Search Results - "Barannik, Dmitry"
-
1
Evaluation of Effectiveness of Masking Methods of Aerial Photographs
Published in 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT) (01-07-2019)“…Discusses comparative evaluation of the most common methods of masking. Demonstrates the use of previously sound measures quantify the quality of detection and…”
Get full text
Conference Proceeding -
2
Stegano-Compression Coding in a Non-Equalible Positional Base
Published in 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) (25-11-2020)“…An approach to the construction of a stegano-compression coding in a non-equilible position base presented. The relevance of this approach to the processing of…”
Get full text
Conference Proceeding -
3
Steganographic Coding Technology for Hiding Information in Infocommunication Systems of Critical Infrastructure
Published in 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT) (15-12-2022)“…The material article is devoted to the study problem information protection based on the use of steganographic transformations. The class of methods of…”
Get full text
Conference Proceeding -
4
Technology for Protecting Video Information Resources in the Info-Communication Space
Published in 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) (25-11-2020)“…Practical aspects of realization of technology of cryptocompression representation of images are presented. The technology is based on a combination of image…”
Get full text
Conference Proceeding -
5
Indirect Steganographic Embedding Method Based on Modifications of the Basis of the Polyadic System
Published in 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET) (01-02-2020)“…Develloped a new approach of indirect steganographic embedding of data based on modifications of the basis of the polyadic system. In comparison with other…”
Get full text
Conference Proceeding -
6
The Concept Of Creating A Complex Cryptocompression Image Protection System In Infocommunications
Published in 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT) (15-12-2022)“…The concept of creating a complex image cryptocompression system is based on changing the standard compression process and integrating cryptographic…”
Get full text
Conference Proceeding -
7
The Methods of Intellectual Processing of Video Frames in Coding Systems in Progress Aeromonitor to Increase Efficiency and Semantic Integrity
Published in 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT) (15-12-2022)“…The possibility of constructing a methodology and theoretical foundations for effective coding of the contextual content of video frame segments is…”
Get full text
Conference Proceeding -
8
Quadrature Compression Technology in Two-Level Polyadic Space for Infocommunication Systems
Published in 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT) (15-12-2022)“…The article develops a method for encoding quadratures transformer wavelet transformation. To encode them, it is proposed to carry out local segmentation into…”
Get full text
Conference Proceeding -
9
Method of Selective Video Segment Processing for Intelligent Video Image Quality Enhancement Technologies
Published in 2023 IEEE 5th International Conference on Advanced Information and Communication Technologies (AICT) (21-11-2023)“…A method of video image processing based on the selection and sorting of image data segments according to their information and semantic weight is created, a…”
Get full text
Conference Proceeding -
10
Video Data Compression Coder Based on the Method of Structural Digital Image Representation
Published in 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT) (15-12-2022)“…The usage of digital images in every aspect of computer and telephone application requires new means of pictures storage, compression and restoration. Such a…”
Get full text
Conference Proceeding -
11
Method of Selective Steganographic Data Hiding Based on Graphic Containers
Published in 2022 IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET) (22-02-2022)“…An approach to the construction of a selective algorithm for steganographic information hiding based on graphic type containers is proposed. Unlike to most of…”
Get full text
Conference Proceeding -
12
Model of Steganographic System Depending on Indirect Conditional Dependencies
Published in 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT) (15-12-2021)“…The properties of multiadic coding are given. The creation of methodological bases for the construction of a steganographic system for the indirect embedding…”
Get full text
Conference Proceeding -
13
Evaluating of the Resistance of Crypto-Compression Image Codograms to Errors in the Data Transmission Channel
Published in 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT) (15-12-2021)“…The resistance of crypto-compression codograms to errors in the data channel is evaluated. The quality of reconstructions of images presented in BMP, JPEG, PNG…”
Get full text
Conference Proceeding -
14
Analysis of Requirements for Video Information Coding Technologies for UAV Information Resources
Published in 2022 IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET) (22-02-2022)“…The article analyzes the requirements for information resources coding technologies for UAV and formulates requirements for the method of identifying areas for…”
Get full text
Conference Proceeding -
15
Method of Masking Information in the Contours of Video Images
Published in 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT) (21-09-2021)“…This article contains information on the analysis of existing steganographic methods of hiding information in order to create a new one. Media files, including…”
Get full text
Conference Proceeding -
16
The technology of the video stream intensity controlling based on the bit-planes recombination
Published in 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS) (01-09-2018)“…In this article we consider the methodological basis for constructing a method for monitoring the bit rate of a video stream in conditions of changes in the…”
Get full text
Conference Proceeding -
17
Evaluation the Potential Performance of the DCT-Transformants Non-Equilibrium Positional Encoding Method
Published in 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) (01-12-2019)“…The article explores the possibilities of a non-equilibrium positional code description of a transformant bit representation. The research is conducted from…”
Get full text
Conference Proceeding -
18
The new method of secure data transmission on the indirect steganography basis
Published in 2016 IEEE East-West Design & Test Symposium (EWDTS) (01-10-2016)“…In this article an approach for realization of steganographic embedding by using functional transformation for adaptive positional number is considered…”
Get full text
Conference Proceeding -
19
The Indirect Method of Steganographic Embedding of Data in an Image Container Based on the Information of the Contour
Published in 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) (01-10-2018)“…The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. Due to the…”
Get full text
Conference Proceeding