Anna Melman
YOU?
Author Swipe
Multiple embedding of watermarks into a spatial-frequency domain of images based on a genetic algorithm Open
The widespread use of digital content makes the task of protecting author’s and owner’s rights increasingly important, in particular with regard to digital images. Digital watermarking technology is an effective tool that solves many probl…
An improved video watermarking algorithm with extraction using a mobile device camera Open
The use of screen-capture-resistant digital watermarks is a promising way to store information invisibly in a video stream for later retrieval by the user using a smartphone camera. However, the development of algorithms that implement thi…
On performance of PBFT for IoT-applications with constrained devices Open
Cyber-physical systems and the Internet of things (IoT) is becoming an integral part of the digital society. The use of IoT services improves human life in many ways. Protection against cyber threats is an important aspect of the functioni…
On Performance of PBFT Blockchain Consensus Algorithm for IoT-Applications With Constrained Devices Open
Cyber-physical systems and the Internet of things (IoT) are becoming an integral part of the digital society. The use of IoT services improves human life in many ways. Protection against cyber threats is an utmost important prospect of IoT…
Embedding information into JPEG images with distortion masking in frequency domain Open
Steganography allows to ensure the confidentiality of information by organizing covert data transmission channels. However, the effectiveness of steganographic information protection directly depends on the invisibility of a secret message…
An Authorship Protection Technology for Electronic Documents Based on Image Watermarking Open
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their t…
An Authorship Protection Technology for Electronic Documents Based on Image Watermarking Open
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their t…
An adaptive algorithm for embedding information into compressed JPEG images using the QIM method Open
The widespread use of JPEG images makes them good covers for secret messages storing and transmitting. This paper proposes a new algorithm for embedding information in JPEG images based on the steganographic QIM method. The main problem of…
Study of robustness of information embedding into digital images DWT domain using QIM method against destructive effects and steganalysis Open
Steganography is one of effective solutions to ensure information confidentiality. For this purpose, secret information is embedded into a cover object, for example, a digital image. However, embedded data can be detected using steganalysi…
Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions Open
The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. This has necessitated to solve the following information security tasks in relation to multimedia data: protec…
A New Approach to Reducing the Distortion of the Digital Image Natural Model in the DCT Domain When Embedding Information According to the QIM Method Open
One of the areas of digital image processing is the steganographic embedding of additional information into them. Digital steganography methods are used to ensure the information confidentiality, as well as to track the distribution of dig…