GRNTI 20.01 Общие вопросы информатики
GRNTI 26.03 Общественно-политическая мысль
GRNTI 43.01 Общие вопросы естественных и точных наук
GRNTI 44.01 Общие вопросы энергетики
GRNTI 45.01 Общие вопросы электротехники
GRNTI 50.01 Общие вопросы автоматики и вычислительной техники
GRNTI 62.01 Общие вопросы биотехнологии
GRNTI 69.01 Общие вопросы рыбного хозяйства
GRNTI 70.01 Общие вопросы водного хозяйства
GRNTI 73.34 Водный транспорт
He paper studies the problem of minimization of unauthorized access to information. The idea of authentication process and its types are considered. The static and dynamic methods of biometric authentication, based on using such biometric parameters as fingerprint, iris, retina, hand geometry, face geometry, face thermogram, voice and manuscript, are described. The advantages of the dynamic methods of biometric authentication are revealed. According to the analysis of these methods it is offered to use mimicry of human face as a biometric characteristic. It is concluded that the most modern and perspective method of biometric authentication is an assessment of emotional state and mimicry by using permanent secret monitoring with webcam. The perspective of the research of this method is the development of mathematical apparatus, methods and algorithmic, information and software technologies in the given subject area. The development of the mathematical apparatus should be based on the methods of local binary patterns and k -nearest neighbours. The method based on the evaluation of the emotional state and facial expressions is the most promising, however, the researches in this area are now at the stage of the development that does not give a complete picture of all the possibilities of this method.
identification, authentication, biometric authentication, biometric characteristics, static methods, dynamic methods
1. Nyrkov A. P. Mul'tiservisnaya set' transportnoy otrasli / A. P. Nyrkov, S. S. Sokolov, A. S. Belousov // Vestn. komp'yuternyh i informacionnyh tehnologiy. 2014. № 4 (118). S. 33-38.
2. Nyrkov A. P. Obespechenie bezopasnogo funkcionirovaniya mul'tiservisnoy seti transportnoy otrasli / A. P. Nyrkov, S. S. Sokolov, A. S. Belousov // Dokl. Tomsk. gos. un-ta sistem upravleniya i radioelektroniki. 2014. № 2 (32). S. 143-149.
3. Global'noe issledovanie po voprosam obespecheniya informacionnoy bezopasnosti. Perspektivy na 2015 god // URL: http://www.pwc.ru/ru/riskassurance/publications/managing-cyberrisks.html (data obrascheniya: 28.03.2016).
4. Metody i sredstva zaschity ot nesankcionirovannogo dostupa // URL: http://www.panasenko.ru/ Articles/77/77.html (data obrascheniya: 31.03.2016).
5. Identifikaciya i autentifikaciya, upravlenie dostupom // URL: http://citforum.ru/security/articles/ galatenko (data obrascheniya: 27.03.2016).
6. Biometricheskie sistemy autentifikacii // URL: https://ru.wikipedia.org/wiki/Biometricheskie_ sistemy_autentifikacii#.D0.A1.D1.82.D0.B0.D1.82.D0.B8.D1.87.D0.B5.D1.81.D0.BA.D0.B8.D0.B5_.D0. BC.D0.B5.D1.82.D0.BE.D0.B4.D1.8B (data obrascheniya: 28.03.2016).
7. Gureeva O. Biometricheskaya identifikaciya po otpechatkam pal'cev. Tehnologiya FingerChip // Komponenty i tehnologii. 2007. № 4 S. 176-180 // URL: http://www.kit-e.ru/assets/files/pdf/2007_04_176.pdf.
8. Metody autentifikacii po setchatke glaza // URL: https://habrahabr.ru/post/261309/ (data obrascheniya: 01.04.2016).
9. Dinamicheskie metody biometricheskoy autentifikacii lichnosti // URL: http://re.mipt.ru/infsec/ 2006/essay/2006_Dynamic_biometric_authentification__Cherkezov.pdf (data obrascheniya: 28.03.2016).
10. Schemelinin V. L. Issledovanie ustoychivosti golosovoy verifikacii k atakam, ispol'zuyuschim sistemu sinteza / V. L. Schemelinin, K. K. Simonchik // Izv. vyssh. ucheb. zaved. Priborostroenie. 2014. T. 57, № 2. S. 84-88.
11. Tassov K. L. Metod identifikacii cheloveka po golosu / K. L. Tassov, R. A. Dyatlov // Inzhenernyy zhurnal: nauka i innovacii. 2013. Vyp. 6 // URL: http://engjournal.ru/catalog/it/biometric/1103.html.
12. Vyskub V. G. Vozmozhnosti povysheniya tochnosti biometricheskih raspoznayuschih sistem / V. G. Vyskub, I. V. Prudnikov // Inzhenernaya fizika. 2009. Vyp. 5. S. 41-43.
13. Markelov K. S. Biometricheskie informacionnye tehnologii: aktual'nye i perspektivnye metody / K. S. Markelov, V. V. Nechaev // Informacionnye i telekommunikacionnye tehnologii. 2013. № 18. S. 24-42.
14. Shibanov S. V. Sravnitel'nyy analiz sovremennyh metodov autentifikacii pol'zovatelya / S. V. Shibanov, D. A. Karpushin // Matematicheskoe i programmnoe obespechenie sistem v promyshlennoy i social'noy sferah. 2015. № 1. S. 33-37.
15. Sokolov S. S. Postroenie zaschischennoy informacionnoy sistemy personal'nyh dannyh monitoringovogo centra okazaniya telematicheskih uslug bezopasnosti na transporte / S. S. Sokolov, S. S. Malov, A. S. Karpina // Vestn. Gos. un-ta morskogo i rechnogo flota im. adm. S. O. Makarova. 2014. № 5. S. 148-157.
16. Mayorov A. V. Osobennosti tehnologii biometricheskoy zaschity programmnogo obespecheniya / A. V. Mayorov // Nauch.-tehn. konf. molodyh specialistov FGUP «PNIEI». Penza, 2009. 7 s.
17. Ekman P. Psihologiya emociy. Ya znayu, chto ty chuvstvuesh' / P. Ekman. SPb.: Piter, 2010. 180 s.
18. GOST R ISO/MEK 197194-5-2006. Avtomaticheskaya identifikaciya. Identifikaciya biometricheskaya. Formaty obmena biometricheskimi dannymi. Chast' 5. Dannye izobrazheniya lica // URL: http://snipov.net/database/c_3944567195_doc_4293849863.html.
19. Homyakov M. Yu. Principy postroeniya paketa programm dlya modelirovaniya sistem raspoznavaniya izobrazheniy lic / M. Yu. Homyakov, G. A. Kuharev // Izv. Sankt-Peterburg. gos. elektrotehn. un-ta «LETI». 2010. № 7. S. 41-46.
20. Lokal'nye binarnye shablony // URL: https://ru.wikipedia.org/wiki/Lokal'nye_binarnye_shablony (data obrascheniya: 06.04.2016).
21. Metod k-blizhayshih sosedey // URL: https://basegroup.ru/community/glossary/nearest-neighbor (data obrascheniya: 05.04.2016).