DEVELOPMENT OF A METHOD FOR PERSONAL IDENTIFICATION BASED ON THE PATTERN OF PALM VEINS

  • V.А. Chastikova Kuban State Technological University
  • S.А. Zherlitsyn Kuban State Technological University
Keywords: Biometric personal identification, palm vein pattern, convolutional neural network, binary classification, categorical classification, information security

Abstract

The article describes the work on the creation of a neural network method for identifying
a person based on the mechanism of scanning and analyzing the pattern of palm veins as a biometric
parameter. As part of the study, the prerequisites, goals and reasons for which the deve lopment
of a reliable biometric identification system is an important and relevant area of activity
are described. A number of problems are formulated that are inherent in existing methods for
solving the problem: the graph method and the method based on calculating the distance expressed
in various interval metrics. The description of the principles of their work is given.
The tasks solved by personal identification systems are formulated: comparison of the subject of
identification with its identifier, which uniquely identifies this subject in the information system.
A mechanism for reading a pattern of veins from the palm of the hand, developed for analyzing
an image obtained with a digital camera sensitive to infrared radiation, is described. When the
palm is in the frame, illuminated by the light of the near infrared range, the image obtained
from the camera becomes noticeable pattern of veins, vessels and capillaries that lie under the
skin. Depending on the organization, the identification system may, based on the provided identifier,
determine the appropriate access subject or verify that the same identifier belongs to the
intended subject. Three methods for further analysis of biometric data and personal identification
are given: approaches based on categorical classification and binary classification, as well
as a combined approach, in which identification is first used by the first method, and then, by
the second, but already for a known access identifier defined on the first stage. The resulting
architecture of the neural network for the categorical classification of the vein pattern is pr esented,
a method for calculating the number of model parameters depending on the number of
registered subjects is described. The main conclusions and experimental measurements of the
accuracy of the system when implementing various methods are presented, as well as diagrams of
changes in the accuracy of models during training. The main advantages and disadvantages of the
above methods are revealed.

References

1. Chastikova V.A., Zherlitsyn S A., Volya Ya.I. Neyrosetevoy metod identifikatsii lichnosti po
neformalizovannoy semanticheskoy kharakteristike [Neural network method of identification
by unformalized semantic characteristics], Vestnik UrFO. Bezopasnost' v informatsionnoy
sfere [Urfu Journal. Security in the information sphere no], 2018, No. 4 (30), pp. 20-26. DOI
10.14529/secur180403. EDN YuNKCL.
2. Chastikova V.A., Zherlitsyn S.A., Volya Ya.I., Sotnikov V.V. Neyrosetevaya tekhnologiya
obnaruzheniya anomal'nogo setevogo trafika [Neural network technology for detecting anomalous
network traffic], Prikaspiyskiy zhurnal: upravlenie i vysokie tekhnologii [Caspian journal: Control
and High Technologies], No. 1 (49), pp. 20-32. DOI 10.21672/2074-1707.2020.49.4.020-032. EDN
WUCDII.
3. Jain A.K., Ross A. and Pankanti S. Biometrics: a tool for information security, Trans Inform
Forensics Secur, No. 1 (2), pp. 125-143.
4. Malatras A., Geneiatakis D. and Vakalis I. On the efficiency of user identification: a systembased
approach, Int. J. Inf. Secur., No. 16, pp. 653-671.
5. Im S., Park H., Kim Y, Han S., Kim S., Kang C., Chung C. A Biometric identification system
by extracting hand vein patterns, J Korean Phys Soc., Vol. 28 (3), pp. 268-272.
6. Sarkar A. and Singh B.K. A review on performance, security and various biometric template
protection schemes for biometric authentication systems, Multimed Tools Appl, Vol. 79,
pp. 27721-27776.
7. Hancock J T and Khoshgoftaar T M Survey on categorical data for neural networks, Journal of
Big Data, Vol. 7, No. 28.
8. Chastikova V.A., Zherlitsyn S.A. and Y.I. Volya Neural network method of identification by
unformalized semantic characteristics, News of Volgograd State Technical University no,
Vol. 8 (218), pp. 63-67.
9. Blokus A. and Krawczyk H. Systematic approach to binary classification of images in video
streams using shifting time windows, SIViP, No. 13, pp. 341-348.
10. Hassanat A.B., Albustanji A., Tarawneh A.S., Alrashidi M., Alharbi H., Alanazi M., Alghamdi
M., Alkhazi I.S., & Prasath V. Deep learning for identification and face, gender, expression
recognition under constraints, ArXiv, abs/2111.01930, 2021.
11. Soleymani S., Dabouei A., Taherkhani F., Iranmanesh S.M., Dawson J.M., & Nasrabadi N.M.,
Quality-Aware Multimodal Biometric Recognition, ArXiv, abs/2112.05827, 2021.
12. Mugalu B.W., Wamala R.C., Serugunda J., & Katumba A. Face Recognition as a Method of
Authentication in a Web-Based System, ArXiv, abs/2103.15144, 2021.
13. Marattukalam F., Abdulla W.H., & Swain A.K. 2021 N-shot Palm Vein Verification Using
Siamese Networks, 2021 International Conference of the Biometrics Special Interest Group
(BIOSIG), pp. 1-5.
14. Meng Z., Altaf M.U., Juang B. Active voice authentication, ArXiv, abs/2004.12071, 2020.
15. Stragapede G., Vera-Rodríguez R., Tolosana R., Morales A., Acien A., & Lan G.L. Mobile
Behavioral Biometrics for Passive Authentication, ArXiv, abs/2203.07300, 2022.
16. Fuksis R., Pudzs M., Greitans M. Palm Vein Biometrics Based on Palm Infrared Imaging and Complex
Matched Filtering, The 12th ACM Workshop on Multimedia and Security, Rome, 2009, pp. 27.
17. Chastikova V. A., Zherlitsyn S. A., Volya Y.I. Analysis of training of deep neural networks with
heterogeneous architecture while detecting malicious network traffic, IOP Conference Series:
Materials Science and Engineering, Krasnoyarsk, Russian Federation: IOP Publishing Ltd,
2021, pp. 12135. DOI 10.1088/1757-899X/1047/1/012135.
18. Chastikova V.A., Titova A.A., Voylova D.O. Analiticheskiy obzor metodov identifikatsii lichnosti na
osnove biometricheskikh kharakteristik [Analytical review of personal identification methods based
on biometric characteristics], Vestnik Adygeyskogo gosudarstvennogo universiteta. Seriya 4:
Estestvenno-matematicheskie i tekhnicheskie nauki [Bulletin of the Adyghe State University.
Series 4: Natural-mathematical and technical sciences], 2022, No. 1 (296), pp. 92-112.
19. Promyslov V.G., Semenkov K.V., Mengazetdinov N.E. Issledovanie metodov autentifikatsii
operatorov v promyshlennykh sistemakh upravleniya [Research of methods of authentication
of operators in industrial control systems], Problemy upravleniya [Management Problems],
2022, No. 3, pp. 40-54.
20. Artamonov V.A., Artamonova E.V. Iskusstvennyy intellekt i bezopasnost': problemy,
zabluzhdeniya, real'nost' i budushchee [Artificial intelligence and security: problems, delusions,
reality and future], Rossiya: tendentsii i perspektivy razvitiya [Russia: trends and development
prospects], 2022, No. 17-1, pp. 585-594.
Published
2022-11-01
Section
SECTION II. INFORMATION PROCESSING ALGORITHMS