首页 > 最新文献

2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)最新文献

英文 中文
Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource 提高视频信息资源可用性的显著微段变换编码方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349256
V. Barannik, Yu. G. Babenko, O. Kulitsa, V. Barannik, Andriy Khimenko, O. Matviichuk-Yudina
The presence of an imbalance caused by an insufficient level of performance of modern and promising infocommunication technologies with respect to the information intensity of bit streams is shown. It is substantiated that a decrease in the level of imbalance is organized as a result of an increase in the efficiency of information processing technologies. It is substantiated that at the moment the JPEG platform is the basic concept for the construction of compression representation technologies. Accordingly, it is proposed to organize the further development of methods for processing video resources using individual components of the JPEG platform in the direction of increasing the integrity of information while ensuring the required level of its availability. The development of the basic concept of processing segmented video frames using the core of the JPEG technology is presented, which is based on the following aspects: conditions are created for differential processing of video frame segments, taking into account their previous identification, depending on their importance from the position of maintaining the desired level of integrity of video resources; provides compatibility of segment identification processes and their processing using the JPEG platform. It is shown that the created video resource encoding methods based on the developed concept of processing significant segments provide a reduction in the information delivery time under the conditions of the required level of its integrity, i.e. an increase in the level of information security is achieved.
由于相对于比特流的信息强度的现代和有前途的信息通信技术的性能水平不足造成的不平衡的存在。事实证明,由于信息处理技术效率的提高,失衡水平的下降是有组织的。研究表明,目前JPEG平台是构建压缩表示技术的基本概念。因此,建议组织进一步开发利用JPEG平台的各个组件处理视频资源的方法,以提高信息的完整性,同时确保所需的可用性水平。提出了利用JPEG技术核心处理分段视频帧的基本概念的发展,该概念基于以下几个方面:为视频帧段的差分处理创造条件,考虑到它们之前的识别,从保持视频资源期望的完整性水平的角度出发,根据它们的重要性;提供段识别过程及其使用JPEG平台的处理的兼容性。结果表明,基于所提出的处理重要片段的概念所创建的视频资源编码方法,在保证信息完整性的前提下,减少了信息传递时间,即提高了信息安全水平。
{"title":"Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource","authors":"V. Barannik, Yu. G. Babenko, O. Kulitsa, V. Barannik, Andriy Khimenko, O. Matviichuk-Yudina","doi":"10.1109/ATIT50783.2020.9349256","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349256","url":null,"abstract":"The presence of an imbalance caused by an insufficient level of performance of modern and promising infocommunication technologies with respect to the information intensity of bit streams is shown. It is substantiated that a decrease in the level of imbalance is organized as a result of an increase in the efficiency of information processing technologies. It is substantiated that at the moment the JPEG platform is the basic concept for the construction of compression representation technologies. Accordingly, it is proposed to organize the further development of methods for processing video resources using individual components of the JPEG platform in the direction of increasing the integrity of information while ensuring the required level of its availability. The development of the basic concept of processing segmented video frames using the core of the JPEG technology is presented, which is based on the following aspects: conditions are created for differential processing of video frame segments, taking into account their previous identification, depending on their importance from the position of maintaining the desired level of integrity of video resources; provides compatibility of segment identification processes and their processing using the JPEG platform. It is shown that the created video resource encoding methods based on the developed concept of processing significant segments provide a reduction in the information delivery time under the conditions of the required level of its integrity, i.e. an increase in the level of information security is achieved.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Counteraction to Strategic Manipulations on Actors’ Decision Making in Social Networking Services 社交网络服务中策略操纵对行为者决策的反作用
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349347
K. Molodetska
Today, social networking services have become a source of manipulation of public opinion. Of particular importance for influencing on social and political processes in the country are the variety of surveys, which have conducted in social networking services. The results of such surveys are used for further decision-making by the actors in the real life. The publication applies the Arrow’s paradox to formalise the processes of conducting surveys in social internet services. Also, the requirements for actor surveys have formulated to reflect public opinion adequately. As a result of the research, measures to counteract strategic manipulations in social networking services have justified. The obtained results can be useful to improve the information security of social networking services.
今天,社交网络服务已经成为操纵舆论的来源。在社会网络服务中进行的各种调查对影响该国的社会和政治进程具有特别重要的意义。这些调查的结果被现实生活中的演员用于进一步的决策。该出版物将阿罗悖论应用于在社交网络服务中进行调查的过程。此外,还制定了充分反映民意的行为者调查要求。作为研究的结果,在社交网络服务中抵制战略操纵的措施是合理的。所得结果对提高社交网络服务的信息安全具有一定的参考价值。
{"title":"Counteraction to Strategic Manipulations on Actors’ Decision Making in Social Networking Services","authors":"K. Molodetska","doi":"10.1109/ATIT50783.2020.9349347","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349347","url":null,"abstract":"Today, social networking services have become a source of manipulation of public opinion. Of particular importance for influencing on social and political processes in the country are the variety of surveys, which have conducted in social networking services. The results of such surveys are used for further decision-making by the actors in the real life. The publication applies the Arrow’s paradox to formalise the processes of conducting surveys in social internet services. Also, the requirements for actor surveys have formulated to reflect public opinion adequately. As a result of the research, measures to counteract strategic manipulations in social networking services have justified. The obtained results can be useful to improve the information security of social networking services.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116472248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series 视频容器序列信息无视觉失真的间接隐写编码方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349262
Yu. M. Ryabukha, N. Barannik
A method of an indirect steganographic embedding is proposed, which allows to ensure the security of information resources based on the use of structural-combinatorial redundancy of the video container. Within the method, the embedding of information is performed simultaneously in the space-time domain of the video resource, as well as in spectral space and spectral-time space.
提出了一种间接隐写嵌入方法,利用视频容器的结构-组合冗余来保证信息资源的安全性。该方法在视频资源的时空域、频谱空间和频谱时间空间同时进行信息嵌入。
{"title":"Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series","authors":"Yu. M. Ryabukha, N. Barannik","doi":"10.1109/ATIT50783.2020.9349262","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349262","url":null,"abstract":"A method of an indirect steganographic embedding is proposed, which allows to ensure the security of information resources based on the use of structural-combinatorial redundancy of the video container. Within the method, the embedding of information is performed simultaneously in the space-time domain of the video resource, as well as in spectral space and spectral-time space.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of an All-Based Method Using Blockchain Technologies and Cuda Technologies 使用区块链技术和Cuda技术开发全基础方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349345
T. Domkiv, A. Dudnik, N. Dakhno, V. Kvasnikov, Olexander Trush, Serhii Dorozhynskyi
The article presents a method of using parallel computing technology using CUDA technology and blockchain to recover the key(s) of an encrypted PDF file. The analysis and comparison of the speed of calculations using the graphic processor (GPU) and central processing unit (CPU). Testing the implemented method. A statistical analysis of the results of experimental studies is presented.
本文介绍了一种利用CUDA技术和区块链的并行计算技术来恢复加密PDF文件的密钥的方法。使用图形处理器(GPU)和中央处理器(CPU)计算速度的分析和比较。测试实现的方法。对实验研究结果进行了统计分析。
{"title":"Development of an All-Based Method Using Blockchain Technologies and Cuda Technologies","authors":"T. Domkiv, A. Dudnik, N. Dakhno, V. Kvasnikov, Olexander Trush, Serhii Dorozhynskyi","doi":"10.1109/ATIT50783.2020.9349345","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349345","url":null,"abstract":"The article presents a method of using parallel computing technology using CUDA technology and blockchain to recover the key(s) of an encrypted PDF file. The analysis and comparison of the speed of calculations using the graphic processor (GPU) and central processing unit (CPU). Testing the implemented method. A statistical analysis of the results of experimental studies is presented.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face recognition systems based on Neural Compute Stick 2, CPU, GPU comparison 基于神经计算棒的人脸识别系统2,CPU, GPU的比较
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349313
O. Aleksandrova, Y. Bashkov
The most common approaches to face recognition are considered, the latest developments in this area are analyzed, an experiment is carried out on a face recognition system on the Neural Compute Stick 2, the conditions for its necessity are substantiated. The system also was tested on CPU and GPU, as well as system models separately to determine the conditions for increasing performance. The main result is the determination of the need for Neural Compute Stick 2 on personal computers, as well as the optimal conditions for the performance of the face recognition system. The need to use the Neural Compute Stick 2 only for low-performance devices is revealed. The tasks of further research are defined.
分析了人脸识别的常用方法,分析了该领域的最新进展,并在神经计算棒2上对人脸识别系统进行了实验,证明了人脸识别系统的必要性。系统还分别在CPU和GPU以及系统模型上进行了测试,以确定提高性能的条件。主要结果是确定个人计算机对神经计算棒2的需求,以及人脸识别系统性能的最佳条件。需要使用神经计算棒2仅为低性能的设备显示。明确了进一步研究的任务。
{"title":"Face recognition systems based on Neural Compute Stick 2, CPU, GPU comparison","authors":"O. Aleksandrova, Y. Bashkov","doi":"10.1109/ATIT50783.2020.9349313","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349313","url":null,"abstract":"The most common approaches to face recognition are considered, the latest developments in this area are analyzed, an experiment is carried out on a face recognition system on the Neural Compute Stick 2, the conditions for its necessity are substantiated. The system also was tested on CPU and GPU, as well as system models separately to determine the conditions for increasing performance. The main result is the determination of the need for Neural Compute Stick 2 on personal computers, as well as the optimal conditions for the performance of the face recognition system. The need to use the Neural Compute Stick 2 only for low-performance devices is revealed. The tasks of further research are defined.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129278221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Marginal Utility Approach for Quality of Service Evaluation in IT infrastructure IT基础设施服务质量评价的边际效用方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349352
O. Rolik, Kolesnik Valerii
IT-services are corner stones of any computing IT-infrastructures. In order to make them working properly their quality should be evaluated, measured and controlled. A lot of researches were conducted on quality of service evaluation, and many approaches were discovered. However, there is still need for connecting user satisfaction as subjective parameter with objective parameters or key performance indicators.Possible way for connecting those characteristics is to use marginal utility function in order to define direct dependency between quality of experience and quality of service. This kind of solution was proposed in this research.
it服务是任何计算it基础设施的基石。为了使其正常工作,必须对其质量进行评价、测量和控制。对服务质量评价进行了大量的研究,发现了许多方法。但是,仍然需要将用户满意度作为主观参数与客观参数或关键绩效指标联系起来。连接这些特征的可能方法是使用边际效用函数来定义体验质量和服务质量之间的直接依赖关系。本研究提出了这种解决方案。
{"title":"Marginal Utility Approach for Quality of Service Evaluation in IT infrastructure","authors":"O. Rolik, Kolesnik Valerii","doi":"10.1109/ATIT50783.2020.9349352","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349352","url":null,"abstract":"IT-services are corner stones of any computing IT-infrastructures. In order to make them working properly their quality should be evaluated, measured and controlled. A lot of researches were conducted on quality of service evaluation, and many approaches were discovered. However, there is still need for connecting user satisfaction as subjective parameter with objective parameters or key performance indicators.Possible way for connecting those characteristics is to use marginal utility function in order to define direct dependency between quality of experience and quality of service. This kind of solution was proposed in this research.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FDTD and FEM Simulation of Microwave Waveguide Polarizers 微波波导偏振器的FDTD和FEM仿真
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349339
S. Piltyay, A. Bulashenko, Yevhenii Herhil, O. Bulashenko
This paper presents results of comparison of modern effective numerical techniques for the calculation of microwave devices. Nowadays finite difference time domain method and finite elements method are the most frequently used numerical techniques, which are applied for the simulation of electromagnetic fields in various antennas and bounded structures. Modern modifications of these numerical methods and their pro and contras are considered in the paper. Besides, we have compared finite difference time domain technique and finite elements method in the case of calculation of polarization and matching characteristics of microwave waveguide iris polarizers. Using this example we have found that the convergence of the calculated matching characteristics of microwave waveguide devices is fast for both considered numerical techniques. On the other hand, the accuracy of calculation of the phase and polarization characteristics is very sensitive to the number of mesh cells, at which the volume of device structure is divided. It has been found that more than 100 000 tetrahedral mesh cells per structure volume must be used, if calculation of the polarizer’s axial ratio and crosspolar discrimination is performed by finite elements method in the frequency domain with required accuracies of 0.5 dB. If axial ratio and crosspolar discrimination must be calculated with the accuracies of 0.5 dB by the finite difference time domain method, then the utilization of more than 800 000 hexahedral mesh cells per structure volume is required. In has been found that the computation time of the finite elements method in the frequency domain is more than 2 times less than the same time required by finite difference time domain method. Besides, the corresponding number of tetrahedral mesh cells in finite elements method is 10 times less, than the number of hexahedral mesh cells in finite difference time domain method.
本文介绍了用于微波器件计算的现代有效数值技术的比较结果。时域有限差分法和有限元法是目前最常用的数值方法,可用于各种天线和有界结构的电磁场模拟。本文讨论了这些数值方法的现代修正及其优缺点。此外,我们还比较了时域有限差分法和有限元法在计算微波波导虹膜偏振及匹配特性方面的应用。通过这个例子,我们发现两种计算方法计算的微波波导器件匹配特性的收敛速度都很快。另一方面,相位和极化特性的计算精度对用于划分器件结构体积的网格单元数非常敏感。研究发现,如果在频域用有限元法计算偏光镜的轴比和交叉极化识别,要求精度为0.5 dB,则每个结构体积必须使用10万个以上的四面体网格单元。如果采用时域有限差分法计算轴向比和交叉极化分辨精度为0.5 dB,则需要在每个结构体积上使用80万个以上的六面体网格单元。研究发现,有限元法在频域的计算时间比时域有限差分法所需的计算时间少2倍以上。此外,有限元法所对应的四面体网格单元数比时域有限差分法所对应的六面体网格单元数少10倍。
{"title":"FDTD and FEM Simulation of Microwave Waveguide Polarizers","authors":"S. Piltyay, A. Bulashenko, Yevhenii Herhil, O. Bulashenko","doi":"10.1109/ATIT50783.2020.9349339","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349339","url":null,"abstract":"This paper presents results of comparison of modern effective numerical techniques for the calculation of microwave devices. Nowadays finite difference time domain method and finite elements method are the most frequently used numerical techniques, which are applied for the simulation of electromagnetic fields in various antennas and bounded structures. Modern modifications of these numerical methods and their pro and contras are considered in the paper. Besides, we have compared finite difference time domain technique and finite elements method in the case of calculation of polarization and matching characteristics of microwave waveguide iris polarizers. Using this example we have found that the convergence of the calculated matching characteristics of microwave waveguide devices is fast for both considered numerical techniques. On the other hand, the accuracy of calculation of the phase and polarization characteristics is very sensitive to the number of mesh cells, at which the volume of device structure is divided. It has been found that more than 100 000 tetrahedral mesh cells per structure volume must be used, if calculation of the polarizer’s axial ratio and crosspolar discrimination is performed by finite elements method in the frequency domain with required accuracies of 0.5 dB. If axial ratio and crosspolar discrimination must be calculated with the accuracies of 0.5 dB by the finite difference time domain method, then the utilization of more than 800 000 hexahedral mesh cells per structure volume is required. In has been found that the computation time of the finite elements method in the frequency domain is more than 2 times less than the same time required by finite difference time domain method. Besides, the corresponding number of tetrahedral mesh cells in finite elements method is 10 times less, than the number of hexahedral mesh cells in finite difference time domain method.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A Method to Ranking Reliability of Sensors of Multisensor System: Interval-Valued Number Case 多传感器系统中传感器可靠性排序的一种方法:区间数情况
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349318
M. Popov, Alpert Sofiia, Alpert Maksym, O. Zaitsev, Ruslana G. Stambirska
A method to ranking information reliability of sensors of multisensor system is proposed. The case is considered when the set of data is represented by interval-valued numbers. The information reliability of any sensor is calculated based on estimates of the proximity of its data to the data of the other sensors of system. To assess the proximity three metric are applied: Wasserstein, Hausdorff-Chavent, and Euclidean ones. The numerical example is given to exemplify the application of the proposed method.
提出了一种多传感器系统中传感器信息可靠性排序方法。当数据集用区间值数字表示时,会考虑这种情况。任何传感器的信息可靠性都是基于其数据与系统中其他传感器数据的接近程度的估计来计算的。为了评估接近度,应用了三个度量:Wasserstein, Hausdorff-Chavent和欧几里得度量。最后通过数值算例说明了该方法的应用。
{"title":"A Method to Ranking Reliability of Sensors of Multisensor System: Interval-Valued Number Case","authors":"M. Popov, Alpert Sofiia, Alpert Maksym, O. Zaitsev, Ruslana G. Stambirska","doi":"10.1109/ATIT50783.2020.9349318","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349318","url":null,"abstract":"A method to ranking information reliability of sensors of multisensor system is proposed. The case is considered when the set of data is represented by interval-valued numbers. The information reliability of any sensor is calculated based on estimates of the proximity of its data to the data of the other sensors of system. To assess the proximity three metric are applied: Wasserstein, Hausdorff-Chavent, and Euclidean ones. The numerical example is given to exemplify the application of the proposed method.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124409515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technologies of Informative Security 信息安全技术
Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349253
{"title":"Technologies of Informative Security","authors":"","doi":"10.1109/atit50783.2020.9349253","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349253","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Method of Embedding Information in the Noise Domain Based on the Modification of Elements in the Pseudo-Spatial Domain 基于伪空间域元素修改的噪声域信息嵌入方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349266
N. Barannik, O. Yudin, M. Babenko, A. Bekirov, V. Manakov, Valerii Yroshenko
The article presents a steganographic method based on the selection of the noise area of the image with the subsequent transition to the pseudo-spatial area. Embedding of elements is carried out on the basis of indirect modification of elements according to the formulated rule.
本文提出了一种基于选择图像噪声区域并随后过渡到伪空间区域的隐写方法。元素的嵌入是在根据制定的规则对元素进行间接修改的基础上进行的。
{"title":"The Method of Embedding Information in the Noise Domain Based on the Modification of Elements in the Pseudo-Spatial Domain","authors":"N. Barannik, O. Yudin, M. Babenko, A. Bekirov, V. Manakov, Valerii Yroshenko","doi":"10.1109/ATIT50783.2020.9349266","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349266","url":null,"abstract":"The article presents a steganographic method based on the selection of the noise area of the image with the subsequent transition to the pseudo-spatial area. Embedding of elements is carried out on the basis of indirect modification of elements according to the formulated rule.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123302851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1