1979, p. 368.\r\n[25] Tu J., Gonzalez R. The principles of pattern recognition. - M.: Radio\r\nand Communications, 1980, p. 408.\r\n[26] Hunt E. Artificial Intelligence. \u2013 M., Academic Press, 1978, p. 550.\r\n[27] R. Morelos Zaragoza. Art of error-correcting coding M. Technosphere,\r\n2007, p. 320.\r\n[28] Peterson W.W., Weldon E. Error correcting codes\/ Monograph, ed.\r\nDobrushin R.L., Samojlenko S.I. \/ \/-M.: MIR, 1976, p. 364.\r\n[29] Samojlenko S.I. Error Coding. M.: Radio and Communications, 1968,\r\np. 240.\r\n[30] Borodin P.F. Introduction to the theory of error-correcting coding. M.:\r\n\"The Soviet radio\", 1968, p. 708.\r\n[31] Monrose F., Reiter M., Q. Li, Wetzel S. Cryptographic key generation\r\nfrom voice. In Proc. IEEE Symp. on Security and Privacy, 2001.\r\n[32] Dodis Y., Reyzin L., Smith A. Fuzzy Extractors: How to Generate\r\nStrong Keys from Biometrics and Other Noisy, Data April 13, 2004.\r\n[33] Ivanov A.I. Evaluation of residual correlations for testing neural\r\ntransmitters biometrics code \"Neurocomputers: development,\r\napplication\u00bb \u2116 12, 2007, pp.25-26.\r\n[34] Nadeev D.N., Ivanov A.I. Contact pair correlation coefficient outputs\r\nneurotransmitter biometrics code with a standard deviation measures\r\nthe Hamming images of \"Strangers\", \"Neurocomputers: development,\r\napplication\u00bb \u2116 12, 2007, p.27-29\r\n[35] Ivanov A.I., Kislyaev S.E., Gelashvili P.A. Artificial neural networks in\r\nbiometrics, medicine and healthcare. Samara: LLC \"Etching\", 2004, p.\r\n236.<\/p>\r\n","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 79, 2013"}