ITPM 2024: pp. 278 - 291

Authors:

  1. Sergey Bushuyev
  2. Ihor Tereikovskyi
  3. Oleksandr Korchenko
  4. Ivan Dychka
  5. Liudmyla Tereikovska
  6. Oleh Tereikovskyi

1 Kyiv National University of Construction and Architecture, Kyiv, Ukraine
2 National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine
3 National Aviation University, Kyiv, Ukraine

4 National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine

5 Kyiv National University of Construction and Architecture, Kyiv, Ukraine

6 National Aviation University, Kyiv, Ukraine

Abstract 

Today’s challenges determine the need to improve the biometric authentication of personnel of
critical infrastructure facilities. Common means of biometric authentication, which are usually
based on the use of neural network technologies for facial image analysis, need improvement in
the direction of adaptation to the conditions of recognition during the performance by personnel
of their functional duties, which are characterized by the influence of interference during video
recording and an increase in the probability attacks using dummies. Another area of
improvement is determined by the availability of video recording tools, which provide the ability
to recognize a person by the iris of the eye and the ability to recognize emotions. It is shown that
the first stage of improvement of neural network means of biometric authentication is the
development of a formalized description of the recognition process, which takes into account
promising areas of improvement. A conceptual model containing a formalized description and
criteria for evaluating the effectiveness of the recognition process is proposed. At the same time,
for the first time, an approach to determining the parameters of obstacles was proposed, which
involves comparing the parameters of obstacles with the location and number of key and control
faces that they overlap. Recognition of attacks is proposed to be implemented based on the
analysis of the dynamics of basic emotions, the dynamics of eye movement parameters and the
environment. The results of this study are important in the context of the development of
effective biometric authentication tools, as they provide a formalized description of the
requirements for the functional capabilities of the main components of the process of recognizing
the identity and emotions of personnel of critical infrastructure facilities.

Keywords

model, critical infrastructure, face image, iris, neural network, information security 1

References

[1] Ali, M., Thakur, K., & Tappert, C. (2015). User authentication and identification using
neural network. I-manager’s Journal on Pattern Recognition, (2), 28-39.
[2] Bagitova, K., Tereikovskyi, I., Babayev, I., Tereikovska, L., & Tereikovskyi, O. (2023).
Model for processing images of online social networks used to recognize political
extremism. Journal of Mathematics, Mechanics and Computer Science, 119(3), 91-103.
doi:10.26577/JMMCS2023v119i3a8.
[3] Batista, J. C., Albiero, V., Bellon, O. R., & Silva, L. (2017). AUMPNet: Simultaneous Action
Units Detection and Intensity Estimation on Multipose Facial Images Using a Single
Convolutional Neural Network. In 12th IEEE International Conference on Automatic
Face & Gesture Recognition (pp. 866-871).
[4] Callet, P., Viard-Gaudin, C., & Barba, D. (2006). A Convolutional Neural Network
Approach for Objective Video Quality Assessment. IEEE Transactions on Neural
Networks, 17(5), 1316–1327.
[5] Chandrani, S., Washef, A., Soma, M., & Debasis, M. (2015). Facial Expressions: A Cross-
Cultural Study. In Emotion Recognition: A Pattern Analysis Approach (pp. 69-87). Wiley
Publ. doi:10.1002/9781118910566.
[6] Connaughton, R., Bowyer, K. W., & Flynn, P. J. (2013). Fusion of Face and Iris Biometrics.
In Handbook of Iris Recognition (pp. 219-237). Springer.
[7] Dychka, I., Chernyshev, D., Tereikovskyi, I., Tereikovska, L., & Pogorelov, V. (2020).
Malware Detection Using Artificial Neural Networks. In Z. Hu, S. Petoukhov, I. Dychka,
& M. He (Eds.), Advances in Computer Science for Engineering and Education II.
ICCSEEA 2019. Advances in Intelligent Systems and Computing (Vol. 938, pp. 3-12).
Springer, Cham. doi:10.1007/978-3-030-16621-2_1.
[8] Held, G. (2003). Securing wireless LAN’s. Macon, Georgia, USA: Publisher.
[9] Linartz, J.-P., & Tuyls, P. (2003). New shielding functions to enhance privacy and
prevent misuse of biometric templates. In Proceedings of 4th International Conference
on Audio And Video Based Biometric Person Authentication (pp. 393-402).
[10] Lu, X., & Jain, A. K. (2011). Deformation modeling for robust face matching. IEEE
Transactions on Pattern Analysis and Machine Intelligence, 30(8), 1347–1358.
[11] Ma, X., Fu, M., Zhang, X., Song, X., Becker, B., Wu, R., Xu, X., Gao, Z., Kendrick, K., & Zhao,
W. (2022). Own Race Eye-Gaze Bias for All Emotional Faces but Accuracy Bias Only for
Sad Expressions. Frontiers in Neuroscience, 16, 1-11. doi:10.3389/fnins.2022.852484.
[12] Matusugu, M., Katsuhiko, M., Yusuke, M., & Yuji, K. (2003). Subject independent facial
expression recognition with robust face detection using a convolutional neural
network. Neural Networks, 16(5-6), 555–559.
[13] Mian, A. S., Benamoun, M., & Owens, R. (2011). Keypoint detection and local feature
matching for textured face recognition. International Journal of Computer Vision, 80(1),
1–13.
[14] Nazarkevich, M., Vozniy, Ya., & Nazarkevich, G. (2021). Development of a machine
learning method for biometric protection with new filtering methods. Cyber Security:
Education, Science, Technology, 3(11), 16–30. doi:10.28925/2663-4023.2021.11.1630.
[15] Noyes, E., Davis, J., Petrov, N., Gray, K., & Ritchie, K. (2021). The effect of face masks and
sunglasses on identity and expression recognition with super-recognizers and typical
observers. Royal Society Open Science, 8(3), 201169. doi:10.1098/rsos.201169.
[16] Ranjith, G., Pallavi, K., & Mahendra, V. (2023). Human Face, Eye and Iris Detection in
Real-Time Using Image Processing. In J.K. Mandal, M. Hinchey, & K.S. Rao (Eds.),
Innovations in Signal Processing and Embedded Systems. Algorithms for Intelligent
Systems (pp. 101-116). Springer, Singapore. doi:10.1007/978-981-19-1669-4_34.
[17] Ratha, N., Conneli, J., & Bolle, R. (2001). Enhancing security and privacy in biometricsbased
authentication systems. IBM Systems Journal, 40(3), 614-634.
[18] Rinck, M., Primbs, M. A., Verpaalen, A. M., & Bijlstra, G. (2022). Face masks impair facial
emotion recognition and induce specific emotion confusions. Cognitive Research:
Principles and Implications, 7(1), 83, 203-217. doi:10.1186/s41235-022-00430-5.
[19] Royer, J., Blais, C., Charbonneau, I., Déry, K., & Tardif, J. (2018). Greater reliance on the
eye region predicts better face recognition ability. Cognition, 181, 12–20.
doi:10.1016/j.cognition.2018.08.004.
[20] Stallings, W., & Brown, L. (2022). Computer security: principles and practice (4th ed.).
Pearson.
[21] Tariq, U., Lin, K., Li, Z., Zhou, Z., Wang, Z., Le, V., Huang, T. S., Lv, X., & Han, T. X. (2012).
Emotion recognition from an ensemble of features. IEEE Transactions on Systems, Man,
and Cybernetics, Part B: Cybernetics, 42(4), 1017–1026.
[22] Tereikovskyi, I., Hu, Z., Chernyshev, D., Tereikovska, L., Korystin, O., & Tereikovskyi, O.
(2022). The method of semantic image segmentation using neural networks.
International Journal of Image, Graphics and Signal Processing (IJIGSP), 14(6), 1-14.
doi:10.5815/ijigsp.2022.06.01.
[23] Tereykovska, L., Tereykovskiy, I., Aytkhozhaeva, E., Tynymbayev, S., & Imanbayev, A.
(2017). Encoding of neural network model exit signal, that is devoted for distinction of
graphical images in biometric authenticate systems. News of the National Academy of
Sciences of the Republic of Kazakhstan Series of Geology and Technical Sciences, 6(426),
217–224.
[24] Toliupa, S., Kulakov, Y., Tereikovskyi, I., Tereikovskyi, O., Tereikovska, L., &
Nakonechnyi, V. (2020). Keyboard Dynamic Analysis by Alexnet Type Neural Network.
In IEEE 15th International Conference on Advanced Trends in Radioelectronics,
Telecommunications and Computer Engineering (pp. 416-420).
doi:10.1109/TCSET49122.2020.235466.
[25] Toliupa, S., Tereikovskiy, I., Dychka, I., Tereikovska, L., & Trush, A. (2019). The Method
of Using Production Rules in Neural Network Recognition of Emotions by Facial
Geometry. In 3rd International Conference on Advanced Information and
Communications Technologies (AICT) (pp. 323–327).
doi:10.1109/AIACT.2019.8847847.
[26] Vinette, C., Gosselin, F., & Schyns, P. (2004). Spatio-temporal dynamics of face
recognition in a flash: it’s in the eyes. Cognitive Science, 28, 289–301.
doi:10.1016/j.cogsci.2004.01.002.
[27] Viola, P., & Jones, M. (2005). Fast Multi-view Face Detection. Mitsubishi Electric
Research Laboratories Technical Report TR2005-097, 67.
[28] Viola, P. (2005). Robust real-time face detection. International Journal of Computer
Vision, 58(2), 137–155.
[29] Viswanath Reddy, A., et al. (2021). Facial Emotions over Static Facial Images Using Deep
Learning Techniques with Hysterical Interpretation. Journal of Physics: Conference
Series, 2089, 1-17. doi:10.1088/1742-6596/2089/1/012014.
[30] Vysotska, O., Davydenko, A., & Khrystevych, V. (2022). Segmentation of a person’s face
in a video stream to monitor employees’ compliance with safety conditions during
work and training. Information Security, 24(2), 94-107. doi:10.18372/2410-
7840.24.16934.
[31] Zhuravlov, D., & Polshakova, O. (2023). Detection of face spoofing attacks on biometric
identification systems. Interdepartmental scientific and technical collection “Adaptive
automatic control systems”, 1(42), 108-114.

Full text

Powered By EmbedPress