DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD

Authors

DOI:

https://doi.org/10.28925/2663-4023.2021.12.8595

Keywords:

fingerprints, biometric images, machine learning

Abstract

The method of biometric identification, designed to ensure the protection of confidential information, is considered. The method of classification of biometric prints by means of machine learning is offered. One of the variants of the solution of the problem of identification of biometric images on the basis of the k-means algorithm is given. Marked data samples were created for learning and testing processes. Biometric fingerprint data were used to establish identity. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. Experimental results indicate that the k-means method is a promising approach to the classification of fingerprints. The development of biometrics leads to the creation of security systems with a better degree of recognition and with fewer errors than the security system on traditional media. Machine learning was performed using a number of samples from a known biometric database, and verification / testing was performed with samples from the same database that were not included in the training data set. Biometric fingerprint data based on the freely available NIST Special Database 302 were used to establish identity, and the learning outcomes were shown. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. The machine learning system is built on a modular basis, by forming combinations of individual modules scikit-learn library in a python environment.

Downloads

Download data is not yet available.

References

Hrytsyk, V., Grondzal, A., & Bilenkyj, A. (2015, September). Augmented reality for people with disabilities. In 2015 Xth International Scientific and Technical Conference" Computer Sciences and Information Technologies"(CSIT) (pp. 188-191). IEEE.

Zhang, Q., Zhou, D., & Zeng, X. (2017). Machine learning-empowered biometric methods for biomedicine applications. AIMS Medical Science, 4(3), 274-290.

Kasprowski, P., & Ober, J. (2004, May). Eye movements in biometrics. In International Workshop on Biometric Authentication (pp. 248-258). Springer, Berlin, Heidelberg.

Medykovskyy, M., Lipinski, P., Troyan, O., & Nazarkevych, M. (2015, September). Methods of protection document formed from latent element located by fractals. In 2015 Xth International Scientific and Technical Conference" Computer Sciences and Information Technologies"(CSIT) (pp. 70-72). IEEE.

Syazana-Itqan, K., Syafeeza, A. R., Saad, N. M., Hamid, N. A., & Saad, W. H. B. M. (2016). A review of finger-vein biometrics identification approaches. Indian J. Sci. Technol, 9(32), 1-9.

Tsmots, I., Skorokhoda, O., & Rabyk, V. (2016, September). Structure and software model of a parallel-vertical multi-input adder for FPGA implementation. In 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT) (pp. 158-160). IEEE.

Kovalskyi, B., Dubnevych, M., Holubnyk, T., Pysanchyn, N., & Havrysh, B. (2019). Development of a technology for eliminating color rendering imperfections in digital photographic images. Vostochno-Evropeiskyi zhurnal peredovыkh tekhnolohyi, (1 (2)), 40-47.

Nazarkevych, M., Oliiarnyk, R., Nazarkevych, H., Kramarenko, O., & Onyshschenko, I. (2016, August). The method of encryption based on Ateb-functions. In 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP) (pp. 129-133). IEEE.

Nazarkevych, M., Logoyda, M., Troyan, O., Vozniy, Y., & Shpak, Z. (2019, September). The Ateb-Gabor Filter for Fingerprinting. In International Conference on Computer Science and Information Technology (pp. 247-255). Springer, Cham.

Nazarkevych, M., Lotoshynska, N., Brytkovskyi, V., Dmytruk, S., Dordiak, V., & Pikh, I. (2019, September). Biometric Identification System with Ateb-Gabor Filtering. In 2019 XIth International Scientific and Practical Conference on Electronics and Information Technologies (ELIT) (pp. 15-18). IEEE.

Sheketa, V., Zorin, V., Chupakhina, S, Kyrsta, N., Pasyeka, M., Pasieka, N. (2020). "Empirical Method of Evaluating the Numerical Values of Metrics in the Process of Medical Software Quality Determination,&quot. U International Conference on Decision Aid Sciences and Application (DASA), (s. 22- 26). https://doi.org/10.1109/DASA51403.2020.9317218.

Varetskyy, Y., Rusyn, B., Molga, A., & Ignatovych, A. (2010). A new method of fingerprint key protection of grid credential. In Image Processing and Communications Challenges 2 (pp. 99-103). Springer, Berlin, Heidelberg.

Ahmed, S., Lee, Y., Hyun, S. H., & Koo, I. (2018). Covert cyber assault detection in smart grid networks utilizing feature selection and euclidean distance-based machine learning. Applied Sciences, 8(5), 772.

Yaacob, R., Pritam, H. M. H., Hassan, N. F. N.,. Ooi, C. D., Ibrahim, H., Othman, P. J. (2017). Computer assisted segmentation of palmprint images for biometric research. U 7th IEEE International Conference on Control System, Computing and Engineering (ICCSCE) (s. 273–277). https://doi.org/10.1109/ICCSCE.2017.8284418.

Mishra, M., Bhattacharya, A., Singh, A., Dutta, M. K. (2018). A Lossless Model for Generation of Unique Digital Code for Identification of Biometric Images. U 4th International Conference on Computational Intelligence & Communication Technology (CICT), (s. 1-5). https://doi.org/10.1109/CIACT.2018.8480297.

Jaswal, G., Nath, R., Nigam, A. (2017). Deformable multi-scale scheme for biometric personal identification. U IEEE International Conference on Image Processing (ICIP), (s. 3555-3559). https://doi.org/10.1109/ICIP.2017.8296944.

Do, H., Truong, V., George, K., Shirke, B. (2019). EEG-Based Biometrics Utilizing Image Recognition for Patient Identification. U IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), (s. 0591-0595). https://doi.org/10.1109/UEMCON47517.2019.8992962.

Bychkov, O., Merkulova, K., Zhabska, Y. (2019). Software Application for Biometrical Persons Identification by Portrait Photograph Based on Wavelet Transform. U IEEE International Conference on Advanced Trends in Information Theory (ATIT), (s. 253-256). https://doi.org/10.1109/ATIT49449.2019.9030462.

Setiawan, H., Yuniarno, E. M. (2017). Biometric Recognition Based on Palm Vein Image Using Learning Vector Quantization. U 5th International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), (s. 95-99). https://doi.org/10.1109/ICICI-BME.2017.8537770.

Abdufattokhov, S., Muhiddinov, B. (2019). Stochastic Approach for System Identification using Machine Learning. Dynamics of Systems, Mechanisms and Machines (Dynamics), (s. 1-4). https://doi.org/10.1109/Dynamics47113.2019.8944452.

Yang, B., Liu, D. (2019). Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection. U IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), (s. 1887-1891). https://doi.org/10.1109/ITNEC.2019.8729153.

Hammad I., El-Sankary, K. (2020).Using Machine Learning for Person Identification through Physical Activities. U IEEE International Symposium on Circuits and Systems (ISCAS), (s. 1-5). https://doi.org/10.1109/ISCAS45731.2020.9181231.

Jadav, S. (2018). Voice-Based Gender Identification Using Machine Learning. U 4th International Conference on Computing Communication and Automation (ICCCA), (s. 1-4). https://doi.org/10.1109/CCAA.2018.8777582.

Deng, Y., Wu, F., Du, L., Zhou, R., Cao, L. (2019). EEG-Based Identification of Latent Emotional Disorder Using the Machine Learning Approach. U IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), (s. 2642-2648). https://doi.org/10.1109/ITNEC.2019.8729424.

Traboulsi, A., Barbeau, M. (2019). Recognition of Drone Formation Intentions Using Supervised Machine Learning,". U International Conference on Computational Science and Computational Intelligence (CSCI), (s. 408-411). https://doi.org/10.1109/CSCI49370.2019.00079.

Mokni, R., Elleuch, M., Kherallah, M. (2016). Biometric Palmprint identification via efficient texture features fusion. U International Joint Conference on Neural Networks (IJCNN), (s. 4857-4864). https://doi.org/10.1109/IJCNN.2016.7727838.

Downloads


Abstract views: 426

Published

2021-06-24

How to Cite

Voznyi, Y., Nazarkevych, M., Hrytsyk, V., Lotoshynska, N., & Havrysh, B. (2021). DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(12), 85–95. https://doi.org/10.28925/2663-4023.2021.12.8595

Most read articles by the same author(s)