• A
  • A
  • A
  • АБВ
  • АБВ
  • АБВ
  • A
  • A
  • A
  • A
  • A
Обычная версия сайта
  • RU
  • EN
  • HSE University
  • Publications
  • Book chapter
  • Algorithm for Embedding Digital Watermarks in Wireless Sensor Networks Data with Control of Embedding Distortions
  • RU
  • EN
Расширенный поиск
Высшая школа экономики
Национальный исследовательский университет
Priority areas
  • business informatics
  • economics
  • engineering science
  • humanitarian
  • IT and mathematics
  • law
  • management
  • mathematics
  • sociology
  • state and public administration
by year
  • 2027
  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • 2004
  • 2003
  • 2002
  • 2001
  • 2000
  • 1999
  • 1998
  • 1997
  • 1996
  • 1995
  • 1994
  • 1993
  • 1992
  • 1991
  • 1990
  • 1989
  • 1988
  • 1987
  • 1986
  • 1985
  • 1984
  • 1983
  • 1982
  • 1981
  • 1980
  • 1979
  • 1978
  • 1977
  • 1976
  • 1975
  • 1974
  • 1973
  • 1972
  • 1971
  • 1970
  • 1969
  • 1968
  • 1967
  • 1966
  • 1965
  • 1964
  • 1963
  • 1958
  • More
Subject
News
May 20, 2026
HSE University Opens First Representative Office of Satellite Laboratory in Brazil
HSE University-St Petersburg opened a representative office of the Satellite Laboratory on Social Entrepreneurship at the University of Campinas in Brazil. The platform is going to unite research and educational projects in the spheres of sustainable development, communications and social innovations.
May 18, 2026
The 'Second Shift' Is Not Why Women Avoid News
Women are more likely than men to avoid political and economic news, but the reasons for this behaviour are linked less to structural inequality or family-related stress than to personal attitudes and the emotional perception of news content. This conclusion was reached by HSE researchers after analysing data from a large-scale survey of more than 10,000 residents across 61 regions of Russia. The study findings have been published in Woman in Russian Society.
May 15, 2026
Preserving Rationality in a Period of Turbulence
The HSE International Laboratory for Logic, Linguistics and Formal Philosophy studies logic and rationality in a transformed world characterised by a diversity of logical systems and rational agents. The laboratory supports and develops academic ties with Russian and international partners. The HSE News Service spoke with the head of the laboratory, Prof. Elena Dragalina-Chernaya, about its work.

 

Have you spotted a typo?
Highlight it, click Ctrl+Enter and send us a message. Thank you for your help!

Publications
  • Books
  • Articles
  • Chapters of books
  • Working papers
  • Report a publication
  • Research at HSE

?

Algorithm for Embedding Digital Watermarks in Wireless Sensor Networks Data with Control of Embedding Distortions

P. 574–585.
Evsutin O., Meshcheryakov R., Tolmachev V., Iskhakov A., Iskhakova A.

The article presents a new algorithm for embedding digital watermarks in the data of wireless sensor networks. The algorithm is designed to protect against the substitution of the data source in such networks. An important distinguishing feature of the proposed algorithm is the ability to control the level of distortions introduced as a result of embedding. This allows us to recommend this algorithm for use in wireless sensor networks, including sensor nodes of various types, designed to measure physical quantities of different nature. Computing experiments were carried out by means of simulation modeling in the OMNeT++ framework. The results of the experiments showed that the obtained algorithm provides statistical indistinguishability of sensory data samples before embedding digital watermarks into them and after embedding.

Language: English
Full text
DOI
Text on another site
Keywords: wireless networksdigital watermarkingdata hiding

In book

Distributed Computer and Communication Networks: 22nd International Conference, DCCN 2019
Vol. 1141. , Springer, 2019.
Similar publications
Screen-Cam Imitation Module for Improving Data Hiding Robustness
Dzhanashia K., Aleksandr Fedosov, Oleg Evsutin, Sensors 2025 Vol. 25 No. 23 Article 7726
Using an attack-simulation module is a well-recognized approach to improving the robustness of end-to-end neural-network-based data-hiding schemes. However, most proposed attack simulators are limited in the types of attacks they cover, usually handling only a basic set of digital transformations. Real, in-demand use cases for data-hiding methods may involve modifications that cannot be modeled by ...
Added: November 28, 2025
Robust image watermarking for diverse channels with template-forming neural network
Dzhanashia K., Evsyutin O., Applied Soft Computing Journal 2026 Vol. 186 Article 114125
Watermarking is a key tool in combating unauthorized content distribution, but its effectiveness is often challenged by the wide range of communication channels that can degrade or remove the watermark. We propose a block neural network-based watermarking scheme for digital images that is robust against diverse transmission channels, including compression, pre-processing, and digital-to-analog conversions such ...
Added: October 31, 2025
Hybrid metaheuristic algorithms for image watermarking: An experimental study
Melman A., Oleg Evsutin, Swarm and Evolutionary Computation 2025 Vol. 99 Article 102163
Invisible image watermarking is a promising method for protecting the copyright of digital images such as photographs, illustrations, and scans. An effective watermarking algorithm embeds a special mark into an image that does not change the image content but can be extracted from it even after some common post-processing operations such as cropping or compression. ...
Added: September 13, 2025
Множественное встраивание водяных знаков в пространственно-частотную область изображений на основе генетического алгоритма
Melman A., Evsyutin O., Senyukova O., Компьютерная оптика 2025 Т. 49 № 2 С. 273–281
The widespread use of digital content makes the task of protecting author’s and owner’s rights increasingly important, in particular with regard to digital images. Digital watermarking technology is an effective tool that solves many problems associated with proving authorship of images, verifying authenticity, and tracking illegal copying. An effective watermarking algorithm requires achieving high levels ...
Added: March 8, 2025
Image watermarking based on a ratio of DCT coefficient sums using a gradient-based optimizer
Anna Melman, Oleg Evsutin, Computers and Electrical Engineering 2024 Vol. 117 Article 109271
Social networks and various websites provide a lot of tools for publishing and sharing digital images. However, publishing digital content online makes it vulnerable to illegal copying and distribution. An effective method for protecting images is watermarking technology, which embeds a logo or some kind of identifier into an image in an invisible way. If ...
Added: April 28, 2024
Neural networks-based data hiding in digital images: overview
Dzhanashia K., Evsyutin O., Neurocomputing 2024 Vol. 581 Article 127499
Nowadays, neural networks are actively used for data hiding; however, there is currently no systematic knowledge regarding their utilization in this field. This is a significant gap, considering that neural network-based data hiding has already formed a large and quite independent area of research. This review aims to provide such systematization. It also provides a ...
Added: March 8, 2024
Image data hiding schemes based on metaheuristic optimization: a review
Anna Melman, Oleg Evsutin, Artificial Intelligence Review 2023 Vol. 56 No. 12 P. 15375–15447
The digital content exchange on the Internet is associated with information security risks. Hiding data in digital images is a promising direction in data protection and is an alternative to cryptographic methods. Steganography algorithms create covert communication channels and protect the confidentiality of messages embedded in cover images. Watermarking algorithms embed invisible marks in images ...
Added: June 15, 2023
Boosting TCP & QUIC Performance in mmWave, Terahertz, and Lightwave Wireless Networks: a Survey
E. Khorov, A. Krasilov, M. Susloparov et al., IEEE Communications Surveys and Tutorials 2023 Vol. 25 No. 4 P. 2862–2891
Emerging wireless systems target to provide multi-Gbps data rates for each user, which can be achieved by utilizing ultra-wide channels available at mmWave, terahertz, and lightwave frequencies. In contrast to the traditional spectrum below 6 GHz, these high-frequency bands raise many issues, complicating their usage. For example, because of high signal attenuation and blockage by ...
Added: December 23, 2022
Evaluation of the New and Accepted Customers Blocking Probabilties in a Network of Resource Loss Systems
Sopin E., Begishev V., Moltchanov D. et al., Communications in Computer and Information Science 2022 Vol. 1605 P. 105–116
The paper considers a network of resource loss systems (ReLS) with random resource requirements and two types of nodes. Customers initially arrive to the first type of nodes, where they receive service for exponentially distributed time. The service of customers can be interrupted. In this case, they are rerouted to the second type of nodes, ...
Added: September 15, 2022
Delay Tolerant Network protocols for an Expanding Network on a Railway
Tikhonov E., Schneps-Schneppe D., Namiot D., , in: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT).: United States of America: IEEE, 2020.
The paper presents the analysis of the Delay Tolerant Network (DTN) methods in an expanding communication network on a railway line. Trains act as moving objects that send and receive messages or collected telemetry data to or from an external network. They can exchange the data with each other, delegating delivery. The paper compares various ...
Added: April 9, 2022
Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain
Anna Melman, Oleg Evsutin, Applied Soft Computing Journal 2023 Vol. 132 Article 109847
Image steganography and watermarking have demonstrated their efficiency in creating a covert communication channel and in digital image authentication respectively. The importance of cybersecurity tasks sets high efficiency requirements for information embedding methods. Many studies in this area focus on finding new ways to improve the embedding quality. One of them is to use metaheuristic ...
Added: November 29, 2021
Об использовании многоканальных методов доступа для обслуживания приложений реального времени в сетях Wi-Fi
Bankov D., Lyakhov A., Khorov E. et al., Информационные процессы 2021 Т. 21 № 3 С. 162–173
Serving real-time applications, such as virtual and augmented reality, remote control and video streamin, is an important use case for next-generation Wi-Fi networks. To achieve it, the currently developed IEEE 802.11be (Wi-Fi 7) standard introduces several new features that can guarantee low latency. One of such innovations is the support for the simultaneous transmission and ...
Added: October 4, 2021
Watermarking Schemes for Digital Images: Robustness Overview
Evsutin O., Dzhanashia K., Signal Processing: Image Communication 2022 Vol. 100 Article 116523
Digital watermarking is an important scientific direction located at the intersection of cybersecurity and multimedia processing. Digital watermarking is used for digital objects copyright protection and protection against forgery. The importance of those tasks is highlighted by the ongoing COVID-19 pandemic that lasts for more than a year and forced multiple industries to transit to ...
Added: September 26, 2021
An Authorship Protection Technology for Electronic Documents Based on Image Watermarking
Melman A., Evsyutin O., Shelupanov A., Technologies 2020 Vol. 8 No. 4 Article 79
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their transfer in information systems, including smart systems. This paper proposes a technology for protecting electronic documents containing digital images. ...
Added: December 24, 2020
Nonorthogonal Multiple Access for Servicing the Internet of Things and Web Traffic in Wi-Fi Networks
Тутельян С. А., Khorov E., Journal of Communications Technology and Electronics 2020 Vol. 65 No. 6 P. 741–749
Nowadays, many devices require a wireless Internet connection, while the available frequency spectrum is limited. The nonorthogonal multiple access (NOMA) is a multiplexing technology that can significantly improve spectral efficiency and thus solve this problem. In this paper, the use of NOMA in Wi-Fi networks with two traffic types, Web traffic and Internet of Things ...
Added: November 27, 2020
Radio access network design with software-defined mobility management
Kak A., Kureev A., Khorov E. et al., Wireless Networks 2020 Vol. 26 P. 3349–3362
The softwarization of wireless networks has necessitated an overhaul of existing mobility management strategies. Specifically, mobility management is no longer constrained to function within the boundaries of a pre-existing radio access network. Softwarization of the network infrastructure allows resource configurations and associations to be changed on-demand, in a manner so as to support a least ...
Added: November 25, 2020
Evolving Technologies for Computing, Communication and Smart World. Proceedings of ETCCS 2020
Singapore: Springer, 2021.
This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January–1 February 2020 at C-DAC, Noida, India. It is co-organized by Southern Federal University, Russia; University of Jan Wyżykowski (UJW), Polkowice, Poland; and CSI, India. C-DAC, Noida received funding from ...
Added: November 25, 2020
Analysis of the Differential Update Method for Control Information Dissemination in Wireless Networks
Belogaev A., Krasilov A., Lyakhov A. et al., Journal of Communications Technology and Electronics 2018 Vol. 63 No. 12 P. 1538–1544
Various wireless networks scenarios involve dissemination of large amounts of control information. This limits the channel resources available for transmission of the user data. This problem is especially crucial in dense networks, sensor networks, and high-mobility networks (e.g., networks of vehicles and drones). Several methods for dissemination of control information are known. This study is ...
Added: September 18, 2020
The Use of the Blockchain Technology and Digital Watermarking to Provide Data Authenticity on a Mining Enterprise
Evsyutin O., Meshcheryakov Y., Sensors 2020 Vol. 20 No. 12 P. 1–20
Prompt development of information technology has made an essential impact on many industries. There appeared a concept “Industry 4.0” symbolizing the fourth industrial revolution. The given concept is closely connected with such promising technologies as the Internet of Things, blockchain, fog computing, Big Data. In the present research, the sphere of the mining industry is ...
Added: June 18, 2020
Approach to Real-Time Communications in Wi-Fi Networks
Bankov D., Khorov E., Lyakhov A. et al., Journal of Communications Technology and Electronics 2019 Vol. 64 No. 8 P. 880–889
The development of wireless communication technologies attracts increased interest to scenarios that impose severe restrictions on data transmission reliability and latency. Such scenarios include real-time applications, such as industrial automation, remote control, video streaming, and virtual reality. It is very difficult to satisfy the requirements imposed on the quality of service with the currently widespread ...
Added: October 1, 2019
An adaptive algorithm for the steganographic embedding information into the discrete Fourier transform phase spectrum
Evsyutin O., Kokurina A., Мещеряков Р. В. et al., , in: Advances in Intelligent Systems and ComputingVol. 451: Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’16).: Springer, 2016.
On the example of digital images there are investigated properties of the discrete Fourier transform (DFT) used to embed information into the phase spectrum. The investigation helped to form a new steganografic algorithm that can be used in case of non- compressed images. Peculiarity of the algorithm is changeable size of information put into the ...
Added: September 8, 2019
  • About
  • About
  • Key Figures & Facts
  • Sustainability at HSE University
  • Faculties & Departments
  • International Partnerships
  • Faculty & Staff
  • HSE Buildings
  • HSE University for Persons with Disabilities
  • Public Enquiries
  • Studies
  • Admissions
  • Programme Catalogue
  • Undergraduate
  • Graduate
  • Exchange Programmes
  • Summer University
  • Summer Schools
  • Semester in Moscow
  • Business Internship
  • Research
  • International Laboratories
  • Research Centres
  • Research Projects
  • Monitoring Studies
  • Conferences & Seminars
  • Academic Jobs
  • Yasin (April) International Academic Conference on Economic and Social Development
  • Media & Resources
  • Publications by staff
  • HSE Journals
  • Publishing House
  • iq.hse.ru: commentary by HSE experts
  • Library
  • Economic & Social Data Archive
  • Video
  • HSE Repository of Socio-Economic Information
  • HSE1993–2026
  • Contacts
  • Copyright
  • Privacy Policy
  • Site Map
Edit