Digital Watermarking and Steganography
Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.
Подобные документы
Message Passing Interface (MPI) – интерфейс передачи сообщений. Инициализация отдельных частей программы. Рассмотрение главных атрибутов программного сообщения. Типы данных, используемых в алгоритме. Технология программирования Message Passing Interface.
презентация, добавлен 15.05.2016Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
статья, добавлен 16.06.2024An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.
книга, добавлен 08.03.2014The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
статья, добавлен 26.08.2020Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Recommendations on the application of the system of advance passenger information and registration of passenger data (API/PNR). Use as a tool to counter cross-border threats. The role of biometrics in the connection between the document and its owner.
статья, добавлен 20.07.2024- 83. Navigating the complexity: pseudo-chaotic systems and machine learning scientific research group
Structure and properties of pseudo-chaotic systems. Using machine learning tools for pattern recognition and event prediction. Consideration of ethical issues and assessment of the implications for the synergy of environmental sciences and bioengineering.
статья, добавлен 19.03.2024 Характеристика наиболее распространенной технологии программирования для параллельных компьютеров с распределенной памятью – Message Passing Interface (MPI). Общие процедуры MPI. Пример простейшей MPI-программы на языке Фортран, а также на языке Си.
лекция, добавлен 22.05.2016The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
статья, добавлен 14.02.2022Implementing IT technologies in university libraries of Ukraine in the context of foreign experience. The retrospective of development of library information systems and problematic issues related to the transition of library staff to work with them.
статья, добавлен 13.04.2023More sophisticated laser scanning solutions. Uncontrolled movements as breathing, muscle contraction. Special optical systems and mirrors. The result of the scanning process in case a complete surface model of the person. Acquire texture information.
статья, добавлен 22.02.2014The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016- 89. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Digital transformation is a concept that introduces the state and companies to the application of technologies and processes that include data digitization, cloud computing. An assessment of how the digital conversion program is being implemented in RF.
дипломная работа, добавлен 01.12.2019Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
книга, добавлен 08.03.2014Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
презентация, добавлен 06.02.2017The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.
статья, добавлен 28.08.2016Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
учебное пособие, добавлен 08.03.2014The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.
презентация, добавлен 25.09.2016Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
статья, добавлен 22.12.2016Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
статья, добавлен 28.08.2016Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018The physical principles of meteor radio. A block diagram of hardware and software for sensing meteor trails. The principles of software-defined radio system. А functional diagram of a digital oscillator. shortcomings. Range and security meteor radio.
статья, добавлен 06.05.2018- 100. Совершенствование digital-процесса подбора консультантов в Уральском банке ПАО "Сбербанк России"
Анализируется практика digital-процесса подбора персонала на массовую позицию "Консультант" Уральского банка ПАО "Сбербанк России". Составлена сравнительная характеристика преимуществ и недостатков традиционного процесса и digital-процесса подбора.
статья, добавлен 09.10.2020