Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
13
result(s) for
"Evsutin, Oleg"
Sort by:
Screen-Cam Imitation Module for Improving Data Hiding Robustness
by
Evsutin, Oleg
,
Dzhanashia, Kristina
,
Fedosov, Aleksandr
in
Computer-aided manufacturing
,
data hiding
,
Digital watermarks
2025
Using an attack-simulation module is a well-recognized approach to improving the robustness of end-to-end neural-network-based data-hiding schemes. However, most proposed attack simulators are limited in the types of attacks they cover, usually handling only a basic set of digital transformations. Real, in-demand use cases for data-hiding methods may involve modifications that cannot be modeled by basic digital transformations such as filtering, noise, or compression. In the screen-cam scenario, when an image containing hidden data is displayed on a screen and captured by a camera, the distortions are much more complex and typically require manual experiments that manipulate physical objects in order to replicate. This hinders both the process of creating applicable data-hiding schemes for this scenario and evaluating their effectiveness. In this work, we propose a generator neural network to simulate screen-cam distortions that can replace the manual, time-consuming operations of replicating this attack in the real world, and we show how it can be used to improve the robustness of an existing data-hiding scheme. In our example, we increased robustness by 15% in terms of bit error rate.
Journal Article
The Use of the Blockchain Technology and Digital Watermarking to Provide Data Authenticity on a Mining Enterprise
2020
Prompt development of information technology has made an essential impact on many industries. There appeared a concept “Industry 4.0” symbolizing the fourth industrial revolution. The given concept is closely connected with such promising technologies as the Internet of Things, blockchain, fog computing, Big Data. In the present research, the sphere of the mining industry is examined. We discuss the possibility to increase the efficiency of mining enterprises at the expense of the development of common information space based on modern digital technologies. We analyze security problems at the level of data flow between the participants of the production process on a mining enterprise. We define the problem of providing the reliability of data on the production course on mining enterprise in the conditions of the possible connection loss between the control center and separate technological units. We offer a new approach to the solution of the given problems, based on the technology of blockchain and digital watermarking. The computing experiment is conducted presenting a possibility to implement the offered approaches on common models of microcontrollers.
Journal Article
An algorithm for embedding information in digital images based on discrete wavelet transform and learning automata
2021
The paper presents a new algorithm for embedding information in the frequency domain of the discrete wavelet-transform (DWT) of digital images. A block version of quantization index modulation (QIM) is used as a basic embedding operation. A distinctive feature of the algorithm consists in the adaptive selection of the data block size depending on the local properties of the cover image. It has been shown experimentally that for image areas containing a larger number of edge pixels, it is necessary to select blocks of greater length in the corresponding frequency domains. In addition, the problem of optimization the distortions in the blocks of DWT coefficients is substantiated and solved in order to improve the quality of embedding. A computing model of learning automata is used to solve this problem. The advantage of the obtained algorithm is that the receiver of the stego-image does not need additional information to extract the embedded message. The algorithm is highly efficient in terms of the main criteria of embedding quality and can be used both for embedding digital watermarks and arbitrary messages.
Journal Article
Analytical TCP Model for Millimeter-Wave 5G NR Systems in Dynamic Human Body Blockage Environment
2020
Dynamic blockage of radio propagation paths between the user equipment (UE) and the 5G New Radio (NR) Base Station (BS) induces abrupt rate fluctuations that may lead to sub-optimal performance of the Transmission Control Protocol (TCP) protocol. In this work, we characterize the effects of dynamic human blockage on TCP throughput at the 5G NR air interface. To this aim, we develop an analytical model that expresses the TCP throughput as a function of the round-trip time (RTT), environmental, and radio system parameters. Our results indicate that the blockage affects TCP throughput only when the RTT is comparable to the blocked and non-blocked state durations when the frequency of state changes is high. However, such conditions are not typical for dynamic body blockage environments allowing TCP to benefit from the high bandwidth of 5G NR systems fully.
Journal Article
Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
2020
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect confidential information. The presented algorithm makes use of the Chinese remainder theorem and adaptive embedding to achieve good imperceptibility along with the possibility of hiding a decent amount of confidential information. The algorithm is evaluated via computing experiments and evaluation results, as well as comparison with similar works, demonstrate good imperceptibility qualities of the proposed scheme.
Journal Article
Image data hiding schemes based on metaheuristic optimization: a review
2023
The digital content exchange on the Internet is associated with information security risks. Hiding data in digital images is a promising direction in data protection and is an alternative to cryptographic methods. Steganography algorithms create covert communication channels and protect the confidentiality of messages embedded in cover images. Watermarking algorithms embed invisible marks in images for further image authentication and proof of the authorship. The main difficulty in the development of data hiding schemes is to achieve a balance between indicators of embedding quality, including imperceptibility, capacity, and robustness. An effective approach to solving this problem is the use of metaheuristic optimization algorithms, such as genetic algorithm, particle swarm optimization, artificial bee colony, and others. In this paper, we present an overview of data hiding techniques based on metaheuristic optimization. We review and analyze image steganography and image watermarking schemes over the past 6 years. We propose three levels of research classification: embedding purpose level, optimization purpose level, and level of metaheuristics. The results demonstrate the high relevance of using metaheuristic optimization in the development of new data hiding algorithms. Based on the results of the review, we formulate the main problems of this scientific field and suggest promising areas for further research.
Journal Article
An Authorship Protection Technology for Electronic Documents Based on Image Watermarking
by
Evsutin, Oleg
,
Melman, Anna
,
Shelupanov, Alexander
in
Algorithms
,
Augmented reality
,
Authorship
2020
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their transfer in information systems, including smart systems. This paper proposes a technology for protecting electronic documents containing digital images. The main idea is that the electronic document authorship can be protected by embedding digital watermarks in the images that are contained in this document. The paper considers three cases of using the proposed technology: full copying of an electronic document, copying of images contained in the document, and copying of text. It is shown that in all three cases, the authorship confirmation can be successfully implemented. Some areas of the proposed technology application are described, including augmented reality applications. Computational experiments are conducted with robust watermarking algorithms that can be used within the technology. A scenario of technology implementation is proposed which provides for the joint use of different class algorithms.
Journal Article
FPGA implementation of robust and low complexity template-based watermarking for digital images
by
Evsutin, Oleg
,
Dzhanashia, Kristina
in
Computer Communication Networks
,
Computer Science
,
Data Structures and Information Theory
2024
Watermarking is a widespread technique for information protection and an invisible alternative to quick response codes. The literature mainly considers software implementations of watermarking methods, even though there are applications for which hardware watermarking solutions become preferable or the only possible option due to increased speed, power, or information safety requirements. A convenient, flexible, and universal solution for hardware development is intellectual property (IP) cores. IP cores are building blocks for creating processors on FPGA or ASIC. The main objective of this work is to present the implementation of the robust watermarking method in the form of an IP core suitable for image processing systems on processors. The main contribution of this work is that it is the first hardware implementation of template-based watermarking for modern neural network-based extraction methods. The paper briefly discusses the existing hardware solutions for embedding data, describes the implemented watermarking method and the implementation itself, and provides the key indicators of the resulting solution and a link to the public repository with the solution. The proposed watermarking scheme has good imperceptibility (PSNR of 39.66), bpp of 0.00097, and BER of less than 3% for attacks. The implementation supports a frequency of 120 MHz.
Journal Article
The Use of the Blockchain Technology and Digital Watermarking to Provide Data Authenticityon a Mining Enterprise
2020
Prompt development of information technology has made an essential impact on many industries. There appeared a concept \"Industry 4.0\" symbolizing the fourth industrial revolution. The given concept is closely connected with such promising technologies as the Internet of Things, blockchain, fog computing, Big Data. In the present research, the sphere of the mining industry is examined. We discuss the possibility to increase the efficiency of mining enterprises at the expense of the development of common information space based on modern digital technologies. We analyze security problems at the level of data flow between the participants of the production process on a mining enterprise. We define the problem of providing the reliability of data on the production course on mining enterprise in the conditions of the possible connection loss between the control center and separate technological units. We offer a new approach to the solution of the given problems, based on the technology of blockchain and digital watermarking. The computing experiment is conducted presenting a possibility to implement the offered approaches on common models of microcontrollers.Prompt development of information technology has made an essential impact on many industries. There appeared a concept \"Industry 4.0\" symbolizing the fourth industrial revolution. The given concept is closely connected with such promising technologies as the Internet of Things, blockchain, fog computing, Big Data. In the present research, the sphere of the mining industry is examined. We discuss the possibility to increase the efficiency of mining enterprises at the expense of the development of common information space based on modern digital technologies. We analyze security problems at the level of data flow between the participants of the production process on a mining enterprise. We define the problem of providing the reliability of data on the production course on mining enterprise in the conditions of the possible connection loss between the control center and separate technological units. We offer a new approach to the solution of the given problems, based on the technology of blockchain and digital watermarking. The computing experiment is conducted presenting a possibility to implement the offered approaches on common models of microcontrollers.
Journal Article
The adaptive algorithm of information unmistakable embedding into digital images based on the discrete Fourier transformation
by
Shumskaya, Olga
,
Evsutin, Oleg
,
Meshcheryakov, Roman
in
Adaptive algorithms
,
Algorithms
,
Construction
2018
Many effective methods of the data embedding into digital images are based on the frequency transformations. However use of similar transformations is connected to the following problem: the built-in message is distorted because of information losses in case of restoration of pixels’ integer values from the frequency domain. It represents a vital issue if the integrity of the transmitted data is critical. For example, an insignificant distortion of the ciphered message results in impossibility of deciphering and to loss of all ciphered information. In this paper is described the new algorithm of the information embedding into digital images on the basis of the discrete Fourier transformation allowing to provide unmistakable extraction of the built-in messages from the frequency domain. The faultlessness is reached through an iterative procedure of embedding and non-uniform distribution of the message parts for the image-container’s blocks. Our algorithm not only solves a problem of the built-in messages distortions, but also provides high visual quality of stego-image. Moreover, our approach to the unmistakable embedding of information into the digital images frequency domain is applicable not only for the discrete Fourier transformation, but also for other frequency transformations.
Journal Article