Algorithm of error-free information embedding into the DCT domain of digital images based on the QIM method using adaptive masking of distortions
This paper proposes a new algorithm for hiding data in the frequency domain of digital images using the discrete cosine transform. This algorithm uses quantization index modulation (QIM) as the basic embedding operation. Frequency embedding is characterized by the problem of error appearance in a secret message arising directly at the embedding stage. The embedded message is distorted due to the loss of information when restoring integer pixel values from the frequency domain. This problem is significant if the integrity of the transmitted information is critical. For example, an insignificant distortion of an encrypted message leads to the impossibility of decrypting and, consequently, to the loss of all encrypted information. The proposed algorithm solves this problem via an iterative embedding procedure, which corrects the arising errors. Another distinctive feature of this algorithm is the adaptive correction of distortions of the frequency coefficients’ histogram. For this purpose, the embedding procedure adapts to the features of the image and masks the arising distortions. Computing experiments and comparison with the state-of-the-art demonstrate the effectiveness of our algorithm.
Many effective methods of the data embedding into digital images are based on the frequency transformations. However use of similar transformations is connected to the following problem: the built-in message is distorted because of information losses in case of restoration of pixels’ integer values from the frequency domain. It represents a vital issue if the integrity of the transmitted data is critical. For example, an insignificant distortion of the ciphered message results in impossibility of deciphering and to loss of all ciphered information. In this paper is described the new algorithm of the information embedding into digital images on the basis of the discrete Fourier transformation allowing to provide unmistakable extraction of the built-in messages from the frequency domain. The faultlessness is reached through an iterative procedure of embedding and non-uniform distribution of the message parts for the image-container’s blocks. Our algorithm not only solves a problem of the built-in messages distortions, but also provides high visual quality of stego-image. Moreover, our approach to the unmistakable embedding of information into the digital images frequency domain is applicable not only for the discrete Fourier transformation, but also for other frequency transformations.
Cyber-physical systems are one of the key technological trends in the modern world. However, their use is associated with the need to counter a variety of cyber threats. This review is devoted to information hiding methods and algorithms designed to ensure security in cyber physical systems. This application of embedding methods is fairly new, but it has attracted the attention of many researchers. The main contribution of our review consists in a new classification of methods for embedding information into data transmitted in cyber-physical systems. We show that these methods can be divided into four broad groups. The main feature for this division is the type of data used to embed additional information. Our review shows that the methods of data hiding used in cyber-physical systems have already formed a whole area that markedly differs from classical digital steganography and digital watermarking.
The IEEE Russia North West Section and the European Centre for Quality (Moscow) are pleased to present the Proceedings of the 2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). The Conference was held in Sochy, Russia on September 23–2, 2019. The Organizing Committee believes and trusts that we have been true to the spirit of collegiality that members of IEEE value whilst also maintaining a high standard as we reviewed papers, provided feedback and now present a strong body of published work in this collection of proceedings. The themes for this year's conference were chosen as a means of bringing together academics and industrialists, engineering and management research, manufacturing and teaching, and providing a basis for discussion of issues arising across the engineering and business community in relation to Quality Management, Information Technologies, Transport and Information Security aimed at developing engineers and managers for the future. The goal of these proceedings has been to present high quality work in an accessible medium, for use in a wide community of academics, engineers, managers, and industrialists, the community united by the key words Science, Education, Quality, Innovations in engineering. To achieve this aim, all abstracts were blind reviewed, and full papers submitted for publication in this journal of proceedings were subjected to a rigorous reviewing process.
The paper presents a brief overview of contemporary approaches to protecting hardware, i.e. design obfuscation techniques, which are meant to counter threats to design IP security
In modern conditions of blurring the boundaries between the virtual and the real world, as well as the transition of virtual threats into reality, the issues of user security on the Internet are becoming increasingly important. This is especially true for children and adolescents who are at high risk because of their young age, lack of skills in safe behavior on the Internet, and lack of understanding of what moral and/or physical harm this or that information can cause. Therefore, parental control applications that extend and complement the capabilities of information security tools on the user's devices are in increasing demand. Basically, such applications provide: monitoring and limiting time of operation of the device, monitoring and restricting access to sites (by age restrictions, by type of sites, by forbidden words, black or white lists) and applications on the device, tracking the user's movements (for mobile devices), monitoring on-lineonline, generation of various reports and statistics on the use of the device and Internet resources, remote control of the device. The article provides a comparative analysis of such applications, discusses the functional features of some of them, provides recommendations for the selection of parental control applications based on user requests, as well as determines the prospects for their development.
The IEEE Russia North West Section, Pastukhov State Academy of Industrial Management (Yaroslavl), and the European Centre for Quality (Moscow) are pleased to present the Proceedings of the 2020 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). The Conference was held in Yaroslavl, Russia on September 7-11, 2020, and it was proudly hosted by Pastukhov State Academy of Industrial Management. The Organizing Committee believes and trusts that we have been true to the spirit of collegiality that members of IEEE value whilst also maintaining a high standard as we reviewed papers, provided feedback and now present a strong body of published work in this collection of proceedings. The themes for this year's conference were chosen as a means of bringing together academics and industrialists, engineering and management research, manufacturing and teaching, and providing a basis for discussion of issues arising across the engineering and business community in relation to Quality Management, Information Technologies, Transport and Information Security aimed at developing engineers and managers for the future. The goal of these proceedings has been to present high quality work in an accessible medium, for use in a wide community of academics, engineers, managers, and industrialists, the community united by the key words Science, Education, Quality, Innovations in engineering. To achieve this aim, all papers submitted for publication in this journal of proceedings were subjected to a rigorous reviewing process.
A model for organizing cargo transportation between two node stations connected by a railway line which contains a certain number of intermediate stations is considered. The movement of cargo is in one direction. Such a situation may occur, for example, if one of the node stations is located in a region which produce raw material for manufacturing industry located in another region, and there is another node station. The organization of freight traﬃc is performed by means of a number of technologies. These technologies determine the rules for taking on cargo at the initial node station, the rules of interaction between neighboring stations, as well as the rule of distribution of cargo to the ﬁnal node stations. The process of cargo transportation is followed by the set rule of control. For such a model, one must determine possible modes of cargo transportation and describe their properties. This model is described by a ﬁnite-dimensional system of diﬀerential equations with nonlocal linear restrictions. The class of the solution satisfying nonlocal linear restrictions is extremely narrow. It results in the need for the “correct” extension of solutions of a system of diﬀerential equations to a class of quasi-solutions having the distinctive feature of gaps in a countable number of points. It was possible numerically using the Runge–Kutta method of the fourth order to build these quasi-solutions and determine their rate of growth. Let us note that in the technical plan the main complexity consisted in obtaining quasi-solutions satisfying the nonlocal linear restrictions. Furthermore, we investigated the dependence of quasi-solutions and, in particular, sizes of gaps (jumps) of solutions on a number of parameters of the model characterizing a rule of control, technologies for transportation of cargo and intensity of giving of cargo on a node station.
Event logs collected by modern information and technical systems usually contain enough data for automated process models discovery. A variety of algorithms was developed for process models discovery, conformance checking, log to model alignment, comparison of process models, etc., nevertheless a quick analysis of ad-hoc selected parts of a journal still have not get a full-fledged implementation. This paper describes an ROLAP-based method of multidimensional event logs storage for process mining. The result of the analysis of the journal is visualized as directed graph representing the union of all possible event sequences, ranked by their occurrence probability. Our implementation allows the analyst to discover process models for sublogs defined by ad-hoc selection of criteria and value of occurrence probability
Existing approaches suggest that IT strategy should be a reflection of business strategy. However, actually organisations do not often follow business strategy even if it is formally declared. In these conditions, IT strategy can be viewed not as a plan, but as an organisational shared view on the role of information systems. This approach generally reflects only a top-down perspective of IT strategy. So, it can be supplemented by a strategic behaviour pattern (i.e., more or less standard response to a changes that is formed as result of previous experience) to implement bottom-up approach. Two components that can help to establish effective reaction regarding new initiatives in IT are proposed here: model of IT-related decision making, and efficiency measurement metric to estimate maturity of business processes and appropriate IT. Usage of proposed tools is demonstrated in practical cases.