Information modeling of the processes of sensory perception of information and user identification

2023;
: pp. 139 - 155
1
National University of Water Management and Enviromenta
2
Lviv Polytechnic National University, Ukraine

The article proposes a systematic approach to the analysis of psychological perception of information at the level of human intuitive perception. The most successful, according to the authors, methods and approaches of building information models of sensory perception of information are given. Such a systematic approach “from simple to complex and from it to generalization” made it possible to determine the features of each of the considered methods, to determine their advantages and disadvantages, and to indicate the directions of appropriate use.

The authors proposed and implemented a method of identifying computer users based on the measurement of various time delays when entering information from the computer keyboard. In order to increase the accuracy of identification, it is recommended to use the relative values of pauses before and after pressing a key to the time it is held. This approach provides a 15 % increase in recognition accuracy and reduces time and resource costs for identification.

In order to automate the process of identification of a person working at a computer for a long time, adaptation of the developed product to changing the user’s keyboard handwriting by changing the handwriting sample is provided.

Considerable attention is paid to clarifying the concepts of sign, image, meaning, meaning, which reflect the psychological aspects of information perception by a computer user

  1. Sharkovskii A. N., Kolyada S. F., Sivak A. G., Fedorenko V. V. (1989). Dynamics of one-dimensional displays. Kyiv: Nauka. 216 p.
  2. Zaiats V. M. (2000). Construction and analysis of a models of a discrete oscillatory system. Cybernetics and system analysis, 161–165.
  3. Zhang Fu; Jack Heidel (1997). Non-chaotic behavior in three-dimensional quadratic systems. Nonlinearity, 10 (5): 1289–1303. Bibcode: 1997Nonli. 10.1289F. DOI:10.1088/0951-7715/10/5/014.
  4. Zaiats V. M. (2011) Discrete models of oscillatory systems for the analysis of their dynamics. Lviv. Publishing House of the Ukrainian Academy of Printing. 284 p.
  5. Zaiats V. M., Zaiats M. M. (2005) Mathematical description of computer user recognition system. Physical- mathematical modeling and information technologies, Vol. 1, 146–152.
  6. Shalkoff R. J. (1989). Digital image processing and computer vision. New York-Chichester-Brisbane- Toronto-Singapore: John Wiley & Sons. 489 p.
  7. Fukunaga K. (1982). Introduction to the statistical theory of recognition. Science, 512 p.
  8. Gorelik A. L., Skrypnyk V. A. (1989). Recognition methods. Higher school,  232 p.
  9. Duda R., Hart P. (1972). Recognition of images and analysis of scenes. Peace, 512 p.
  10. Zaiats V. M., Shokyra G. O. (2007). Determining the priority of deterministic features when building an object recognition system. Coll. Proceedings of the Scientific and Practical Conf. “Mathematical modeling of complex systems” V. Chornovil LSINTM, 135–137.
  11. Zaiats V. M., Ivanov D. O. (2007). The architecture of event-oriented systems on the example of a handwritten text recognition system. Bulletin of Lviv Polytechnic University “Computer Engineering and Information Technologies”, No. 530, 78–83.
  12. Chalaya L. E. (2007). Comparative analysis of methods of authentication of users of computer systems by keyboard handwriting. Information processing systems, Vol. 1,  108–116.
  13. Chalaya L. E. (2007). The method of identification of users of information systems based on the multi- connected representation of keyboard handwriting. Information processing systems, Is.9 (67), 98–101.
  14. Zayats V. M., Rybytska O. M., Zayats M. M. (2019). An approach to evaluating the value and amount of information in mass service systems based on the theory of pattern recognition and fuzzy sets.. Cybernetics and System Analysis, Vol. 55, No. 4, 133–144.
  15. Mohammad S. Obaidat, Issa Traore, Isaac Woungang (2019). Biometric-Based Physical and Cybersecurity Systems. Springer International Publishing.
  16. Платонов А. В., Баклан Л. В., Крамер К. В. (2008). Використання експертних ситуативних моделей у сфері державної безпеки. Зб. праць міжнар. наукової конф. ISDMCI2008. Том 1, Євпаторія.  39–43.
  17. Ivanov V. G., Maznychenko N. I. (2009). Computer user identification based on informative handwriting. Bulletin of NTU “KhPI”, Series: Informatics and modeling, No. 13, 77–83.
  18. Zaiats V., Ivanov D. (2005). Structural method of hand-written text recognition. International Conf. “The experience of designing and application of CAD systems in microelectronics”, Lviv–Polyana, 493–494.
  19. Zayats V. M., Ivanov D. O. (2003). Handwritten text recognition system project (2003). Bulletin of Lviv Polytechnic University “Computer Engineering and Information Technologies”, No. 481, 78–83.
  20. Koval L. H., Zlepko S. M., Novitskyi H. M., Krekoten E. H. (2019). Methods and technologies of biometric identification based on the results of literary sources. Academic notes of TNU named after V. I. Vernadskyi. Series: technical sciences, 69, No. 2, 104–112.
  21. Tsarev R. Yu., Lemekha T. M. (2016). Biometric technologies: Nav. manual. Odesa: ONAZ named after O. S. Popova.
  22. Kosheva N. A., Maznychenko N. I. (2013). Identification of users of information and computer systems: analysis and forecasting approaches. Information processing systems, 113, 215–223.
  23. Gulak H. M. (2020). Methodological principles of building secure and guaranteed information systems for distance learning of higher education institutions. Mathematical machines and systems, 4, 148–162.
  24. Shestakevych T. V., Pasichnyk V. V., Kunanets N. E. (2017). Information technology support of inclusive education in Ukraine. Artificial intelligence, 2, 26–36.
  25. Antonov A. V. (1985). Information, perception and understanding. Kyiv: Nauk. opinion.
  26. Zaiats V. M., Zaiats M. M. (2016). Logical and functional programming. Tutorial. The Min. of Education and Science of Ukraine. Kamianets-Podilskyi: Ruta, 400 p.
  27. Yevetsky V., Horniychuk I. (2016). Using keyboard handwriting in user authentication systems. Information Technology and Security, Vol. 4, Iss. 1 (6), 27–33. ref. https://ela.kpi.ua/handle/123456789/21434.
  28. Zgurovsky M. Z., Pankratova N. D. (2007). System Analysis: Theory and Applications. Springer-Verlag Berlin Heidelberg. 447 p.