Biometric Technology in Securing the Internet Using Large Neural Network Technology

The article examines the methods of protection of
citizens' personal data on the Internet using biometric identity
authentication technology. It`s celebrated their potential danger due
to the threat of loss of base biometric templates. To eliminate the
threat of compromised biometric templates is proposed to use neural
networks large and extra-large sizes, which will on the one hand
securely (Highly reliable) to authenticate a person by his biometrics,
and on the other hand make biometrics a person is not available for
observation and understanding. This article also describes in detail
the transformation of personal biometric data access code. It`s formed
the requirements for biometrics converter code for his work with the
images of "Insider," "Stranger", all the "Strangers". It`s analyzed the
effect of the dimension of neural networks on the quality of
converters mystery of biometrics in access code.





References:
<p>[1] Chugunov A.V. “E-government: the formation of its legal framework in
Russia”, Bulletin of the FSI "State Registration Chamber", no. 4, pp. 34
– 46, 2009.
[2] Shlyakhtina S. “Internet Facts and Figures”, Computer Press, no. 2, pp.
8-19, 2003.
[3] Prokhorov. A. “E-Government at a Glance”, Computer Press, no. 5,
pp.144-150, 2006.
[4] Irkhin Y.V. "Electronic Government: theory and practice”, Public
service, no. 4, pp. 163-173, 2008.
[5] Srivastava, A. From Manuscript to Electronic Signature: Background,
Technology and Case Laws. In Electronic Signatures for B2B Contracts,
(pp. 7-30). Springer India.
[6] Sano, T., Kakizaki, Y., Inamura, M., & Iwamura, K. Digital Signature
Scheme Enabling Pre-Control of Content Editing for Secondary Use.
[7] Barik, N., & Karforma, S. (2012). A Study on Efficient Digital
Signature Scheme for E-Governance Security. Global Journal of
Computer Science and Technology, 12(3).
[8] Akhmetov B.S., Ivanov A.I., Trifonov S.E. Biometric identity centers
walking distance / / News Science of Kazakhstan. - 2011. - № 3-4. - S.
34-41
[9] Bautin V.M. ,Tabolina M.S. (2012). Ways to Improve the Quality of
Public Services in russia. Series "Innovation Economy: The Human
Dimension '51.
[10] Soutar, C. (1999). D. roberge, A. Stoianov, R. Gilroy, and BVK Vijaya
Kumar,“Biometric Encryption”, ICSA Guide to Cryptography.
[11] A. Cavoukian, A. Stoianov, "Biometric Encryption: A Positive-Sum
Technology That Achieves Strong Authentication, Security And
Privacy," White Paper, Office of the Information and Privacy
Commissioner of Ontario, 2007
[12] Ivanov A.I. Biometric identification on the dynamics of unconscious
movements. - Penza: Publishing House Penz. State. University Press,
2000. - 188 p.
[13] Nixon, M. Gait biometrics. Biometric Technology Today, Volume 16,
Issue 7-8, 2008-07-01, Pages 8-9
[14] Ball Rood and others. Management on biometrics. / Ball Rood,
Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W.
Senior / / Moscow: Technosphere, 2007. p-368.
[15] Akhmetov B.S., Volchikhin V.I., Ivanov A.S., Malygin A.Y. Highly
reliable multi-biometric authentication of the human person authorized
to support the interaction of citizens with e-government and e-business /
/ Bulletin of KazNTU, 2012. - N3. - P.181-184.
[16] Volchikhin V.I., Ivanov A.I., Funtikov V.A. Fast algorithms for
learning neural mechanisms
[17] Malygin A.Y., Volchikhin V.I., Ivanov A.I., Funtikov A.Y. Fast
algorithms for testing neural mechanisms of biometrics, cryptographic
protection of information / Penza, 2006, Publisher of Penza State
University, 161 p.
[18] Ivanov A.I. Neural network algorithms for biometric identification.
Book 15, the series "Neurocomputers and their Applications" M. radio
engineering, 2004, p.144.
[19] GOST R 52633.4-2011 Information Security. Security technique.
Interaction interfaces with neural network converters Biometrics Access
Code
[20] GOST R 52633.0-2006 "The protection of information. Security
technique. The requirements for a highly reliable means of biometric
authentication "
[21] GOST R 52633.1 "The protection of information. Security technique.
Requirements for the formation of the natural bases of biometric images
designed to test a highly reliable means of biometric authentication "
[22] GOST R 52633.5-2011 "The protection of information. Security
technique. Automatic learning of neural transmitters Biometrics Access
Code "
[23] R. Duda, Hart P. Pattern recognition and scene analysis. – M., Mir.
1976, p.511.
[24] Fukanaga K. Introduction to the theory of statistical pattern recognition.
Nauka, Moscow, 1979, p. 368.
[25] Tu J., Gonzalez R. The principles of pattern recognition. - M.: Radio
and Communications, 1980, p. 408.
[26] Hunt E. Artificial Intelligence. – M., Academic Press, 1978, p. 550.
[27] R. Morelos Zaragoza. Art of error-correcting coding M. Technosphere,
2007, p. 320.
[28] Peterson W.W., Weldon E. Error correcting codes/ Monograph, ed.
Dobrushin R.L., Samojlenko S.I. / /-M.: MIR, 1976, p. 364.
[29] Samojlenko S.I. Error Coding. M.: Radio and Communications, 1968,
p. 240.
[30] Borodin P.F. Introduction to the theory of error-correcting coding. M.:
"The Soviet radio", 1968, p. 708.
[31] Monrose F., Reiter M., Q. Li, Wetzel S. Cryptographic key generation
from voice. In Proc. IEEE Symp. on Security and Privacy, 2001.
[32] Dodis Y., Reyzin L., Smith A. Fuzzy Extractors: How to Generate
Strong Keys from Biometrics and Other Noisy, Data April 13, 2004.
[33] Ivanov A.I. Evaluation of residual correlations for testing neural
transmitters biometrics code "Neurocomputers: development,
application» № 12, 2007, pp.25-26.
[34] Nadeev D.N., Ivanov A.I. Contact pair correlation coefficient outputs
neurotransmitter biometrics code with a standard deviation measures
the Hamming images of "Strangers", "Neurocomputers: development,
application» № 12, 2007, p.27-29
[35] Ivanov A.I., Kislyaev S.E., Gelashvili P.A. Artificial neural networks in
biometrics, medicine and healthcare. Samara: LLC "Etching", 2004, p.
236.</p>