?
Modification of the Fingerprinting Code Decoding Procedure in the Case of Soft Decision
P. 1-4.
Afanasyeva, A.V.
This article proposes a mutual adaptation of the procedure for extracting digital watermark from video sequences and fingerprinting code decoding. Proposed solution includes two interrelated techniques. The first one is a usage of “soft” decision making instead of “hard” decision during watermark extraction. This means that the additional information on extracted bit reliability will be obtained from the hidden channel. The second one is an including of the reliability to decoding procedure. The use of such a solution allows more effective work of fingerprinting codes and achieves zero accusation error rates.
Moreira J., Fernández M., Kabatiansky G. A., , in : Information Forensics and Security (WIFS), 2011 IEEE International Workshop on. : IEEE, 2011. P. 1-6.
Separating codes have been used in many areas as diverse as automata synthesis, technical diagnosis and traitor tracing schemes. In this paper, we study a weak version of separating codes called almost separating codes. More precisely, we derive lower bounds on the rate of almost separating codes. From the main result it is seen that ...
Added: May 6, 2014
Semenov D., Koldanov A. P., Koldanov P. et al., Annals of Mathematics and Artificial Intelligence 2024
In this paper we propose a new notion of a clique reliability. The clique reliability is understood as the ratio of the number of statistically significant links in a clique to the number of edges of the clique. This notion relies on a recently proposed original technique for separating inferences about pairwise connections between vertices ...
Added: January 30, 2024
Pokryshevskaya E. B., Antipov E. A., Journal of Targeting, Measurement and Analysis for Marketing 2012 Vol. 20 No. 3-4 P. 203-211
Measuring indirect importance of various attributes is a very common task in marketing analysis for which researchers use correlation and regression techniques. We have listed and illustrated some common problems with widely used latent importance measures. A more theoretically sound approach - the Shapley Value decomposition - was applied to a rich data set of ...
Added: February 4, 2013
Kabatiansky G., Krouk E., Semenov S., Wiley, 2005
Added: August 9, 2017
Polesskiy S., Korolev P., Tseplina A. et al., , in : Information Innovative Technologies: Materials of the International scientific – рractical conference. : M. : Association of graduates and employees of AFEA named after prof. Zhukovsky, 2019. P. 169-174.
Traveling wave tubes are actively used in various radio transmitting devices. However, the analysis of modern literature sources showed that there are no mathematical models that allow to take into account the influence of technical parameters of traveling wave tubes on the failure rate, and, as a consequence, on the time to failure and resource. ...
Added: June 18, 2019
Smetanin S., Komarov M. M., IEEE Access 2022 Vol. 10 P. 18886-18898
A growing body of literature has examined the potential of machine learning algorithms in constructing social indicators based on the automatic classification of digital traces. However, as long as the classification algorithms’ predictions are not completely error-free, the estimate of the relative occurrence of a particular class may be affected by misclassification bias, thereby affecting ...
Added: February 22, 2022
Korolev P., Мухаметов Р. Р., В кн. : Инновационные, информационные и коммуникационные технологии: сборник трудов XV Международной научно-практической конференции. : М. : Ассоциация выпускников и сотрудников ВВИА им. проф. Жуковского, 2018. С. 550-553.
In the present work, russian and foreign methods of calculating one of the indicators of testability, the average recovery time, are analyzed. Revealed and justified the need to adjust their mathematical apparatus, taking into account the combination of the methods considered. Based on the conducted research: the application program for calculating the average recovery time ...
Added: November 25, 2018
Gordin V. A., Bykov P. L., Известия РАН. Энергетика 2017 Т. 55 № 5 С. 47-56
The power consumption is determined by various factors. It is affected by time of day, day of week, and of season. The price of electricity is determined by the controller, and can affect the schedule of consumption of various consumers. And this formulae depends essentially on the concrete region. Forecast of consumption may influence both ...
Added: December 15, 2016
Okorokova L., Goodman J. M., Hatsopoulos N. G. et al., Journal of Neural Engineering 2020 Vol. 17 No. 4
Objective. The hand—a complex effector comprising dozens of degrees of freedom of movement—endows us with the ability to flexibly, precisely, and effortlessly interact with objects. The neural signals associated with dexterous hand movements in primary motor cortex (M1) and somatosensory cortex (SC) have received comparatively less attention than have those associated with proximal upper limb ...
Added: December 18, 2020
Kashtanov V., Reliability: Theory & Applications 2022 No. 4 P. 22-34
The article talks about a remarkable man and an outstanding scientist – Alexander Dmitrievich Soloviev. He was Doctor of Physics and Mathematics, Professor, Laureate of the State Prize of the USSR, Professor of the Probability Theory Department of the Faculty of Mechanics and Mathematics at Lomonosov Moscow State University. Alexander Dmitrievich lived an amazing creative ...
Added: February 3, 2023
Dzhanashia K., Evsyutin O., Computers and Electrical Engineering 2022 Vol. 102 Article 108194
The popularity of watermarking was amplified due to the emergence of new immersive applications that connect the digital and physical worlds such as reading with a smartphone a watermark located in a physical object that leads to an online, dynamic source. Such applications require new watermarking schemes which must be robust enough to withstand significant ...
Added: June 23, 2022
Sergei Valentinovich Fedorenko, IEEE Signal Processing Letters 2016 Vol. 23 No. 6 P. 824-827
A novel method for computing the discrete Fourier transform (DFT) over a finite field based on the Goertzel-Blahut algorithm is described. The novel method is currently the best one for computing the DFT over even extensions of the characteristic two finite field, in terms of multiplicative complexity. ...
Added: January 26, 2018
Eltsov N., Khorkina N., Вопросы статистики 2023 Т. 30 № 3 С. 92-108
The authors of the article analyze the characteristics of alcohol consumption by working residents of Russia, depending on their professional and social status. The study is based on data from the Russian Longitudinal Monitoring Survey of the National Research University Higher School of Economics for the period 2013-2019. The sample of the analysis included working ...
Added: March 24, 2023
Khazetdinov A., Zakiev A., Tsoy T. et al., , in : 2022 International Siberian Conference on Control and Communications (SIBCON). : IEEE, 2022. Ch. 9438855.
This paper presents a novel approach for precise UAV landing using visual sensory data. A new type of fiducial marker called embedded ArUco (e-ArUco) was developed specially for a task of a robust marker detection for a wide range of distances. E-ArUco markers are based on original ArUco markers approach and require only ArUco detection ...
Added: October 11, 2021
Fedorenko Sergei Valentinovich, IEEE Access 2022 Vol. 10 P. 110639-110645
A novel method of spectral decoding for systematic BCH codes has been proposed. This method has a simple description and a small computational complexity. ...
Added: October 26, 2022
Korolev P., Polesskiy S., Tsvetkov V. et al., М. : КноРус, 2023
The issues of occurrence of failures of computing and ways of dealing with them, the main indicators of reliability and mathematical methods for their evaluation are considered. Considerable attention is paid to the calculations of the reliability of computing systems at the design stages. Corresponds to the latest generation of Federal State Educational Standards. For ...
Added: November 9, 2022
Kalyagin V. A., Koldanov A. P., Koldanov P.A. et al., Computational Management Science 2013 Vol. 10 No. 2-3 P. 105-124
A simple measure of similarity for the construction of the market graph is proposed. The measure is based on the probability of the coincidence of the signs of the stock returns. This measure is robust, has a simple interpretation, is easy to calculate and can be used as measure of similarity between any number of ...
Added: April 3, 2013
Ivanov F., Krouk E., Kreshchuk A., , in : 2019 XVI International Symposium "Problems of Redundancy in Information and Control Systems" (REDUNDANCY). : IEEE, 2019. P. 133-138.
Added: March 17, 2020
Козачок А. В., Копылов С. А., Шелупанов А. А. et al., Journal of Computer Virology and Hacking Techniques 2019 Vol. 15 No. 3 P. 219-232
Printed documents protection problem against leakage is still one of the relevant. Existing security tools allow us to protect electronic text documents, however are ineffective in protecting their printed versions. This research presents the marking approach for text electronic documents invariant to the print-and-scan transformation. During marker embedding source text line spacing values are changing ...
Added: September 3, 2019
Kurmukova A., Ivanov F., Zyablov V. V., Problems of Information Transmission 2022 Vol. 58 No. 2 P. 122-136
We propose a new approach to the analytical estimation of the error burst probability, the probability of erroneous decoding, and the probability of error per bit for convolutional codes with Viterbi decoding in a binary symmetric channel (BSC). Upper and lower estimates of the probability of error per bit and of the erroneous decoding probability ...
Added: November 19, 2022
Ivanov F., Krouk E., Kabatiansky G. A. et al., Lecture Notes in Computer Science 2020 Vol. 12087 P. 41-49
Unlike most papers devoted to improvements of code-based cryptosystem, where original Goppa codes are substituted by some other codes, we suggest a new method of strengthening which is code-independent. We show (up to some limit) that the security of the new code-based cryptosystem is much closer to the hardness of maximum likelihood decoding than in the ...
Added: September 17, 2020
Meniailo V. V., Interlitteraria 2020 Vol. 25 No. 1 P. 16-25
The theory of foregrounding, developed by St. Petersburg scholar
Irina Vladimirovna Arnold in the middle of the 20th century, was rather
revolutionary for its time as it aimed to establish connection between
formal levels of the language and textual meanings that allowed the
reader to decode the author’s message. Arnold identifies four principal
elements of foregrounding that disclose conceptual textual ...
Added: July 9, 2020
Polesskiy S., Korolev P., Ivanov I. et al., , in : 2019 International Seminar on Electron Devices Design and Production (SED). : IEEE, 2019. P. 1-5.
In order to assess the level of electronic means reliability, it is necessary to have a methodology for analyzing
the results of calculating its reliability indicators, such as the probability of failure-free operation or mean time between
failures, which allows to evaluate which of the parameters most strongly affects the final value of the failure rate of ...
Added: June 18, 2019
Farkhatdinov N., Music and Arts in Action 2014 Vol. 4 No. 2 P. 52-73
This article uses case studies of visual art installations to elaborate an alternative view of the way art is experienced by museum and gallery visitors. In particular, it is argued that the orthodox and influential decoding perspective in the sociology of art overlooks the situated and experiential nature of art, especially when art takes the ...
Added: April 18, 2014