Identification of subjects in access control systems with the help of identification logic-temporal function as an effective method of complex information protection

Authors

  • N.V. Sachanyuk-Kavetska Vinnytsia National Technical university
  • I.O. Bondarenko Vinnytsia National Technical University

DOI:

https://doi.org/10.31649/1681-7893-2018-35-1-14-23

Keywords:

identification logic-time function, Δ-interval, polynomial, key, password

Abstract

As an identifier of the subject of access to information resources, you can use a special identification logic-time function (LTF) – the unequal difference in the user's biometric LTF characteristics, ranked by the degree of their importance. The possibility of increasing the efficiency of the protection of the access to information with the use of this special function is considered. The reliability of passwords can be greatly improved if you use some image converted to a logic-time function.

Author Biographies

N.V. Sachanyuk-Kavetska, Vinnytsia National Technical university

кандидат технічних наук, доцент, кафедра Вищої математики та кафедра Менеджменту безпеки інформаційних систем

I.O. Bondarenko, Vinnytsia National Technical University

студентка групи УБ-15б, факультет менеджменту та інформаційної безпеки

References

Smyt S. (2012). Tsyfrovaya obrabotka syhnalov. Praktycheskoe rukovodstvo dlya ynzhenerov y nauchnykh ra-botnykov; per. s anhl. A.YU. Lynovycha, S.V. Vytyazeva, Y.S. Husynskoho. Moskva: Dodéka KHKHI.

Ptitsyna L. A. (2010). Osnovni pidkhody do upravlinnya informatsiynymy potokamy biznes diyalʹnosti promyslovykh pidpryyemstv Ukrayiny. Visnyk ekonomichnoyi nauky Ukrayiny, 2, 121-124.

Rusyn B. P., Varetsʹkyy YA. YU. (2010). Biometrychna autentyfikatsiya ta kryptohrafichnyy zakhyst. Lʹviv: Kolo.

Halatenko V. A. (2008). pod red. akademyka RAN V. B. Betelyna Osnovy ynformatsyonnoy bezopasnosty: uchebnoe posobye, 4-e yzd. Moskva: Ynternet-Unyversytet Ynformatsyonnykh tekhnolohyy.

Kosheva N. A., Maznychenko N. I. (2013). Identyfikatsiya korystuvachiv informatsiyno-kompʺyuternykh system: analiz i prohnozuvannya pidkhodiv. Systemy obrobky informatsiyi, 6 (113), 215-223.

Akhramovych V. M. (2016). Identyfikatsiya y autentyfikatsiya, keruvannya dostupom. Suchas. zakhyst informatsiyi, 4, 47-51.

Hnidetsʹ T. YA. (2014). Biometriya: sylʹni ta slabki storony. Naukovyy visnyk Lʹvivsʹkoho derzhavnoho universytetu vnutrishnikh sprav, 2, 273–282.

Sachanyuk-Kavetsʹka N.V., Kozhemʺyako V.P. (2004) Elementy oko-protsesornoyi obrobky zobrazhenʹ u lohiko-chasovomu seredovyshchi. Monohrafiya. Universum-Vinnytsya.

Sachanyuk-Kavetsʹka N.V. (2017). Vyznachennya chutlyvosti identyfikatsiynoyi funktsiyi do zminy vkhidnykh kharakterystyk obrobky zobrazhenʹ dlya rozpiznavannya subʺyektiv u systemakh zakhystu informatsiyi. Reyestratsiya, zberihannya i obrob. danykh, 19, 1, 55–64.

N. Sachaniuk-Kavetsʺka, V. Kozhemiako, W. Wojcik, D. Kassymkhanova, A. Kalizhnova (2015). The use polynomials as a possible variant analytical processing on logic-time functions. Optical Fibers and Their Applications 2015 Proceedings of SPIE, 9816, Lublin, Poland.

Downloads

Abstract views: 272

Published

2019-06-14

How to Cite

[1]
N. Sachanyuk-Kavetska and I. Bondarenko, “Identification of subjects in access control systems with the help of identification logic-temporal function as an effective method of complex information protection”, Опт-ел. інф-енерг. техн., vol. 35, no. 1, pp. 14–23, Jun. 2019.

Issue

Section

OptoElectronic/Digital Methods and Systems for Image/Signal Processing

Metrics

Downloads

Download data is not yet available.