EURASIAN|OUmMOT__
EURASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES
Innovative Academy Research Support Center IF = 7.906 www.in-academy.uz
PERSONAL BIOMETRIC IDENTIFICATION PROBLEMS Jurakulov Talib Takhirovich
Teacher of Navoi State Pedagogical Institute [email protected] Sadulloyeva Maftuna Lufulloyevana
Student of Navoi State Pedagogical Institute
[email protected] https://doi.org/10.5281/zenodo.13898191
ARTICLE INFO
ABSTRACT
Received: 01st October 2024 Accepted: 06th October 2024 Online: 07th October 2024
KEYWORDS Biometrics, biometric
identification, biometric
technologies, authentication, biometric system.
In this work, the problems of biometric identification of a person are considered, in practice wide used biometric identification of methods briefly mutual comparative analysis is presented.
Biometrics is a system of identifying a person based on his physiological or behavioral characteristics. Physiological signs include the human face, the geometric structure of the hand, the fingerprints, the colored membrane of the eyes, and so on. Behavioral traits are traits acquired or learned over a period of time. These include things like handwriting, voice, gait, and typing dynamics. Currently, there is no single "perfect" biometric system that meets all requirements. All biometric systems have a number of advantages and disadvantages specific to the biometric technologies used in them have will be. However, biometric systems work on the way out in the eye catch necessary There are some generally accepted rules. First, biometric data must consist of uniquely distinguishable, unrepeatable characters. For example, "a perfectly uniform finger trace there is it's not" said the assumption confirming one row scientific in terms of based on the fact that evidence exists is a clear proof of the condition that signs are unique and unrepeatable. Methods such as identification of a person based on fingerprints and hand geometry have been around for several years using bride and last in years the face or look colorful curtain recognize get such methods are spreading widely. Some of the newer biometric identification methods being developed may have high accuracy, but will require more research, testing, and time to prove popular. Another important aspect is how user-friendly the system is. is a clear answer to the appropriate question. To do this, the identification process should be quick and easy for the user, for example photo or video camera using photo to get to the microphone to speak or touch fingerprint scanner, etc. Low cost to implement and maintain the system is also important, but in the development of biometric identification systems, these costs are not only the initial cost of the device or related software, but often, the system administration and the system monitor life cycle support costs associated with operator provisioning can exceed the initial cost of a biometric system [1,2].
EURASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES
Innovative Academy Research Support Center IF = 7.906 www.in-academy.uz
A key advantage of biometric authentication is its ability to quickly and easily capture more authentication information from users without requiring additional information. The development of biometric methods and their widespread commercial use one how many level authentication or of authentication one How many categories? with work users for so much complexity does not give birth.
Biometric of methods criminals to determine and public safety provide such as widely used in expert forensic systems. The rapid development of biometric methods is one of them online banking, electron commerce and access control to do such as citizenship in software systems wide use for big gives opportunities. Online electronic banking as a result of the rapid growth in the number of electronic transactions and their use and electron commerce in the field biometric to technologies based on new to create programs needs day after day increased is going This programs credit card and from smart cards safe use, ATMs safety, check cashing , money transfers, online operations and to the internet access safety to provide own into takes Physical access manage in systems traditionally a token from based authentication is used. Biometric of methods fast is developing because of this software in systems person authentication to do for of them more and more a lot is being used [2]. A biometric system uses a pre-registered biometric sample (biometric template or identifier) to the system at the entrance received biometric example (eg access during taken finger trace or face image and etc.) with to compare done increases. Person to him belonged to something biometric parameter based on to the list get during to the system incoming special devices (cameras, sensors and etc.) using received biometric example special processed on a computer based on algorithms and mathematical methods, a vector of biometric characters is formed, and in the future comparison in the process benchmark as use information for in the base is stored. Biometric systems usually two in mode: identification and can be used in verification modes. Public biometric recognition system in identification mode in places apply can in this biometric system only to the system incoming biometric on a sample basis suitable coming sample whole data from the base in it to the list identifies the desired person by searching among the received biometric data. In verification mode, biometric system something to a person belongs to was incoming biometric sample in advance in the system from the register passed biometric benchmark with comparison through she is of a person confirms his identity. This method "one to one" comparison that too is called [3, 4].
Currently, many methods of biometric identification of a person are used in various socioeconomic fields in order to ensure security. It is considered appropriate to introduce biometric systems to an object based on the selection of a suitable biometric method based on the main activity type and coverage level of this object.
Table 1 below shows the available literature of biometric methods widely used in practice analysis as a result formed advantages and disadvantages comparative analysis provided .
Table 1. Biometric of methods advantage and disadvantages
Biometric Advantages Disadvantages
method name
EURASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES
Innovative Academy Research Support Center IF = 7.906 www.in-academy.uz
Finger trace recognition based on - High reliability; - Relatively cheap; - High accuracy; - User for convenient; - Time pass with is kept stable . - External of the environment different low tolerance to the effects ; - a fake fingerprint image ; - Dry or contaminated fingers; - On the finger different defects; - Temporarily or constant injuries may interfere with scanning.
Hand recognition based on geometry - Template volume smallness; - Hand of the skin status does not affect . - Scanner size ; - Hand injury may affect ; - Little difference.
The face recognize get - High at speed works; - High accuracy; - Without contact and quick identification; - A lot regularity; - User for convenient; - Special devices does not require - Time pass with face change; - On the face beard, moustache and the presence of stains ; - Face partially or complete occlusion (glasses, mask, etc.); - Surgery by the way possibility of manipulation ; - Fake face image possibility of input ; - External bad environment.
Recognizing the colored membrane of the eye - Reliable; - High accuracy; - Without contact identification; - Various to the races there is no relation. - A lot nuclear processor demand reaches; - High price; - External bad environment; - Eye diseases with uncomfortable for the sick.
The voice recognize get - Without contact identification; - User for convenient; - External noisy environment; - Diseases under the influence of sound change; - Mouth and throat damage may affect;
Table 1 shows that no biometric method has a clear advantage over the other. Analysis of foreign and domestic literature shows that all biometric methods have their own advantages and disadvantages.
In conclusion, it can be said that choosing a biometric method that is relatively optimal for solving the issue of personal identification, it is appropriate to build a biometric system compatible with the available technical and informational resources and with relatively few errors in the active mode of operation. Issues of development of such biomeric systems are discussed in detail in works [5,6,7].
I EURASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES
Innovative Academy Research Support Center IF = 7.906 www.in-academy.uz
References:
1. Cortley Y., Jridi M., Al Falou A., Atri M. Face Recognition Systems: A Survey. Sensors. -2020. - Vol. 20, 342. - URL: https://doi.org/10.3390/s20020342.
2. Mehta V., Tiwari J., Shaji J. Face Recognition-Advanced Techniques. International Journal of Engineering Research & Technology (IJERT 2019.
3. Vol. 08. . Pp. 410-415. URL: https://doi.org/10.17577/IJERTV8IS070178
4. Kukharev G.A. Biometric system. Method and means of identification of people. - SPb: Polytechnic, 2001. - 240 p.
5. Mamatov N., Abdukadirov B., Kakharov Sh., Orifjonov B., Abdukadirova G. Peculiarities of face detection and recognition. 2021 International Conference on Information Science oath Communications Technologies (ICISCT). - 2021.
6. - Pp. 1-5. - URL: https://doi.org/10.1109/ICISCT52966.2021.9670086.
7. Fazilov Sh.Kh., Kakharov Sh.S. Problems of facial image decomposition into local areas in biometric identification of a person. Journal of informatics and energy problems of Uzbekistan. - 2021. - No. 6. - B.
8. Fazilov S. K., Mirzaev ON, Kakharov S. S. Building a Local Classifier for Component-Based Face Recognition //International Conference on Intelligent Human Computer Interaction. -Cham : Springer Nature Switzerland, 2022. - S. 177-187. 3-17.
9. Opanasenko VM, Fazilov S., Radjabov SS etc al. Multilevel Face Recognition System. Cybern Syst Anal 60, 146-151 (2024). https://doi.org/10.1007/s10559-024-00655-w