<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2019-4-2-0-8</article-id><article-id pub-id-type="publisher-id">1705</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>USE OF RANDOM BIOMETRIC IMAGES FOR GENERATING CRYPTO-RESISTANT SEQUENCES USING GENERATIVE-COMPETITIVE NEURAL NETWORKS</article-title><trans-title-group xml:lang="en"><trans-title>USE OF RANDOM BIOMETRIC IMAGES FOR GENERATING CRYPTO-RESISTANT SEQUENCES USING GENERATIVE-COMPETITIVE NEURAL NETWORKS</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Goncharenko</surname><given-names>Julia Юрьевна</given-names></name><name xml:lang="en"><surname>Goncharenko</surname><given-names>Julia</given-names></name></name-alternatives><email>iuliay1985@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Nesterenko</surname><given-names>Vladimir Romanovich</given-names></name><name xml:lang="en"><surname>Nesterenko</surname><given-names>Vladimir Romanovich</given-names></name></name-alternatives><email>closetonowhere@protonmail.com</email></contrib></contrib-group><pub-date pub-type="epub"><year>2019</year></pub-date><volume>4</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2019/2/ИТ_8.pdf" /><abstract xml:lang="ru"><p>This article discusses the prospects, technologies and methods of using biometric data in cryptosystems. A method of using random biometric data for generating 256-bit sequences is also proposed.</p></abstract><trans-abstract xml:lang="en"><p>This article discusses the prospects, technologies and methods of using biometric data in cryptosystems. A method of using random biometric data for generating 256-bit sequences is also proposed.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>biometric image</kwd><kwd>generative-competitive neural networks</kwd><kwd>artificial neural networks</kwd><kwd>cryptography</kwd></kwd-group><kwd-group xml:lang="en"><kwd>biometric image</kwd><kwd>generative-competitive neural networks</kwd><kwd>artificial neural networks</kwd><kwd>cryptography</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Uludag U., Pankanti S., Prabhakar S. and Jain A.K. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE, 2004. &amp;ndash; Vol. 92, № 6. &amp;ndash; Р. 948&amp;ndash;960.</mixed-citation></ref><ref id="B2"><mixed-citation>Style-based GANs &amp;ndash; Generating and Tuning Realistic Artificial Faces, 2018, URL: https://www.lyrn.ai/2018/12/26/a-style-based-generator-architecture-for-generative-adversarial-networks/ (handling date: 13.02.2019).</mixed-citation></ref><ref id="B3"><mixed-citation>Druki А. Search, selection and face recognition system for images. Izvestiya TPU. №5, 2011.</mixed-citation></ref><ref id="B4"><mixed-citation>Dodis Y., Reyzin L., Smith A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. April 13, 2004.</mixed-citation></ref><ref id="B5"><mixed-citation>GOST R 52633-2006 &amp;quot;Information protection. Information security technology. Requirements for highly reliable biometric authentication&amp;quot; URL: http://docs.cntd.ru/document/1200048922 (handling date: 21.02.2019).</mixed-citation></ref><ref id="B6"><mixed-citation>Goncharov S. M., Borshevnikov A. E. Construction of a neural network Converter &amp;quot;Biometrics access code&amp;quot; based on the parameters of the visual evoked potential of the electroencephalogram. Doklady TUSUR. №2&amp;nbsp;(32), 2014.</mixed-citation></ref></ref-list></back></article>