EFFECTIVE METHODS AND ALGORITHMS FOR FACE RECOGNITION BASED ON DEEP LEARNING TECHNOLOGY

Authors

  • Abdazimov Saidaminkhodja Academy of the Ministry of Internal Affairs of the Republic of Uzbekistan, Tashkent,Uzbekistan saydxodjaabdazimov@gmail.com

Keywords:

information Security, password, biometric technologies, Fingerprint identification, Identification by geometric dimensions of the face, Identification through the arc of the eye and the eye, identification and authentication..

Abstract

In this article, we will explain how important and important biometric authentication methods are, that is, measures to use these methods in which parts of our society and in all important enterprises and organizations, as well as the "Fingerprint identification of a person" is currently the most common method and is widely used in biometric systems of information protection. It is no news to anyone that this method was widely used in the past centuries. Currently, there are three main fingerprint identification technologies. The first of them is the use of well-known optical scanners. The principle of using this device is the same as using a regular scanner. Here the main work is done by the internal light source, several prisms and lenses. The advantage of using optical scanners is their low cost. However, there are many disadvantages. These devices are quick to fail. Therefore, the user is required to use with caution. Dust, various stripes on this device will cause an error in identification, that is, it will prevent the user from logging into the system. In addition, the fingerprint captured by the optical scanner depends on the condition of the user's skin. That is, the oiliness or dryness of the user's skin interferes with identification.theoretical basis of biometric authentication, biometric The analysis of the algorithms and principles of operation of authentication methods consists of a detailed study.

References

Ganiev S. K.,Karimov M. M. “Information protection in computing systems and networks”: Study guide for students of higher educational institutions.

A.B.J.Teoh, A.Goh, and D.C.L. Ngo, "Random Multispace Quantizion as an

Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs”,

Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 28, pp.

—1901, 2006.

Magnuson, S (January 2009), "Defense department under pressure to share

biometric data", National Defense Magazine.org.

www.security.uz/node/277734.

www.google.co.uz/digest/9735.htm

www.itv.ru/products/intellect/additional_modules/

face_recognition/

http://www.secnews.ru/foreign/16309.htm.

http://itcrumbs.ru/google-ne-budet-raspoznavat-litsa_4444.

http://anasrat.ru/blog/50.html.

http://www.digimedia.ru/articles/digital- tales/bezopasnost/

http://www.gadgets.ru/2011/04/01/predator.

http://nnm.ru/blogs/Dus777/luxand_blink_1_0_rc.

Downloads

Published

2023-06-25