Popova T.A., Afanasiev A.M., Zharkov G.V. Approaches to the Protection of Video Surveillance Systems When Applying Recognition Algorithms

APPROACHES TO THE PROTECTION OF VIDEO SURVEILLANCE SYSTEMS WHEN APPLYING RECOGNITION ALGORITHMS

Tatiana A. Popova

Assistant Lecturer, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Anatoly M. Afanasiev

Doctor of Sciences (Engineering), Professor, Information Security Department,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Grigorij V. Zharkov

Student, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Abstract. A system with detection algorithms is a new step in the development of authentication methods. Currently these algorithms are used everywhere. Operating systems already have the facial recognition technology, as it allows a person to log in three times faster than when logging in with a password, and almost every smartphone today supports the function of unlocking with a camera. Object recognition, in turn, can be used for vehicle authentication, when entering a controlled territory, and often plays an important role in implementing enterprise security. With obvious advantages, recognition systems are more likely to produce false results. Important characteristics of any biometric system are errors of the first and second kind. The paper identifies vulnerabilities in object and face recognition algorithms. Approaches to the protection of video surveillance systems when using recognition algorithms are defined. The analysis of the effectiveness of protective measures is carried out. Based on the results of the analysis, it has been determined that additional identification methods cover all the vulnerabilities of the facial recognition algorithm, but this method is very expensive. Another effective measure of protection is the performance of specific actions by the user. This measure covers three of the six vulnerabilities, and is easy to implement and has a low cost.

Key words: information security, object recognition, face recognition, recognition algorithm vulnerabilities, protection measures.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Attachments:
Download this file (3_Popova_i_dr.pdf) 3_Popova_i_dr.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/697
349 DownloadsUpdate this file (3_Popova_i_dr.pdf)