V. Barannik, S. Podlesny, A. Krasnorutskyi, A. Musienko, Viktoria Himenko
{"title":"The ensuring the integrity of information streams under the cyberattacks action","authors":"V. Barannik, S. Podlesny, A. Krasnorutskyi, A. Musienko, Viktoria Himenko","doi":"10.1109/EWDTS.2016.7807752","DOIUrl":null,"url":null,"abstract":"Problem of providing information security of video information resource in aerial surveillance systems and video conferencing is considered. Procedure for creating code by using the structural coding technology is represented. The dependence of the distribution error on column component values from its position in the code during restoration of transform is shown. The method for encoding technology for the structural code formation is proposed. The threat of data integrity reduces also. The method for detecting and eliminating single bit errors for transform's significant component is proposed.","PeriodicalId":364686,"journal":{"name":"2016 IEEE East-West Design & Test Symposium (EWDTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE East-West Design & Test Symposium (EWDTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EWDTS.2016.7807752","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
Problem of providing information security of video information resource in aerial surveillance systems and video conferencing is considered. Procedure for creating code by using the structural coding technology is represented. The dependence of the distribution error on column component values from its position in the code during restoration of transform is shown. The method for encoding technology for the structural code formation is proposed. The threat of data integrity reduces also. The method for detecting and eliminating single bit errors for transform's significant component is proposed.