Biometric Technology in Securing the Internet Using Large Neural Network Technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Biometric Technology in Securing the Internet Using Large Neural Network Technology

Authors: B. Akhmetov, A. Doszhanova, A. Ivanov, T. Kartbayev, A. Malygin

Abstract:

The article examines the methods of protection of citizens' personal data on the Internet using biometric identity authentication technology. It`s celebrated their potential danger due to the threat of loss of base biometric templates. To eliminate the threat of compromised biometric templates is proposed to use neural networks large and extra-large sizes, which will on the one hand securely (Highly reliable) to authenticate a person by his biometrics, and on the other hand make biometrics a person is not available for observation and understanding. This article also describes in detail the transformation of personal biometric data access code. It`s formed the requirements for biometrics converter code for his work with the images of "Insider," "Stranger", all the "Strangers". It`s analyzed the effect of the dimension of neural networks on the quality of converters mystery of biometrics in access code.

Keywords: Biometric security technologies, Conversion of personal biometric data access code, Electronic signature, Large neural networks, quality of converters "Biometrics - the code", the Egovernment.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1087528

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2182

References:


[1] Chugunov A.V. “E-government: the formation of its legal framework in Russia”, Bulletin of the FSI "State Registration Chamber", no. 4, pp. 34 – 46, 2009.
[2] Shlyakhtina S. “Internet Facts and Figures”, Computer Press, no. 2, pp. 8-19, 2003.
[3] Prokhorov. A. “E-Government at a Glance”, Computer Press, no. 5, pp.144-150, 2006.
[4] Irkhin Y.V. "Electronic Government: theory and practice”, Public service, no. 4, pp. 163-173, 2008.
[5] Srivastava, A. From Manuscript to Electronic Signature: Background, Technology and Case Laws. In Electronic Signatures for B2B Contracts, (pp. 7-30). Springer India.
[6] Sano, T., Kakizaki, Y., Inamura, M., & Iwamura, K. Digital Signature Scheme Enabling Pre-Control of Content Editing for Secondary Use.
[7] Barik, N., & Karforma, S. (2012). A Study on Efficient Digital Signature Scheme for E-Governance Security. Global Journal of Computer Science and Technology, 12(3).
[8] Akhmetov B.S., Ivanov A.I., Trifonov S.E. Biometric identity centers walking distance / / News Science of Kazakhstan. - 2011. - № 3-4. - S. 34-41
[9] Bautin V.M. ,Tabolina M.S. (2012). Ways to Improve the Quality of Public Services in russia. Series "Innovation Economy: The Human Dimension '51.
[10] Soutar, C. (1999). D. roberge, A. Stoianov, R. Gilroy, and BVK Vijaya Kumar,“Biometric Encryption”, ICSA Guide to Cryptography.
[11] A. Cavoukian, A. Stoianov, "Biometric Encryption: A Positive-Sum Technology That Achieves Strong Authentication, Security And Privacy," White Paper, Office of the Information and Privacy Commissioner of Ontario, 2007
[12] Ivanov A.I. Biometric identification on the dynamics of unconscious movements. - Penza: Publishing House Penz. State. University Press, 2000. - 188 p.
[13] Nixon, M. Gait biometrics. Biometric Technology Today, Volume 16, Issue 7-8, 2008-07-01, Pages 8-9
[14] Ball Rood and others. Management on biometrics. / Ball Rood, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior / / Moscow: Technosphere, 2007. p-368.
[15] Akhmetov B.S., Volchikhin V.I., Ivanov A.S., Malygin A.Y. Highly reliable multi-biometric authentication of the human person authorized to support the interaction of citizens with e-government and e-business / / Bulletin of KazNTU, 2012. - N3. - P.181-184.
[16] Volchikhin V.I., Ivanov A.I., Funtikov V.A. Fast algorithms for learning neural mechanisms
[17] Malygin A.Y., Volchikhin V.I., Ivanov A.I., Funtikov A.Y. Fast algorithms for testing neural mechanisms of biometrics, cryptographic protection of information / Penza, 2006, Publisher of Penza State University, 161 p.
[18] Ivanov A.I. Neural network algorithms for biometric identification. Book 15, the series "Neurocomputers and their Applications" M. radio engineering, 2004, p.144.
[19] GOST R 52633.4-2011 Information Security. Security technique. Interaction interfaces with neural network converters Biometrics Access Code
[20] GOST R 52633.0-2006 "The protection of information. Security technique. The requirements for a highly reliable means of biometric authentication "
[21] GOST R 52633.1 "The protection of information. Security technique. Requirements for the formation of the natural bases of biometric images designed to test a highly reliable means of biometric authentication "
[22] GOST R 52633.5-2011 "The protection of information. Security technique. Automatic learning of neural transmitters Biometrics Access Code "
[23] R. Duda, Hart P. Pattern recognition and scene analysis. – M., Mir. 1976, p.511.
[24] Fukanaga K. Introduction to the theory of statistical pattern recognition. Nauka, Moscow, 1979, p. 368.
[25] Tu J., Gonzalez R. The principles of pattern recognition. - M.: Radio and Communications, 1980, p. 408.
[26] Hunt E. Artificial Intelligence. – M., Academic Press, 1978, p. 550.
[27] R. Morelos Zaragoza. Art of error-correcting coding M. Technosphere, 2007, p. 320.
[28] Peterson W.W., Weldon E. Error correcting codes/ Monograph, ed. Dobrushin R.L., Samojlenko S.I. / /-M.: MIR, 1976, p. 364.
[29] Samojlenko S.I. Error Coding. M.: Radio and Communications, 1968, p. 240.
[30] Borodin P.F. Introduction to the theory of error-correcting coding. M.: "The Soviet radio", 1968, p. 708.
[31] Monrose F., Reiter M., Q. Li, Wetzel S. Cryptographic key generation from voice. In Proc. IEEE Symp. on Security and Privacy, 2001.
[32] Dodis Y., Reyzin L., Smith A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy, Data April 13, 2004.
[33] Ivanov A.I. Evaluation of residual correlations for testing neural transmitters biometrics code "Neurocomputers: development, application» № 12, 2007, pp.25-26.
[34] Nadeev D.N., Ivanov A.I. Contact pair correlation coefficient outputs neurotransmitter biometrics code with a standard deviation measures the Hamming images of "Strangers", "Neurocomputers: development, application» № 12, 2007, p.27-29
[35] Ivanov A.I., Kislyaev S.E., Gelashvili P.A. Artificial neural networks in biometrics, medicine and healthcare. Samara: LLC "Etching", 2004, p. 236.