<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>method information and telecommunication systems based on cascading multimodal biometric identification</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Trysnyuk</string-name>
          <email>trysnyuk@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Lebid</string-name>
          <email>lebid65@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kyrylo Smetanin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ihor Humeniuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Samchyshyn</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktor Shumeiko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Taras Trysnyuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Ternopil, Ukraine</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Telecommunications and Global Information Space of the National Academy of Sciences of Ukraine</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Korolov Zhytomyr Military Institute</institution>
          ,
          <addr-line>22 Miru Ave., Zhytomyr, 10004</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>Efficiency of information and telecommunication systems significantly depends on the strong control over the provision of authorized access to them. However, the constant improvement of the technical equipment of these systems requires new approaches creation and user authentication existing method improvement. Biometric identification technologies are one of the significant approaches in the development of methods. Timely detection of unauthorized access to information and telecommunication systems is a necessary component of high stability ensuring and reliability of their operation, especially for cyber-attacks prevention or important information leakage and necessitates the development of intelligent methods of user authentication. Authors proposes a method of user authentication of information and telecommunications systems, based on the use identification by voice message and facial geometry, particularly taking into account the physiological characteristics of the person. The results of method verification for users of different sex, physiological condition, and their comparative characteristics were established. The application of the proposed method allows reduces the risk of successful implementation by the violator of unauthorized access to the network of information and telecommunication systems in the absence of means to control access to them.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>and
telecommunication
system;
cascade;
multimodal</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction and Literature Review</title>
      <p>Nowadays passwords are based on unique personal information and attribute identification methods
are losing their relevance, but there are in great demand among users. These methods of providing
access have significant technological shortcomings, which are becoming increasingly pronounced. One
of such problems is the inaccuracy of user identification in the system and the high probability of
violation of its security as a result of unauthorized access (UI) to information, information leakage,
imitation of a certain attribute or password cracking, and so on. Another important problem of these
methods is the lack of functionality to detect the substitution of an authorized ("legitimate") user.</p>
      <p>
        Compared to previous methods, the user’s biometric characteristics as authentication method can
guarantee an increased level of security, taking into account the individual characteristics of the
biometric data of a particular person [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>2021 Copyright for this paper by its authors.</p>
      <p>
        Standard password (attribute) for security systems is increasingly being replaced or supplemented
by biometric personal identification systems. According to the analysis of the scientific literature [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2– 5</xref>
        ],
the most effective and popular methods are the application of identification by facial geometry [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]
and voice message [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The main advantages of such systems are low price, high security level, user
convenience, accessibility, ease of use, remote access etc. Such authorization systems allow to solve
problems related to the confidentiality of user credentials, identification and authentication in
information and telecommunications systems (ITS).
      </p>
      <p>However, at the current level of development of information technology there is an increase in the
frequency of false positives, service failures, artificial (malicious) violations of control systems and access
to ITS using cyber-attacks, hardware and software. Therefore, the task of developing and / or improving
methods of multimodal biometric authentication to reduce the risk of successful implementation of the NSD
violator to the ITS network becomes relevant.</p>
      <p>
        A number of modern methods of ITS information protection using biometric user identification methods
have been developed and implemented. The authors in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] present the results of the analysis of face
recognition methods and algorithms for comparing image patterns, as well as trends in the development of
biometric identification and authentication of persons by facial geometry; in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] the analysis of methods of
biometric identification was carried out, the advantages and disadvantages of technologies of their realization
are resulted; in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] modern methods of biometric identification of users of computer systems, designed to
ensure the protection of confidential information was considered; paper [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] describes general methods and
programs of biometric identification; in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] the classification of models and methods of biometric attendance
control is considered, the results of the analysis of human authentication was proposed; in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] the structure
of the biometric template of mobile banking user authentication was developed; in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] current scientific and
technical problem of developing information technology for personnel identification based on a set of
biometric parameters using a combination of static-dynamic recognition methods and improving methods
of creating reference samples was solved; in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] the results of using chalk-frequency coefficients of keppra
to solve the problem of user identification by voice signal were proposed.
      </p>
      <p>Therefore, the results of the analysis of scientific and practical sources indicate that a sufficient amount
of scientific and methodological and practical support was developed to solve the problems of ITS
protection. These methods of access control are based on voice and face recognition and have a number of
disadvantages. Such methods do not take into account the training sample (computer training) identification
data, in particular, standards of target voice and face images, as well as physiological characteristics of the
user. This does not ensure the cascading operation of biometric user identification systems and a sufficient
level of efficiency of the identification system to prevent the successful implementation of UAA. Based on
these prerequisites, the purpose of this article is formulated, which is to develop a method of authentication
of ITS users based on cascading multimodal biometric identification and its application in solving problems
of timely detection and operational blocking of UAA.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Materials and Methods</title>
      <p>Biometric identification is a technology for recognizing certain unique specific biometric features
(identifiers) that are specific to a particular person or user.</p>
      <p>
        In order to increase the level of ITS security, to prevent the successful implementation of the UAA
violator, it is proposed to change the approach to solving the problem of user identification, namely: to
solve this problem not in the systematic and simultaneous use of identification systems by voice and
facial geometry within the framework of cascading identification of "voice-face" with an increased
educational sample of standards, in particular, taking into account the physiological characteristics of
the person. In this approach, the problem of user identification is solved separately for identification
systems by voice recognition [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and facial geometry [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] with sequential activation of the second,
provided the successful completion of the first. This approach allows to ensure the cascading of the user
identification system, which increases the efficiency of the ITS access control systems as a whole
[
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ].
      </p>
      <p>The developed method of authentication based on cascading identification of "voice-face" includes
the following steps: the first - by voice message; the second - on the geometry of the face. Therefore,
performance of the second step is possible only on condition of successful identification of the first.
The use of face identification systems by voice and facial geometry is the most user-friendly method of
authentication, which is based on individual physiological features of the speech apparatus and the
shape of the human face. The peculiarity of the application of the selected methods of biometric
identification is the computer training of voice classifiers and face primitives of users with increased
training sample of target standards, which are stored in the database and taking into account
physiological features of the person, namely: different volume levels etc.</p>
      <p>The generalized scheme of multimodal biometric identification of ITS users is given in fig. 1
Step 1.1. Normalization of the input voice signal. To remove fragments that do not contain a voice
imprint, the input speech signal passes through a voice activity detector. The result of such an operation
is the selection of a fragment of the voice, reducing computational complexity by eliminating the
calculation of fragments of the speech signal that do not contain a voice imprint.</p>
      <sec id="sec-3-1">
        <title>Locking access</title>
      </sec>
      <sec id="sec-3-2">
        <title>User</title>
        <p>Sample (200-500
standards
one face)</p>
      </sec>
      <sec id="sec-3-3">
        <title>Authorized user</title>
      </sec>
      <sec id="sec-3-4">
        <title>Cascade № 1</title>
      </sec>
      <sec id="sec-3-5">
        <title>System identification for vocal message</title>
      </sec>
      <sec id="sec-3-6">
        <title>System identification for geometry face</title>
      </sec>
      <sec id="sec-3-7">
        <title>Cascade № 2</title>
      </sec>
      <sec id="sec-3-8">
        <title>Unauthorized user Sample (200-500 standards one vote)</title>
      </sec>
      <sec id="sec-3-9">
        <title>Granting access</title>
      </sec>
      <sec id="sec-3-10">
        <title>Locking access</title>
        <p>Consider in detail each of the cascades (steps of the method).</p>
        <p>Stage 1. Identification by voice message. A detailed scheme of identification by voice message is
given in Fig. 2.</p>
        <p>Step 1.2. Selection of characteristic features of the voice. The value of the amplitude of the speech signal
 , which are outside the range: ∉ [ ( ) − 3 ⋅  ;  ( ) + 3 ⋅  ] (the rule of "three sigma"), are considered
as a voice imprint, the rest - as fragments of noise. The speech signal is divided into equal frames of
duration (ms), each value of the amplitude of which is estimated according to the rule of "three sigma".</p>
        <p>A temporary array of values of logical type is created for each frame:
= {

(1),  ∉ [ ( ) − 3 ⋅  ;  ( ) + 3 ⋅  ];
(0),  ∈ [ ( ) − 3 ⋅  ;  ( ) + 3 ⋅  ].
(1)</p>
        <p>Then the calculation is performed  "1" – the probability of an element with a value  (1) та
 "0" – the probability of occurrence of the value  (0). Probabilities are calculated by finding the
ratio of the number of occurrences of elements with a value  (1) or  (0) relative to the total
number of values in the array.</p>
        <p>Provided that value  "1" less than some threshold value  , it is believed that this fragment contains a
voice, otherwise - noise or silence.</p>
        <p>Parameter  is interpreted as follows: if 65% of the values of the amplitude of the speech signal in the
fragment ( = 0,65) are outside the range [ ( ) − 3 ⋅  ;  ( ) + 3 ⋅  ], the current snippet contains a
voice, otherwise noise or silence.</p>
        <p>Providing language</p>
        <p>signal</p>
      </sec>
      <sec id="sec-3-11">
        <title>Previous signal processing</title>
      </sec>
      <sec id="sec-3-12">
        <title>Getting the vector sings of voice imprint</title>
      </sec>
      <sec id="sec-3-13">
        <title>Target database voice standards</title>
      </sec>
      <sec id="sec-3-14">
        <title>Providing a reference vector of features</title>
      </sec>
      <sec id="sec-3-15">
        <title>Comparison of vector features of voice imprint with reference</title>
      </sec>
      <sec id="sec-3-16">
        <title>Detection and UAA blocking No</title>
      </sec>
      <sec id="sec-3-17">
        <title>Vectors coincide? Yes</title>
      </sec>
      <sec id="sec-3-18">
        <title>Activation of the identification system by facial geometry</title>
        <p>Step 1.3. Comparison of the voice imprint with the reference ones contained in the database. The voice
imprint is presented as a sequence of feature vectors, each of which describes the characteristics of the speech
signal interval. The sequence of vectors is used to build a model of the voice standard of the ITS user. The main
parameter used to identify the user is the similarity of the two sound fragments (input voice imprint and the
target voice standard contained in the database).</p>
        <p>In the authorization mode, the user provides an identifier in the form of a voice message, while the access
control system analyzes this voice print, compares it with the target voice standard, identifies the person by
voice.</p>
        <p>
          If the user is successfully identified, the access control system activates the next stage of the identification
system, in particular, the facial geometry [
          <xref ref-type="bibr" rid="ref11">11, 12</xref>
          ]. We will describe the process of facial recognition by this
method of identification.
        </p>
        <p>Stage 2. Identification by facial geometry.</p>
        <p>Step 2.1. Detection and localization of facial geometry in the image of the video stream. In this article,
the Viola-Jones algorithm is used to search for the shape (geometry) of the face in the image of video
surveillance systems. The chosen algorithm is the best solution, compared to other algorithms, in terms of
efficiency and efficiency of face recognition.</p>
        <p>When using this method, the video image is presented in an integrated form (matrix of values of total
brightness) to increase the efficiency of analytical calculations and calculations. Each element of this matrix
stores the value of the sum of the pixel intensities that geometrically delineate the object on the left and top.
The identification scheme is given in Fig. 3.</p>
        <p>The elements of the integrated representation are calculated by the formula:</p>
        <p>( ,  ) = ∑ ≤=0 ∑ ≤=0  ( ,  ),
where,  ( ,  ) – the value of the brightness of the pixel in the image.</p>
        <p>Each item  ( ,  ) corresponds to the sum of pixels that are in a certain rectangle. The video image
on which the object is searched is presented in the form of a two-dimensional matrix with a dimension
( ,  ), each pixel of which takes values for a monochrome image and for a color image format
RGB – [0; 2553]. The search is performed in the active area of the image with rectangular features
(description of the user and his facial geometry):</p>
        <p>= {( ,  ), ( , ℎ),  },
where, ( ,  ) – coordinates of the center of the rectangle;
 , ℎ – width and height of the rectangle, respectively;
 – the angle of the rectangle relative to the vertical axis of the image.
(3)
(4)</p>
      </sec>
      <sec id="sec-3-19">
        <title>Search for facial geometry</title>
      </sec>
      <sec id="sec-3-20">
        <title>Search for facial geometry</title>
      </sec>
      <sec id="sec-3-21">
        <title>Obtaining signs (primitives) of the face</title>
      </sec>
      <sec id="sec-3-22">
        <title>Obtaining signs (primitives) of the face Providing a video frame image</title>
      </sec>
      <sec id="sec-3-23">
        <title>Formation halftone image</title>
      </sec>
      <sec id="sec-3-24">
        <title>Database reference features</title>
      </sec>
      <sec id="sec-3-25">
        <title>Providing a video frame image</title>
      </sec>
      <sec id="sec-3-26">
        <title>Formation halftone image</title>
      </sec>
      <sec id="sec-3-27">
        <title>Reduction the number of signs and their comparison with reference</title>
      </sec>
      <sec id="sec-3-28">
        <title>Detection and UAA blocking No Yes</title>
      </sec>
      <sec id="sec-3-29">
        <title>Signs</title>
        <p>coincide</p>
      </sec>
      <sec id="sec-3-30">
        <title>Granting access to OIA and/or ITS</title>
        <p>Step 2.2. Normalize the image by scale (brightness, etc.).</p>
        <p>Step 2.3. Calculation of a set of basic features (characteristics) of the image. All Haara primitives
come to the classifier input and are processed with some boost. In order to achieve the appropriate
efficiency of the algorithm and the reliable operation of the identification system for facial geometry [12],
an intellectual training of the classifier using neural networks, which solves the problem of classification
of objects by features?</p>
        <p>Step 2.4. Comparison of the calculated features with the reference ones contained in the database.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Experiment, Results and Discussions</title>
      <p>The biometric characteristics of the authors of the article are selected as initial data. Authorized is user
№ 1, the standards of voice imprint and facial geometry are given in Fig. 4. Verification of the proposed
method was carried out using the specialized software developed by the authors on voice signals (Fig.
5) and monochrome video images (Fig. 6), obtained using a security camera Infinity SR-DN530SD
with a resolution of 800x600 pixels.</p>
      <p>a)
Figure 4. Biometric user standards № 1
a – voice message; b – facial geometry</p>
      <p>The results of verification of the proposed method, in particular the identification of users by voice
message are presented in Fig. 5 and in table 1, and the geometry of the face - in fig. 6 and in table. 2.
c)
Figure 5 Spectrograms of voice messages:
user № 1 (а – normal voice; b – hoarse voice; c – in the presence of noise);
user № 2 (d – normal voice; f – hoarse voice; g – in the presence of noise)</p>
      <p>As a result of application of the offered method authentication for the user № 1 is successful, and
for another access f is blocked.</p>
      <p>The efficiency of the access control system based on voice and face recognition of the analogue
(prototype) is  а(п)( ) =0.75 for  =10, where  – number of authorized users. As the number of users
increases, the efficiency of such a system decreases exponentially. Accordingly, for the multimodal
system proposed in the article, the results of operational efficiency are obtained  м( ) (fig. 7).
Figure 7 The effectiveness of access control systems:
cascade identification method - 1; prototype (analogue) - 2</p>
    </sec>
    <sec id="sec-5">
      <title>4. Conclusions</title>
      <p>The article solves the current scientific and practical problem, which is to reduce the risk of successful
implementation of the UAA violator to the ITS network by increasing the methods of biometric
identification (by voice recognition and facial geometry) and cascading application of identification
systems that implement them [13].</p>
      <p>From the analysis of the obtained results, it follows that in comparison with the existing [14] the
developed method provides increase of efficiency of functioning of identification system (level of ITS
protection and prevention of successful implementation by the violator of UAA mode of access to them)
by 15–30% by increasing training sample physiological features of the user's condition and cascade
application of biometric user identification systems.</p>
      <p>The method of multimodal biometric identification of users of the ITS network should be used for the
effective operation of systems in special conditions in the interests of counteracting the implementation
of UAA by the violator of the access regime and the lack of means of user identification.</p>
    </sec>
    <sec id="sec-6">
      <title>5. References</title>
      <p>[12] V. Trysnyuk, O. Demydenko, K. Smetanin, A. Zozulia [2020] Improvement of the complex
evaluation method of vital activity risks. Geoinformatics - XIXth International Conference
"Geoinformatics: Theoretical and Applied Aspects", 17605.
[13] A. B. J. Teoh, A. Goh, and D. C. L. Ngo, "Random Multispace Quantization as an Analytic
Mechanism for BioHashing of Biometric and Random Identity Inputs, " Pattern Analysis and
Machine Intelligence, IEEE Transactions on, vol. 28, pp. 1892—1901, 2006
[14] A. A. Ignatovych, Methods of increasing the efficiency of security components of computer
systems using masking elements of text and biometric data (Computer systems and
components), Ph.D. thesis, Lviv Polytechnic National University, Lviv Ukraine, 2016.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Nechyporenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Ya. V.</given-names>
            <surname>Korpan</surname>
          </string-name>
          ,
          <article-title>Biometric identification and authentication of a person by facial geometry</article-title>
          , in: Visnyk of Khmelnitsky National University,
          <source>technical sciences (4)</source>
          , Khmelnitsky Ukraine,
          <year>2016</year>
          . pp.
          <fpage>133</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L. G.</given-names>
            <surname>Koval</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Zlepko</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>M Novitsky, Methods and technologies of biometric identification based on the results of literature sources</article-title>
          , in: Scientific notes of Taurida National V.I. Vernadsky University, series:
          <source>technical sciences,</source>
          volume
          <volume>30</volume>
          (
          <issue>69</issue>
          )
          <string-name>
            <surname>Ch</surname>
          </string-name>
          .
          <volume>1</volume>
          №
          <issue>2</issue>
          ,
          <string-name>
            <given-names>Kyiv</given-names>
            <surname>Ukraine</surname>
          </string-name>
          ,
          <year>2019</year>
          , pp.
          <fpage>104</fpage>
          -
          <lpage>112</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Bidyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bondarchuk</surname>
          </string-name>
          ,
          <article-title>Modern methods of biometric identification, in: Legal, normative and metrological support of the information protection system in Ukraine</article-title>
          , volume
          <volume>1</volume>
          (
          <issue>18</issue>
          ),
          <year>2009</year>
          . pp.
          <fpage>137</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N</given-names>
            <surname>Divyarajsinh Parmar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Brijesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. G.</given-names>
            <surname>Mehta</surname>
          </string-name>
          ,
          <source>Face Recognition Methods &amp; Applications, in: Int. J. Computer Technology &amp; Applications</source>
          . volume
          <volume>4</volume>
          (
          <issue>1</issue>
          ),
          <source>Wadhwan city India</source>
          ,
          <year>2015</year>
          . pp.
          <fpage>84</fpage>
          -
          <lpage>86</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Aleksandrovich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Erokhin</surname>
          </string-name>
          ,
          <article-title>Research of models and methods of biometric control of attendance, in: Information systems</article-title>
          . volume
          <volume>6</volume>
          (
          <issue>122</issue>
          ),
          <year>2014</year>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>162</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Nemkova</surname>
          </string-name>
          ,
          <article-title>Biometric identification in cyberspace</article-title>
          ,
          <source>in: Information processing systems, issue</source>
          <volume>7</volume>
          (
          <issue>132</issue>
          ), Kharkiv Ukraine,
          <year>2015</year>
          . pp.
          <fpage>118</fpage>
          -
          <lpage>121</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Yu</surname>
            .
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Kumchenko</surname>
          </string-name>
          <article-title>Information technology of personnel identification on the basis of a complex of biometric parameters</article-title>
          (
          <source>technical sciences)</source>
          ,
          <source>Ph.D. thesis</source>
          ,
          <year>2017</year>
          , 143 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>DianaVan</given-names>
            <surname>Lancker</surname>
          </string-name>
          , JodyKreiman, Karen Emmorey,
          <article-title>Familiar voice recognition: patterns and parameters Part I: Recognition of backward voices</article-title>
          , in: Phonetics Laboratory, Department of Linguistics, University of California at Los Angeles, Los Angeles. California 90024,
          <string-name>
            <surname>U.S.A.</surname>
          </string-name>
          ,
          <year>2019</year>
          URL: https://doi.org/10.1016/S0095-
          <volume>4470</volume>
          (
          <issue>19</issue>
          )
          <fpage>30723</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Trysnyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nagornyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Smetanin</surname>
          </string-name>
          , I. Humeniuk,
          <string-name>
            <given-names>T.</given-names>
            <surname>Uvarova</surname>
          </string-name>
          ,
          <article-title>A Method for user authenticating to critical infrastructure objects based on voice message identification</article-title>
          ,
          <source>in: Modern information systems, science. Magazine, National Technical University "Kharkiv Polytechnic Institute"</source>
          , Kharkiv Ukraine,
          <year>2020</year>
          , volume
          <volume>4</volume>
          (
          <issue>3</issue>
          ) pp.
          <fpage>11</fpage>
          -
          <lpage>16</lpage>
          . doi: https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2020</year>
          .
          <volume>3</volume>
          .02.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Boychenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Humeniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. V.</given-names>
            <surname>Smetanin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Nekrilov</surname>
          </string-name>
          ,
          <article-title>Method of blocking access to information and telecommunication systems based on biometric identification / user authentication</article-title>
          , in: Technical Engineering: Science. View, Zhytomyr Polytechnic State University, Zhytomyr Ukraine,
          <year>2020</year>
          . Volume
          <volume>1</volume>
          (
          <issue>85</issue>
          ). pp.
          <fpage>171</fpage>
          -
          <lpage>176</lpage>
          . doi: https:// doi.org/10.26642/ten-2020-
          <volume>1</volume>
          (
          <issue>85</issue>
          )
          <string-name>
            <surname>-</surname>
          </string-name>
          171-176.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>V. G.</surname>
          </string-name>
          <article-title>Babenko Methodology of synthesis of information transformation operations for computer cryptography (Computer systems</article-title>
          and components),
          <source>Dr.Sc. thesis</source>
          , Cherkasy State Technological University, Cherkasy, Ukraine,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>