Biometric Identity Verification as Part of Physical Protection Systems
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F47813059%3A19610%2F22%3AA0000120" target="_blank" >RIV/47813059:19610/22:A0000120 - isvavai.cz</a>
Result on the web
<a href="https://ieeexplore.ieee.org/document/9896544" target="_blank" >https://ieeexplore.ieee.org/document/9896544</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/ICCST52959.2022.9896544" target="_blank" >10.1109/ICCST52959.2022.9896544</a>
Alternative languages
Result language
angličtina
Original language name
Biometric Identity Verification as Part of Physical Protection Systems
Original language description
The presented article is focused on access control systems like the basic elements of the property protection system, designed for intelligent access/exit control of persons to/from the protected area and for their movement tracking. The authors highlight the importance of identity verification within alarm systems designed to detect unauthorized access and describe the possibilities of applying various authentication information within access control systems. They focus on the method of authentication using the unique biometric characteristics of a man. In addition to the many advantages, that this approach presents, there are limitations in its application, resulting from the technological means and procedures used. These limitations can be summarized as metrics of biometric system performance. However, these metrics are often evaluated on ideal, so-called zero effort impostor datasets, which distort the design of physical protection systems. In this article, the authors emphasize the need to focus on the quantification of biometric performance, including spoof attacks. By testing the selected biometric system, authors outline the possibilities for real evaluation of the performance level. The results from testing can be used for physical protection systems models and for simulating the violation of the protected area (e.g. elements of critical infrastructure).
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
—
Continuities
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Others
Publication year
2022
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
2022 IEEE International Carnahan Conference on Security Technology (ICCST)
ISBN
9781665493642
ISSN
1071-6572
e-ISSN
2153-0742
Number of pages
7
Pages from-to
1-7
Publisher name
Institute of Electrical and Electronics Engineers Inc.
Place of publication
New York (USA)
Event location
Valeč u Hrotovic, Czech Republic
Event date
Aug 7, 2022
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—