PETRLOVÁ, Katarína, Katarína KAMPOVÁ, Tomáš LOVEČEK a Jakub ĎURICA. Biometric Identity Verification as Part of Physical Protection Systems. Online. In 2022 IEEE International Carnahan Conference on Security Technology (ICCST). New York (USA): Institute of Electrical and Electronics Engineers Inc., 2022, s. 1-7. ISBN 978-1-6654-9364-2. Dostupné z: https://dx.doi.org/10.1109/ICCST52959.2022.9896544.
Další formáty:   BibTeX LaTeX RIS
Základní údaje
Originální název Biometric Identity Verification as Part of Physical Protection Systems
Autoři PETRLOVÁ, Katarína (703 Slovensko, domácí), Katarína KAMPOVÁ (703 Slovensko), Tomáš LOVEČEK (703 Slovensko, garant) a Jakub ĎURICA (703 Slovensko).
Vydání New York (USA), 2022 IEEE International Carnahan Conference on Security Technology (ICCST), od s. 1-7, 7 s. 2022.
Nakladatel Institute of Electrical and Electronics Engineers Inc.
Další údaje
Originální jazyk angličtina
Typ výsledku Stať ve sborníku
Obor 10201 Computer sciences, information science, bioinformatics
Stát vydavatele Spojené státy
Utajení není předmětem státního či obchodního tajemství
Forma vydání elektronická verze "online"
WWW 2022 IEEE International Carnahan Conference on Security Technology (ICCST)
Kód RIV RIV/47813059:19610/22:A0000120
Organizační jednotka Matematický ústav v Opavě
ISBN 978-1-6654-9364-2
ISSN 1071-6572
Doi http://dx.doi.org/10.1109/ICCST52959.2022.9896544
Klíčová slova anglicky Authentication; Biometrics; Protection System; Testing
Štítky
Příznaky Mezinárodní význam, Recenzováno
Změnil Změnil: Mgr. Aleš Ryšavý, učo 28000. Změněno: 24. 4. 2023 12:09.
Anotace
The presented article is focused on access control systems like the basic elements of the property protection system, designed for intelligent access/exit control of persons to/from the protected area and for their movement tracking. The authors highlight the importance of identity verification within alarm systems designed to detect unauthorized access and describe the possibilities of applying various authentication information within access control systems. They focus on the method of authentication using the unique biometric characteristics of a man. In addition to the many advantages, that this approach presents, there are limitations in its application, resulting from the technological means and procedures used. These limitations can be summarized as metrics of biometric system performance. However, these metrics are often evaluated on ideal, so-called zero effort impostor datasets, which distort the design of physical protection systems. In this article, the authors emphasize the need to focus on the quantification of biometric performance, including spoof attacks. By testing the selected biometric system, authors outline the possibilities for real evaluation of the performance level. The results from testing can be used for physical protection systems models and for simulating the violation of the protected area (e.g. elements of critical infrastructure).
VytisknoutZobrazeno: 12. 5. 2024 14:59