Selecting the preferred biometric authentication method

Authors

DOI:

https://doi.org/10.46299/j.isjea.20230204.04

Keywords:

biometric systems, authentication, comparison, optimization

Abstract

In this article, a multicriteria methodology is used to compare some biometric authentication methods with other identification methods. In order to analyze biometric access control systems qualitatively, it is necessary to take into account the characteristics of the systems, as well as to apply certain methods for multicriteria optimization. Therefore, it is necessary to conduct a comparative analysis of biometric authentication methods, taking into account a set of quality indicators. This paper compares certain biometric access control systems by a set of quality indicators, namely, the false-admission rate (FAR), which means a certain percentage when a situation arises when the system can allow access to a user who is not registered in the system, and the false-rejection rate (FRR), which is the percentage of access denied to a real user of the system. Both parameters are calculated using mathematical statistics. The lower the value of these indicators, the higher the quality of authentication of certain users. The article compares and uses the hierarchy analysis method to select the preferred option of known biometric identification tools based on the analysis of fingerprint, 2D human recognition, iris, retina, vein pattern, keyboard handwriting and voice. The hierarchy analysis method is based on the decomposition of the task of selecting the desired design option for a particular system and dividing this task into simpler parts, using the estimates obtained from experts for pairwise comparisons of simple parts of the task. After processing certain data, the preferred biometric identification method is determined. The use of biometrics can solve reliability problems and can improve the reliability of authentication and identification of certain objects when accessing a system with a large number of users, as well as very important and necessary systems as part of physical access control and management systems.

References

Bezruk V., Zelenin A., Vlasova V., Skorik J., Koltun Y. Select preferred of wireless sensor and actuator network / V. Bezruk // Eastern European Journal of Enterprise Technologies, 1/9 (79). – 2016. – P.4-9.

Bezruk V.M., Skoryk YU.V., Kobtseva V.M. Sravnenye metodov byometrycheskoy autentyfykatsyy po sovokupnosty pokazateley kachestva / V.M. Bezruk // Mizhnarodna naukova konferentsiya High-Technologies in infocommunications. – Харків. Кам’янець-Подільський Університет, Україна, 2019. – С. 79-80.

Lebedenko YU. I. Biometricheskiye sistemy bezopasnosti / YU. I. Lebedenko //. - Tula: Izd-vo TulGU, 2012. - 160 s.

Sayt Sovremennyye biometricheskiye metody identifikatsii [Elektronnyy resurs] Rezhim dostupa: www/ URLhttp://masters.donntu.org/2013/fknt/fomenko/library/article4.htm

Saaty T.L. The Analytic Hierarchy Process / T.L. Saaty. – New York: McGraw Hill, 1980. – 270 s.

Matveyev YU.N. Tekhnologii biometricheskoy identifikatsii lichnosti po golosu i drugim modal'nostyam / YU.N. Matveyev. – Vestnik MGTU im. N.E. Baumana. – 2012. – S. 46-61

Elizarov A., Ryabiy M., Elizarov A., Shkarupa D., Gorinshtein M. Review of modern methods of biometric identification and analysis of the effectiveness of their use to limit access / А. Elizarov // INFORMATION TECHNOLOGIES/4. Information Security. Kharkov: Khneu. – 2009.

Bryukhomitsky Y. Biometric technologies of personality identity / Y. Bryukhomitsky// textbook. Rostov-on-Don: South Federal University. – 2017. – 263 p.

James L. Wayman, ‎Anil K. Jain, ‎Davide Maltoni. Biometric Systems: Technology, Design and Performance Evaluation / L. James. – Springer, 2005. – 361 p.

Jiankun Hu, ‎David Chek Ling Ngo, ‎Andrew Beng Jin Teoh. Biometric Security / Hu Jiankun. – Springer, 2015. – 460 p.

Ruggero Donida Labati, ‎Vincenzo Piuri, ‎Fabio Scotti. Touchless Fingerprint Biometrics / Donida Labati Ruggero. – CRC Press, 2015 . – 223p.

Dijana Petrovska-Delacrétaz, ‎Gérard Chollet, ‎Bernadette Dorizzi. Guide to Biometric Reference Systems and Performance Evaluation / Petrovska-Delacrétaz Dijana. – Springer, 2009. – 373 p.

Ted Dunstone, ‎Neil Yager. Biometric System and Data Analysis: Design, Evaluation / Dunstone Ted. – Springer, 2008. – 263 p.

Anil K. Jain, ‎Patrick Flynn, ‎Arun A. Ross. Handbook of Biometrics / Jain Anil K. – Springer, 2007. – 550 p.

N. V. Boulgouris, ‎Konstantinos N. Plataniotis, ‎Evangelia Micheli-Tzanakou. Biometrics: Theory, Methods, and Applications / Boulgouris N. V. – WILEY. Canada, 2009. – 719p.

Published

2023-08-01

How to Cite

Skoryk, Y., & Bezruk, V. (2023). Selecting the preferred biometric authentication method. International Science Journal of Engineering & Agriculture, 2(4), 28–34. https://doi.org/10.46299/j.isjea.20230204.04