?
An adaptive algorithm for the steganographic embedding information into the discrete Fourier transform phase spectrum
.
On the example of digital images there are investigated properties of the discrete Fourier transform (DFT) used to embed information into the phase spectrum. The investigation helped to form a new steganografic algorithm that can be used in case of non- compressed images. Peculiarity of the algorithm is changeable size of information put into the blocks of stego-image. Characteristics of the suggested algorithm are comparable with the analog ones, they allow to get the correct information without mistakes.
In book
Vol. 451: Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’16). , Springer, 2016.
IEEE, 2026.
Preface IEEE Russia North West Section and Saint Petersburg Electrotechnical University “LETI” are pleased to present the Proceedings of the 2026 ElCon Conference of Young Researchers in Computing & Processing, and Information Security (2026 ElCon-CP) held in St. Petersburg, Russia, on February 3-5, 2026. This conference was hosted by Saint Petersburg Electrotechnical University “LETI”. The ...
Added: April 6, 2026
Закомолдин Р. В., Agapov P., Дулькина Л. В., Сибирский юридический вестник 2024 № 2(105) С. 75–82
T he article analyzes faking as one of the tools of encroachment on state, public and military security. It is noted that with the help of fakes, misinformation of society is organized, destructive effects on public consciousness are ensured, and negative public opinion is formed. The analysis is carried out on the example of a ...
Added: January 28, 2026
Styrin E. M., Вопросы государственного и муниципального управления 2025 № 4 С. 35–60
This article addresses the problem of insuffi cient diagnostic depth in the current
approaches to assessing the digital maturity of public administration in the regions of the
Russian Federation. The federal methodology proposed by the Ministry of Digital Development
focuses on external performance indicators of digital transformation but does not fully
reveal the internal organizational capabilities of government agencies. ...
Added: December 23, 2025
Dzhanashia K., Aleksandr Fedosov, Oleg Evsutin, Sensors 2025 Vol. 25 No. 23 Article 7726
Using an attack-simulation module is a well-recognized approach to improving the robustness of end-to-end neural-network-based data-hiding schemes. However, most proposed attack simulators are limited in the types of attacks they cover, usually handling only a basic set of digital transformations. Real, in-demand use cases for data-hiding methods may involve modifications that cannot be modeled by ...
Added: November 28, 2025
Dzhanashia K., Evsyutin O., Applied Soft Computing Journal 2026 Vol. 186 Article 114125
Watermarking is a key tool in combating unauthorized content distribution, but its effectiveness is often challenged by the wide range of communication channels that can degrade or remove the watermark. We propose a block neural network-based watermarking scheme for digital images that is robust against diverse transmission channels, including compression, pre-processing, and digital-to-analog conversions such ...
Added: October 31, 2025
Ustinov A., Дальневосточный математический журнал 2014 Т. 14 № 1 С. 90–95
The explicit formula for a Gauss sum is proved using the discrete Fourier transform. The Gauss quadratic reciprocity law is established as a corollary. ...
Added: October 9, 2025
Sokolshchik L., Yanikeeva I., Торопчин Г. В., Вестник Российского университета дружбы народов. Серия: Международные отношения 2025 Т. 25 № 3 С. 469–484
The issue of information and communication technology (ICT) security is becoming increasingly important in the context of international relations and foreign policy. In the present study, the authors analyze the discourse of the Joseph Biden administration in the field of international ICT security in the Latin American dimension, with the aim of identifying the underlying ...
Added: October 7, 2025
Melman A., Oleg Evsutin, Swarm and Evolutionary Computation 2025 Vol. 99 Article 102163
Invisible image watermarking is a promising method for protecting the copyright of digital images such as photographs, illustrations, and scans. An effective watermarking algorithm embeds a special mark into an image that does not change the image content but can be extracted from it even after some common post-processing operations such as cropping or compression. ...
Added: September 13, 2025
Melman A., Evsyutin O., Knowledge-Based Systems 2025 Vol. 329 No. B Article 114429
Embedding additional information into digital images is an effective method of data privacy protection. A data hiding scheme needs to have a high level of imperceptibility to provide a high level of security. At the same time, it is necessary to maintain good capacity and ability to extract information in its original form. In this ...
Added: September 9, 2025
Смирнов И. А., Koucheryavy E., В кн.: СБОРНИК МАТЕРИАЛОВ XI МЕЖДУНАРОДНОЙ НАУЧНО-ПРАКТИЧЕСКОЙ КОНФЕРЕНЦИИ «Актуальные аспекты развития науки и общества в эпоху цифровой трансформации» (шифр –МКАА) 6 ноября 2023 года.: М.: ООО "Издательство АЛЕФ", 2023.
In this paper from the point of view of information security (hereinafter IS) the document "FG NET-2030 Technical Specification on Network 2030 Architecture Framework" (hereinafter Technical Specification) released by the International Telecommunication Union (hereinafter ITU) in 2020 is considered. The developed Technical Specification describes architectural principles for 6G public networks, such as: access, routing and ...
Added: September 7, 2025
Melman A., Dzhanashia K., Evsyutin O., Computer Standards and Interfaces 2026 Vol. 96 Article 104066
The cybersecurity problems remain extremely relevant in the modern world. Every year image steganography and watermarking schemes are proposed that solve the problems of hidden confidential data transfer and image authentication, respectively. The authors attempt to maximize the main embedding indicators, such as capacity, invisibility, and robustness. However, in practice, the time effectiveness of embedding ...
Added: September 3, 2025
Кочкин А. В., Труды по интеллектуальной собственности 2025 Т. 52 № 1 С. 37–44
The author discusses an actual problem of the media evolution in the doctrines of information security of Russia and the United States at the present stage. The research goal was to identify the main interpretations of the media in the current security doctrines of the two countries in the context of the historical transformation of ...
Added: May 23, 2025
Ivan A. Smirnov, Koucheryavy E., Elektrotehniski Vestnik/Electrotechnical Review 2025 Vol. 92 No. 3 P. 104–114
Abstract. The 5G communication networks have been destined to become one of the pillars of the digital economy, driven by artificial intelligence (AI), machine learning (ML), Big Data, Internet of Things (IoT) and robotization. The 5G networks have inherited many vulnerabilities from the preceding systems. In this regard, the issue of a proper information security ...
Added: April 28, 2025
CОВРЕМЕННЫЕ ПОДХОДЫ К СОПРОВОЖДЕНИЮ МЕДИЦИНСКИХ ИНФОРМАЦИОННЫХ СИСТЕМ ПРИ ВНЕДРЕНИИ НОВЫХ ТЕХНОЛОГИЙ
Krayushkin D. V., Chepovskiy A., Куликов И. В. et al., Вопросы кибербезопасности 2025 № 2 С. 41–51
The purpose of the study: the digitalization of healthcare has stimulated the development of medical information systems. Studies have become more accessible due to the widespread implementation of digital image exchange in radiology services, as well as the increase in the number and improvement in the quality of radiological equipment. The growing load on the existing ...
Added: April 23, 2025
Kanaev E., Муратшина К. Г., Nikiporets-Takigawa G. et al., М.: Институт востоковедения РАН, 2024.
In the contemporary world, information security is the most important element of state policy. This collective monograph focuses on information security problems in Southeast Asia and the South Pacific Region. ...
Added: April 8, 2025
Maksimenkova O. V., Papushina I. O., Shitova N. et al., В кн.: Искусственный интеллект и математика в образовании.: М.: ООО "ИПП "КУНА", 2024. С. 277–292.
The article summarizes the authors' experience gained as a result of research and preparation of a series of training activities for teachers of the National Research University Higher School of Economics aimed at improving personal and corporate information security when working with intelligent tools. The paper analyzes the general problems of information security of teachers ...
Added: April 4, 2025
Melman A., Evsyutin O., Senyukova O., Компьютерная оптика 2025 Т. 49 № 2 С. 273–281
The widespread use of digital content makes the task of protecting author’s and owner’s rights increasingly important, in particular with regard to digital images. Digital watermarking technology is an effective tool that solves many problems associated with proving authorship of images, verifying authenticity, and tracking illegal copying. An effective watermarking algorithm requires achieving high levels ...
Added: March 8, 2025
Душкин А. В., Безопасность информационных технологий 2024 Т. 31 № 4 С. 56–66
The research problem lies in the absence of a comprehensive model for evaluating the
effectiveness of information security systems, capable of taking into account both technical security aspects
and subjective factors, such as user trust. Furthermore, current methods often either focus on isolated
aspects or lack sufficient adaptability to the unique needs and risks of companies. The article ...
Added: January 25, 2025
IEEE, 2024.
The themes for this year's conference were chosen as a means of bringing together academics and industrialists, engineering and management research, manufacturing and teaching, and providing a basis for discussion of issues arising across the engineering and business community in relation to Quality Management, Information Technologies, Transport and Information Security aimed at developing engineers and ...
Added: January 15, 2025