Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349256
V. Barannik, Yu. G. Babenko, O. Kulitsa, V. Barannik, Andriy Khimenko, O. Matviichuk-Yudina
The presence of an imbalance caused by an insufficient level of performance of modern and promising infocommunication technologies with respect to the information intensity of bit streams is shown. It is substantiated that a decrease in the level of imbalance is organized as a result of an increase in the efficiency of information processing technologies. It is substantiated that at the moment the JPEG platform is the basic concept for the construction of compression representation technologies. Accordingly, it is proposed to organize the further development of methods for processing video resources using individual components of the JPEG platform in the direction of increasing the integrity of information while ensuring the required level of its availability. The development of the basic concept of processing segmented video frames using the core of the JPEG technology is presented, which is based on the following aspects: conditions are created for differential processing of video frame segments, taking into account their previous identification, depending on their importance from the position of maintaining the desired level of integrity of video resources; provides compatibility of segment identification processes and their processing using the JPEG platform. It is shown that the created video resource encoding methods based on the developed concept of processing significant segments provide a reduction in the information delivery time under the conditions of the required level of its integrity, i.e. an increase in the level of information security is achieved.
{"title":"Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource","authors":"V. Barannik, Yu. G. Babenko, O. Kulitsa, V. Barannik, Andriy Khimenko, O. Matviichuk-Yudina","doi":"10.1109/ATIT50783.2020.9349256","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349256","url":null,"abstract":"The presence of an imbalance caused by an insufficient level of performance of modern and promising infocommunication technologies with respect to the information intensity of bit streams is shown. It is substantiated that a decrease in the level of imbalance is organized as a result of an increase in the efficiency of information processing technologies. It is substantiated that at the moment the JPEG platform is the basic concept for the construction of compression representation technologies. Accordingly, it is proposed to organize the further development of methods for processing video resources using individual components of the JPEG platform in the direction of increasing the integrity of information while ensuring the required level of its availability. The development of the basic concept of processing segmented video frames using the core of the JPEG technology is presented, which is based on the following aspects: conditions are created for differential processing of video frame segments, taking into account their previous identification, depending on their importance from the position of maintaining the desired level of integrity of video resources; provides compatibility of segment identification processes and their processing using the JPEG platform. It is shown that the created video resource encoding methods based on the developed concept of processing significant segments provide a reduction in the information delivery time under the conditions of the required level of its integrity, i.e. an increase in the level of information security is achieved.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349347
K. Molodetska
Today, social networking services have become a source of manipulation of public opinion. Of particular importance for influencing on social and political processes in the country are the variety of surveys, which have conducted in social networking services. The results of such surveys are used for further decision-making by the actors in the real life. The publication applies the Arrow’s paradox to formalise the processes of conducting surveys in social internet services. Also, the requirements for actor surveys have formulated to reflect public opinion adequately. As a result of the research, measures to counteract strategic manipulations in social networking services have justified. The obtained results can be useful to improve the information security of social networking services.
{"title":"Counteraction to Strategic Manipulations on Actors’ Decision Making in Social Networking Services","authors":"K. Molodetska","doi":"10.1109/ATIT50783.2020.9349347","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349347","url":null,"abstract":"Today, social networking services have become a source of manipulation of public opinion. Of particular importance for influencing on social and political processes in the country are the variety of surveys, which have conducted in social networking services. The results of such surveys are used for further decision-making by the actors in the real life. The publication applies the Arrow’s paradox to formalise the processes of conducting surveys in social internet services. Also, the requirements for actor surveys have formulated to reflect public opinion adequately. As a result of the research, measures to counteract strategic manipulations in social networking services have justified. The obtained results can be useful to improve the information security of social networking services.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116472248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349262
Yu. M. Ryabukha, N. Barannik
A method of an indirect steganographic embedding is proposed, which allows to ensure the security of information resources based on the use of structural-combinatorial redundancy of the video container. Within the method, the embedding of information is performed simultaneously in the space-time domain of the video resource, as well as in spectral space and spectral-time space.
{"title":"Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series","authors":"Yu. M. Ryabukha, N. Barannik","doi":"10.1109/ATIT50783.2020.9349262","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349262","url":null,"abstract":"A method of an indirect steganographic embedding is proposed, which allows to ensure the security of information resources based on the use of structural-combinatorial redundancy of the video container. Within the method, the embedding of information is performed simultaneously in the space-time domain of the video resource, as well as in spectral space and spectral-time space.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349345
T. Domkiv, A. Dudnik, N. Dakhno, V. Kvasnikov, Olexander Trush, Serhii Dorozhynskyi
The article presents a method of using parallel computing technology using CUDA technology and blockchain to recover the key(s) of an encrypted PDF file. The analysis and comparison of the speed of calculations using the graphic processor (GPU) and central processing unit (CPU). Testing the implemented method. A statistical analysis of the results of experimental studies is presented.
{"title":"Development of an All-Based Method Using Blockchain Technologies and Cuda Technologies","authors":"T. Domkiv, A. Dudnik, N. Dakhno, V. Kvasnikov, Olexander Trush, Serhii Dorozhynskyi","doi":"10.1109/ATIT50783.2020.9349345","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349345","url":null,"abstract":"The article presents a method of using parallel computing technology using CUDA technology and blockchain to recover the key(s) of an encrypted PDF file. The analysis and comparison of the speed of calculations using the graphic processor (GPU) and central processing unit (CPU). Testing the implemented method. A statistical analysis of the results of experimental studies is presented.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349313
O. Aleksandrova, Y. Bashkov
The most common approaches to face recognition are considered, the latest developments in this area are analyzed, an experiment is carried out on a face recognition system on the Neural Compute Stick 2, the conditions for its necessity are substantiated. The system also was tested on CPU and GPU, as well as system models separately to determine the conditions for increasing performance. The main result is the determination of the need for Neural Compute Stick 2 on personal computers, as well as the optimal conditions for the performance of the face recognition system. The need to use the Neural Compute Stick 2 only for low-performance devices is revealed. The tasks of further research are defined.
{"title":"Face recognition systems based on Neural Compute Stick 2, CPU, GPU comparison","authors":"O. Aleksandrova, Y. Bashkov","doi":"10.1109/ATIT50783.2020.9349313","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349313","url":null,"abstract":"The most common approaches to face recognition are considered, the latest developments in this area are analyzed, an experiment is carried out on a face recognition system on the Neural Compute Stick 2, the conditions for its necessity are substantiated. The system also was tested on CPU and GPU, as well as system models separately to determine the conditions for increasing performance. The main result is the determination of the need for Neural Compute Stick 2 on personal computers, as well as the optimal conditions for the performance of the face recognition system. The need to use the Neural Compute Stick 2 only for low-performance devices is revealed. The tasks of further research are defined.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129278221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349352
O. Rolik, Kolesnik Valerii
IT-services are corner stones of any computing IT-infrastructures. In order to make them working properly their quality should be evaluated, measured and controlled. A lot of researches were conducted on quality of service evaluation, and many approaches were discovered. However, there is still need for connecting user satisfaction as subjective parameter with objective parameters or key performance indicators.Possible way for connecting those characteristics is to use marginal utility function in order to define direct dependency between quality of experience and quality of service. This kind of solution was proposed in this research.
{"title":"Marginal Utility Approach for Quality of Service Evaluation in IT infrastructure","authors":"O. Rolik, Kolesnik Valerii","doi":"10.1109/ATIT50783.2020.9349352","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349352","url":null,"abstract":"IT-services are corner stones of any computing IT-infrastructures. In order to make them working properly their quality should be evaluated, measured and controlled. A lot of researches were conducted on quality of service evaluation, and many approaches were discovered. However, there is still need for connecting user satisfaction as subjective parameter with objective parameters or key performance indicators.Possible way for connecting those characteristics is to use marginal utility function in order to define direct dependency between quality of experience and quality of service. This kind of solution was proposed in this research.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349339
S. Piltyay, A. Bulashenko, Yevhenii Herhil, O. Bulashenko
This paper presents results of comparison of modern effective numerical techniques for the calculation of microwave devices. Nowadays finite difference time domain method and finite elements method are the most frequently used numerical techniques, which are applied for the simulation of electromagnetic fields in various antennas and bounded structures. Modern modifications of these numerical methods and their pro and contras are considered in the paper. Besides, we have compared finite difference time domain technique and finite elements method in the case of calculation of polarization and matching characteristics of microwave waveguide iris polarizers. Using this example we have found that the convergence of the calculated matching characteristics of microwave waveguide devices is fast for both considered numerical techniques. On the other hand, the accuracy of calculation of the phase and polarization characteristics is very sensitive to the number of mesh cells, at which the volume of device structure is divided. It has been found that more than 100 000 tetrahedral mesh cells per structure volume must be used, if calculation of the polarizer’s axial ratio and crosspolar discrimination is performed by finite elements method in the frequency domain with required accuracies of 0.5 dB. If axial ratio and crosspolar discrimination must be calculated with the accuracies of 0.5 dB by the finite difference time domain method, then the utilization of more than 800 000 hexahedral mesh cells per structure volume is required. In has been found that the computation time of the finite elements method in the frequency domain is more than 2 times less than the same time required by finite difference time domain method. Besides, the corresponding number of tetrahedral mesh cells in finite elements method is 10 times less, than the number of hexahedral mesh cells in finite difference time domain method.
{"title":"FDTD and FEM Simulation of Microwave Waveguide Polarizers","authors":"S. Piltyay, A. Bulashenko, Yevhenii Herhil, O. Bulashenko","doi":"10.1109/ATIT50783.2020.9349339","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349339","url":null,"abstract":"This paper presents results of comparison of modern effective numerical techniques for the calculation of microwave devices. Nowadays finite difference time domain method and finite elements method are the most frequently used numerical techniques, which are applied for the simulation of electromagnetic fields in various antennas and bounded structures. Modern modifications of these numerical methods and their pro and contras are considered in the paper. Besides, we have compared finite difference time domain technique and finite elements method in the case of calculation of polarization and matching characteristics of microwave waveguide iris polarizers. Using this example we have found that the convergence of the calculated matching characteristics of microwave waveguide devices is fast for both considered numerical techniques. On the other hand, the accuracy of calculation of the phase and polarization characteristics is very sensitive to the number of mesh cells, at which the volume of device structure is divided. It has been found that more than 100 000 tetrahedral mesh cells per structure volume must be used, if calculation of the polarizer’s axial ratio and crosspolar discrimination is performed by finite elements method in the frequency domain with required accuracies of 0.5 dB. If axial ratio and crosspolar discrimination must be calculated with the accuracies of 0.5 dB by the finite difference time domain method, then the utilization of more than 800 000 hexahedral mesh cells per structure volume is required. In has been found that the computation time of the finite elements method in the frequency domain is more than 2 times less than the same time required by finite difference time domain method. Besides, the corresponding number of tetrahedral mesh cells in finite elements method is 10 times less, than the number of hexahedral mesh cells in finite difference time domain method.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349318
M. Popov, Alpert Sofiia, Alpert Maksym, O. Zaitsev, Ruslana G. Stambirska
A method to ranking information reliability of sensors of multisensor system is proposed. The case is considered when the set of data is represented by interval-valued numbers. The information reliability of any sensor is calculated based on estimates of the proximity of its data to the data of the other sensors of system. To assess the proximity three metric are applied: Wasserstein, Hausdorff-Chavent, and Euclidean ones. The numerical example is given to exemplify the application of the proposed method.
{"title":"A Method to Ranking Reliability of Sensors of Multisensor System: Interval-Valued Number Case","authors":"M. Popov, Alpert Sofiia, Alpert Maksym, O. Zaitsev, Ruslana G. Stambirska","doi":"10.1109/ATIT50783.2020.9349318","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349318","url":null,"abstract":"A method to ranking information reliability of sensors of multisensor system is proposed. The case is considered when the set of data is represented by interval-valued numbers. The information reliability of any sensor is calculated based on estimates of the proximity of its data to the data of the other sensors of system. To assess the proximity three metric are applied: Wasserstein, Hausdorff-Chavent, and Euclidean ones. The numerical example is given to exemplify the application of the proposed method.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124409515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/atit50783.2020.9349253
{"title":"Technologies of Informative Security","authors":"","doi":"10.1109/atit50783.2020.9349253","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349253","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349266
N. Barannik, O. Yudin, M. Babenko, A. Bekirov, V. Manakov, Valerii Yroshenko
The article presents a steganographic method based on the selection of the noise area of the image with the subsequent transition to the pseudo-spatial area. Embedding of elements is carried out on the basis of indirect modification of elements according to the formulated rule.
{"title":"The Method of Embedding Information in the Noise Domain Based on the Modification of Elements in the Pseudo-Spatial Domain","authors":"N. Barannik, O. Yudin, M. Babenko, A. Bekirov, V. Manakov, Valerii Yroshenko","doi":"10.1109/ATIT50783.2020.9349266","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349266","url":null,"abstract":"The article presents a steganographic method based on the selection of the noise area of the image with the subsequent transition to the pseudo-spatial area. Embedding of elements is carried out on the basis of indirect modification of elements according to the formulated rule.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123302851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}