D 2022

Biometric Identity Verification as Part of Physical Protection Systems

PETRLOVÁ, Katarína, Katarína KAMPOVÁ, Tomáš LOVEČEK and Jakub ĎURICA

Basic information

Original name

Biometric Identity Verification as Part of Physical Protection Systems

Authors

PETRLOVÁ, Katarína (703 Slovakia, belonging to the institution), Katarína KAMPOVÁ (703 Slovakia), Tomáš LOVEČEK (703 Slovakia, guarantor) and Jakub ĎURICA (703 Slovakia)

Edition

New York (USA), 2022 IEEE International Carnahan Conference on Security Technology (ICCST), p. 1-7, 7 pp. 2022

Publisher

Institute of Electrical and Electronics Engineers Inc.

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

United States of America

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

electronic version available online

References:

2022 IEEE International Carnahan Conference on Security Technology (ICCST)

RIV identification code

RIV/47813059:19610/22:A0000120

Organization unit

Mathematical Institute in Opava

ISBN

978-1-6654-9364-2

ISSN

DOI

http://dx.doi.org/10.1109/ICCST52959.2022.9896544

Keywords in English

Authentication; Biometrics; Protection System; Testing

Tags

Tags

International impact, Reviewed
Změněno: 24/4/2023 12:09, Mgr. Aleš Ryšavý

Abstract

V originále

The presented article is focused on access control systems like the basic elements of the property protection system, designed for intelligent access/exit control of persons to/from the protected area and for their movement tracking. The authors highlight the importance of identity verification within alarm systems designed to detect unauthorized access and describe the possibilities of applying various authentication information within access control systems. They focus on the method of authentication using the unique biometric characteristics of a man. In addition to the many advantages, that this approach presents, there are limitations in its application, resulting from the technological means and procedures used. These limitations can be summarized as metrics of biometric system performance. However, these metrics are often evaluated on ideal, so-called zero effort impostor datasets, which distort the design of physical protection systems. In this article, the authors emphasize the need to focus on the quantification of biometric performance, including spoof attacks. By testing the selected biometric system, authors outline the possibilities for real evaluation of the performance level. The results from testing can be used for physical protection systems models and for simulating the violation of the protected area (e.g. elements of critical infrastructure).
Displayed: 26/12/2024 12:18