Discrete fourier transform as a basis for steganographic method
Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
Подобные документы
Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
книга, добавлен 08.03.2014The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.
статья, добавлен 09.04.2022Analysis of the need for sensors to detect the working environment and collect the necessary information to perform specific tasks in industrial robotics. Object detection algorithm using background subtraction methods for the operation of a robotic arm.
статья, добавлен 01.02.2019Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.
статья, добавлен 27.05.2021The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
курс лекций, добавлен 08.03.2014Сomputer facilities and microprocessor systems, data manipulation. The general principles of programming. The branched and cyclic programs organization using Assembler-86 language. X-bit Motorola microprocessors. Communication networks designing.
методичка, добавлен 11.10.2014The classification method, based on Combined Swarm Negative Selection Algorithm, which was originally designed for binary classification problems. The accuracy of developed algorithm was tested in an experimental way with the use of microarray data sets.
статья, добавлен 20.01.2017- 108. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
контрольная работа, добавлен 14.05.2017 Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
статья, добавлен 22.12.2016Machine learning is a set of algorithms and tools that help machines understand hidden patterns in data and exploit the structure and substance of those hidden patterns. The history of the emergence of architectures of increased computing power.
статья, добавлен 24.02.2024The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.
статья, добавлен 10.10.2023The inverse Box-Muller transform, which allows you to transform a random sequence of Gaussian type into the corresponding sequence with a uniform distribution law. A two-stage scheme for testing statistically independent random variables using π-Test
статья, добавлен 07.11.2018Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
книга, добавлен 08.03.2014- 115. Memory Basics
Memory Definitions. Memory Block Diagram. Memory Organization Example. Basic Memory Operations. Timing of signal changes and data observation. RAM Integrated Circuits. Cell Arrays and Coincident Selection. Storage of information on different capacitors.
презентация, добавлен 03.06.2012 Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
книга, добавлен 08.03.2014Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.
материалы конференции, добавлен 08.03.2014Information technology - a broad class of disciplines and areas of activity related to technology creation, preservation, management and processing of data, including the use of computer technology. The information technology industry. Search engine.
презентация, добавлен 16.02.2015Development of an algorithm for obtaining a video depth map using the method of image division. Using web cameras to determine the object and calculate the distance to it. Development of software code for streaming video of the experimental setup.
статья, добавлен 13.07.2022This article describes the main features of the design in 3D format. Demonstrated the usefulness of this method in the design and in the analysis. Presents basic examples of the practical application of data modeling functions for real design solutions.
статья, добавлен 28.09.2016- 121. Automation of data from video cameras of small and medium-sized unmanned aerial vehicles processing
The information technology for graphical data from unmanned aircraft real time processing. The structure and functionality of the automated system, image processing algorithms and video. The used of technology in the development of a pilot workplace.
статья, добавлен 28.01.2017 The structure chart of identification using n-th order volterra model in frequency domain using interpolation method. Numerical values of identification accuracy. The simulink model of the test system with noise generator, osillosopes. Wavelet function.
статья, добавлен 28.08.2016- 123. Boolean retrieval
Information Retrieval as finding material of an unstructured nature that satisfies an information need from within large collections. Unstructured (text) and structured (database) data in 1996 and 2006. Basic assumptions of Information Retrieval.
презентация, добавлен 19.02.2014 Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
статья, добавлен 29.01.2016Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.
курс лекций, добавлен 08.03.2014