Natalia Voloshina - Academia.edu (original) (raw)

Papers by Natalia Voloshina

Research paper thumbnail of Steganographic WF5 Method for Weighted Embedding: An Overview and Comparison

Lecture Notes in Computer Science, 2019

In this paper, we discuss steganographic methods LSB, F5, and WF5 for embedding information into ... more In this paper, we discuss steganographic methods LSB, F5, and WF5 for embedding information into a container to enable copyright protection. We analyze the difference between selected methods and show how to decrease the container distortion by dividing codewords into several zones of significance using perfect codes in the weighted Hamming metric. Additionally, we propose a number of variants for different container types and test some parameters on several images.

Research paper thumbnail of An algorithm for detecting RFID duplicates

Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022

Research paper thumbnail of Modern methods of increasing the information capacity of digital images

Research paper thumbnail of Digital Watermarking in RGB Domain on Weighted ECC

Digital watermarking is a technique for embedding imperceptible mark into digital content, with f... more Digital watermarking is a technique for embedding imperceptible mark into digital content, with further extraction of this mark. This paper proposes a watermarking method to embed watermark in the spatial domain using error-correcting codes. Image is divided into blocks. Two perfect error-correcting codes are used to embed watermark. Codeword of corresponding perfect code is written into one block to embed one watermark bit.

Research paper thumbnail of Advanced IoT Solution for Smart City Eco-monitoring System

Research paper thumbnail of Code methods for increasing the information capacity of digital images

This article is dedicated to the problem of increasing the information capacity of digital images... more This article is dedicated to the problem of increasing the information capacity of digital images. It's often necessary to have an additional information about chosen images (medicine databases with X-ray photos, private photo albums, etc.). To solve this task we can add some additional information to initial images and get it by request. We propose to use unequal error-correcting codes for this task. In our scheme we use special class of error correcting codes for coding. While researching process different schemes of division image (SDI) into significant and insignificant parts were analyzed. Here we represent some results of our research for the scheme using optimal code based on generalized (L,G)-codes with two different significance zones. This scheme was realized for several SDI to find the optimal one. It was found that it is possible to use this approach for DRM, error protection and information capacity increasing purpose in telecommunication systems. The future researc...

Research paper thumbnail of MLSB optimal effective weighted container construction for WF5 embedding algorithm

2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018

This paper proposes a multilevel digital watermarking method (WF5) research concentrated on weigh... more This paper proposes a multilevel digital watermarking method (WF5) research concentrated on weighted container structure. The primary goal of the research is to find the way how to construct an optimal, efficient weighted container to make an embedding errors invisible. Two types of effective weighted container structures were investigated for color digital images: One Pixel-One Codeword (OP-OC) and One Pixel-Two Codeword (OP-TC) constructions. For both approaches, efficient weighted container structures (masks) that correspond with the Human Vision System (HVS) model were developed, and efficiency of WF5 Multi-Level Significant Bit (MLSB) information embedding algorithms were investigated for different types of digital images.

Research paper thumbnail of Secure Environmental Monitoring for Industrial Internet of Things: from Framework to Live Implementation

2019 International Conference on Localization and GNSS (ICL-GNSS), 2019

Worldwide changes in climate and increasing pollution level are tremendously affecting the need f... more Worldwide changes in climate and increasing pollution level are tremendously affecting the need for environmental monitoring solutions. Recent activities in wireless sensor networks (WSNs) together with Cloud computing paradigm brought an entirely new perspective on monitoring as part of the Industrial Internet of Things (IIoT). However, most of the systems developed today are still facing lack of flexibility and security. This work presents the results of prototyping the IIoT wireless environmental monitoring system from both hardware and software sides. The developed mechanisms enable connectivity in infrastructure and mesh-like modes, where each sensor could act as relay allowing for improved node-failure resistance and scalability. Next, the authentication mechanism is proposed to enable transparent migration of any node between different network segments while keeping the overall operation secure. Finally, proof of the concept prototype deployment in real-life conditions shows ...

Research paper thumbnail of HEPPA: Highly Efficient Privacy Preserving Authentication for ITS

Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decr... more Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decrease road congestions. These systems require secure communication between both infrastructure and vehicles.

Research paper thumbnail of Analysis of IDS Alert Correlation Techniques for Attacker Group Recognition in Distributed Systems

Research paper thumbnail of Digital Watermarking Method Based on Image Compression Algorithms

Digital watermarking is an efficient method for digital access rights management utilized in the ... more Digital watermarking is an efficient method for digital access rights management utilized in the scope of multimedia data. A possibility to combine the procedure of compression and watermarking in effective way for digital images is proposed in this manuscript. This research is focused on the compression methods considering the significance of the initial multimedia object (for example image) different elements to increase the quality of process (compressed) image. One of the most effective approaches for this task is to utilize Error Correcting Codes (ECC) allowing to maintain the number of resulting errors (distortion) as well as the value of resulting compression ratio. The application of such codes enables to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach based on Weighted Hamming Metric guarantying the limitation of maximum errors (distortions) with predefined signific...

Research paper thumbnail of Dataset Selection for Attacker Group Identification Methods

2021 30th Conference of Open Innovations Association FRUCT, 2021

Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo ... more Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo antologi Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo antologi 20 te, også når han eller hun befinder sig ved en sådan ydergraense", skriver hun og fortsaetter med et udsagn om, at dette er et politisk projekt, som det internationale samfund aldrig har magtet at formulere (Kristeva, 2008, s. 66). 22 Med det mener hun, at anerkendelse i form af solidaritet er den bastion, der aktuelt skal kaempes for. Sammenholder vi Kristevas tanker med Jolliens pointe, bliver det synligt, at hvor Kristeva taler om individer, der bliver sig deres skrøbelighed bevidst, taler Jollien om, hvordan "fremmedheden" hos den Anden gør relationen skrøbelig. Den solidaritet, Kristeva taler om, kraever mere end professionel viden om bestemte diagnoser. Den kraever viden af specifik art for at kunne overvinde relationens fremmedhed. Men den kraever også empati og mod til at se sin egen sårbarhed, usikkerhed og tidvise professionelle uformåenhed i øjnene.

Research paper thumbnail of Image encryption in code based compression algorithms based on multilevel image structure model

2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2017

Image compression is a widely adopted technique used for effective image storage and transmission... more Image compression is a widely adopted technique used for effective image storage and transmission over open communication channels in cyber-physical systems. Standard cryptographic algorithms are usually used to reach this goal. Therefore, in order to organize effective and secure storage of images it is required to follow two independent and sequential procedures — compression and encryption. In the scenario of interest, it is needed to do compression and encryption transformations in reverse order to restore the original image, i.e. it is necessary to have a so-called “code book” similarly as for encryption and decryption to have a secret key. An effective way of combining these procedures for digital images is proposed in this manuscript. This research is mainly focused on the compression methods that consider significance of the initial multimedia object (for example image) different parts to increase the quality of resulting (decompressed) image. One of the most effective approaches for this task is to utilize error-correcting codes (ECC) that allow to limit the number of resulting errors (distortion) as well as to ensure the value of resulting compression ratio. Application of such codes enable to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach that is based on weighted Hamming metric that makes it possible to guaranty the limitation of maximum error number (distortions) that takes into consideration predefined significance of the image zones is represented as an example. The way to use subclass of Goppa codes perfect in weighted Hamming metric when Goppa polynomials are used as a secret key is presented as well. The additional effect of such encrypted compression methods is auto-watermarking of the resulting image.

Research paper thumbnail of Signing Documents by Hand: Model for Multi-Factor Authentication

Lecture Notes in Computer Science, 2018

Среди архивных материалов И.П. Сахарова (1807-1863) имеется подборка писем и фольклорных материал... more Среди архивных материалов И.П. Сахарова (1807-1863) имеется подборка писем и фольклорных материалов, присланных ему из Тихвина купцом Григорием Ивановичем Парихиным в 1839 г. Тихвинский собиратель передал Сахарову 22 песни, 70 загадок, 16 заговоров, одну сказку и другие тексты, которые позднее были частично опубликованы в сборниках Сахарова «Сказания русского народа о семейной жизни своих предков» и «Песни русского народа». Сверка текстов показала, что Сахаров правил и сокращал тексты, которые присылал ему Парихин. Письма из Тихвина позволяют выяснить факты из жизни одного из первых собирателей русского фольклора, его литературные вкусы, взаимоотношения с окружающими людьми. Публикуемые материалы представляют интерес и с точки зрения истории чтения и библиотечного дела. Второе письмо к Сахарову представляет собой своеобразную автобиографию, причем история жизни Парихина пишется главным образом как история добывания книг и их чтения. Знакомство Парихина с литературой началось с чтения подписей к лубочным картинкам, а затем продолжилось чтением русских и переводных сказок и повестей. Парихин не только выписывал для себя книги из Петербурга, но и давал их читать желающим, то есть создал небольшую частную библиотеку. В письмах проявляются литературные вкусы Парихина, в частности его отношение к поэзии А.С. Пушкина и прозе А.А. Марлинского. В стилистическом отношении письма можно рассматривать как пример смешения стилей деловой переписки и романтической художественной прозы в духе А.А. Марлинского. В письмах Парихина много диалектных и просторечных слов и выражений; благодаря фонетическому письму они позволяют воссоздать повседневную купеческую речь 1830-х гг.

Research paper thumbnail of Joint safety and security analysis for complex systems

2013 13th Conference of Open Innovations Association (FRUCT), 2013

The problem of joint safety and security analysis is considered. For complex systems method of fa... more The problem of joint safety and security analysis is considered. For complex systems method of fault tree analysis for safety and security is proposed. The effectiveness of new approach of joint safety and security analysis is shown on example of the European Railway Traffic Management System (ERTMS).

Research paper thumbnail of Environmental Monitoring with Distributed Mesh Networks: An Overview and Practical Implementation Perspective for Urban Scenario

Sensors, 2019

Almost inevitable climate change and increasing pollution levels around the world are the most si... more Almost inevitable climate change and increasing pollution levels around the world are the most significant drivers for the environmental monitoring evolution. Recent activities in the field of wireless sensor networks have made tremendous progress concerning conventional centralized sensor networks known for decades. However, most systems developed today still face challenges while estimating the trade-off between their flexibility and security. In this work, we provide an overview of the environmental monitoring strategies and applications. We conclude that wireless sensor networks of tomorrow would mostly have a distributed nature. Furthermore, we present the results of the developed secure distributed monitoring framework from both hardware and software perspectives. The developed mechanisms provide an ability for sensors to communicate in both infrastructure and mesh modes. The system allows each sensor node to act as a relay, which increases the system failure resistance and im...

Research paper thumbnail of Weighted digital watermarking approaches comparison

2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY), 2016

The comparison of efficiency of two such approaches LEBC embedding method and Weighted F5 embeddi... more The comparison of efficiency of two such approaches LEBC embedding method and Weighted F5 embedding that are used for weighted structures of container and F5 method that is used for least significant bit(LSB) embedding is made. The comparison metric was found for correct comparison of weighted and unweighted syndrome coding embedding. As a result the efficiency of weighted approach is shown on the example.

Research paper thumbnail of A Trial of Yoking-Proof Protocol in RFID-based Smart-Home Environment

Communications in Computer and Information Science, 2016

Owing to significant progress in the Internet of Things (IoT) within both academia and industry, ... more Owing to significant progress in the Internet of Things (IoT) within both academia and industry, this breakthrough technology is increasingly penetrating our everyday lives. However, the levels of user adoption and business revenue are still lagging behind the original expectations. The reasons include strong security and privacy concerns behind the IoT, which become critically important in the smart home environment. Our envisioned smart home scenario comprises a variety of sensors, actuators, and end-user devices interacting and sharing data securely. Correspondingly, we aim at investigating and verifying in practice the Yoking-proof protocol, which is a multi-factor authentication solution for smart home systems with an emphasis on data confidentiality and mutual authentication. Our international team conducted a large trial featuring the Yoking-proof protocol, RFID technology, as well as various sensors and user terminals. This paper outlines the essentials of this trial, reports on our practical experience, and summarizes the main lessons learned.

Research paper thumbnail of Effectiveness of LSB and MLSB information embedding for BMP images

2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT), 2016

Research paper thumbnail of Multi-level Significant Bit (MLSB) Embedding Based on Weighted Container Model and Weighted F5 Concept

Advances in Intelligent Systems and Computing, 2016

In this paper the weighted container concept of cover image jointly with error correcting codes p... more In this paper the weighted container concept of cover image jointly with error correcting codes perfect in weighted Hamming metric (ECCPWH) is consider. Such approach can improve the efficient of the ECC embedding schemes based on syndrome coding. To show the effectiveness of ECCPWH based scheme the example of multi-level significant bit (MLSB)embedding scheme applied to digital image is provided. ECCPWH based method is compared with the linear error-block codes (LEBC) steganography method that is based on linear error-block codes perfect in \(\pi \)- metric. The examples show that proposed MLSB embedding scheme that is based on ECCPWH approach is efficient for syndrome coding embedding algorithms.

Research paper thumbnail of Steganographic WF5 Method for Weighted Embedding: An Overview and Comparison

Lecture Notes in Computer Science, 2019

In this paper, we discuss steganographic methods LSB, F5, and WF5 for embedding information into ... more In this paper, we discuss steganographic methods LSB, F5, and WF5 for embedding information into a container to enable copyright protection. We analyze the difference between selected methods and show how to decrease the container distortion by dividing codewords into several zones of significance using perfect codes in the weighted Hamming metric. Additionally, we propose a number of variants for different container types and test some parameters on several images.

Research paper thumbnail of An algorithm for detecting RFID duplicates

Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022

Research paper thumbnail of Modern methods of increasing the information capacity of digital images

Research paper thumbnail of Digital Watermarking in RGB Domain on Weighted ECC

Digital watermarking is a technique for embedding imperceptible mark into digital content, with f... more Digital watermarking is a technique for embedding imperceptible mark into digital content, with further extraction of this mark. This paper proposes a watermarking method to embed watermark in the spatial domain using error-correcting codes. Image is divided into blocks. Two perfect error-correcting codes are used to embed watermark. Codeword of corresponding perfect code is written into one block to embed one watermark bit.

Research paper thumbnail of Advanced IoT Solution for Smart City Eco-monitoring System

Research paper thumbnail of Code methods for increasing the information capacity of digital images

This article is dedicated to the problem of increasing the information capacity of digital images... more This article is dedicated to the problem of increasing the information capacity of digital images. It's often necessary to have an additional information about chosen images (medicine databases with X-ray photos, private photo albums, etc.). To solve this task we can add some additional information to initial images and get it by request. We propose to use unequal error-correcting codes for this task. In our scheme we use special class of error correcting codes for coding. While researching process different schemes of division image (SDI) into significant and insignificant parts were analyzed. Here we represent some results of our research for the scheme using optimal code based on generalized (L,G)-codes with two different significance zones. This scheme was realized for several SDI to find the optimal one. It was found that it is possible to use this approach for DRM, error protection and information capacity increasing purpose in telecommunication systems. The future researc...

Research paper thumbnail of MLSB optimal effective weighted container construction for WF5 embedding algorithm

2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018

This paper proposes a multilevel digital watermarking method (WF5) research concentrated on weigh... more This paper proposes a multilevel digital watermarking method (WF5) research concentrated on weighted container structure. The primary goal of the research is to find the way how to construct an optimal, efficient weighted container to make an embedding errors invisible. Two types of effective weighted container structures were investigated for color digital images: One Pixel-One Codeword (OP-OC) and One Pixel-Two Codeword (OP-TC) constructions. For both approaches, efficient weighted container structures (masks) that correspond with the Human Vision System (HVS) model were developed, and efficiency of WF5 Multi-Level Significant Bit (MLSB) information embedding algorithms were investigated for different types of digital images.

Research paper thumbnail of Secure Environmental Monitoring for Industrial Internet of Things: from Framework to Live Implementation

2019 International Conference on Localization and GNSS (ICL-GNSS), 2019

Worldwide changes in climate and increasing pollution level are tremendously affecting the need f... more Worldwide changes in climate and increasing pollution level are tremendously affecting the need for environmental monitoring solutions. Recent activities in wireless sensor networks (WSNs) together with Cloud computing paradigm brought an entirely new perspective on monitoring as part of the Industrial Internet of Things (IIoT). However, most of the systems developed today are still facing lack of flexibility and security. This work presents the results of prototyping the IIoT wireless environmental monitoring system from both hardware and software sides. The developed mechanisms enable connectivity in infrastructure and mesh-like modes, where each sensor could act as relay allowing for improved node-failure resistance and scalability. Next, the authentication mechanism is proposed to enable transparent migration of any node between different network segments while keeping the overall operation secure. Finally, proof of the concept prototype deployment in real-life conditions shows ...

Research paper thumbnail of HEPPA: Highly Efficient Privacy Preserving Authentication for ITS

Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decr... more Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decrease road congestions. These systems require secure communication between both infrastructure and vehicles.

Research paper thumbnail of Analysis of IDS Alert Correlation Techniques for Attacker Group Recognition in Distributed Systems

Research paper thumbnail of Digital Watermarking Method Based on Image Compression Algorithms

Digital watermarking is an efficient method for digital access rights management utilized in the ... more Digital watermarking is an efficient method for digital access rights management utilized in the scope of multimedia data. A possibility to combine the procedure of compression and watermarking in effective way for digital images is proposed in this manuscript. This research is focused on the compression methods considering the significance of the initial multimedia object (for example image) different elements to increase the quality of process (compressed) image. One of the most effective approaches for this task is to utilize Error Correcting Codes (ECC) allowing to maintain the number of resulting errors (distortion) as well as the value of resulting compression ratio. The application of such codes enables to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach based on Weighted Hamming Metric guarantying the limitation of maximum errors (distortions) with predefined signific...

Research paper thumbnail of Dataset Selection for Attacker Group Identification Methods

2021 30th Conference of Open Innovations Association FRUCT, 2021

Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo ... more Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo antologi Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo antologi 20 te, også når han eller hun befinder sig ved en sådan ydergraense", skriver hun og fortsaetter med et udsagn om, at dette er et politisk projekt, som det internationale samfund aldrig har magtet at formulere (Kristeva, 2008, s. 66). 22 Med det mener hun, at anerkendelse i form af solidaritet er den bastion, der aktuelt skal kaempes for. Sammenholder vi Kristevas tanker med Jolliens pointe, bliver det synligt, at hvor Kristeva taler om individer, der bliver sig deres skrøbelighed bevidst, taler Jollien om, hvordan "fremmedheden" hos den Anden gør relationen skrøbelig. Den solidaritet, Kristeva taler om, kraever mere end professionel viden om bestemte diagnoser. Den kraever viden af specifik art for at kunne overvinde relationens fremmedhed. Men den kraever også empati og mod til at se sin egen sårbarhed, usikkerhed og tidvise professionelle uformåenhed i øjnene.

Research paper thumbnail of Image encryption in code based compression algorithms based on multilevel image structure model

2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2017

Image compression is a widely adopted technique used for effective image storage and transmission... more Image compression is a widely adopted technique used for effective image storage and transmission over open communication channels in cyber-physical systems. Standard cryptographic algorithms are usually used to reach this goal. Therefore, in order to organize effective and secure storage of images it is required to follow two independent and sequential procedures — compression and encryption. In the scenario of interest, it is needed to do compression and encryption transformations in reverse order to restore the original image, i.e. it is necessary to have a so-called “code book” similarly as for encryption and decryption to have a secret key. An effective way of combining these procedures for digital images is proposed in this manuscript. This research is mainly focused on the compression methods that consider significance of the initial multimedia object (for example image) different parts to increase the quality of resulting (decompressed) image. One of the most effective approaches for this task is to utilize error-correcting codes (ECC) that allow to limit the number of resulting errors (distortion) as well as to ensure the value of resulting compression ratio. Application of such codes enable to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach that is based on weighted Hamming metric that makes it possible to guaranty the limitation of maximum error number (distortions) that takes into consideration predefined significance of the image zones is represented as an example. The way to use subclass of Goppa codes perfect in weighted Hamming metric when Goppa polynomials are used as a secret key is presented as well. The additional effect of such encrypted compression methods is auto-watermarking of the resulting image.

Research paper thumbnail of Signing Documents by Hand: Model for Multi-Factor Authentication

Lecture Notes in Computer Science, 2018

Среди архивных материалов И.П. Сахарова (1807-1863) имеется подборка писем и фольклорных материал... more Среди архивных материалов И.П. Сахарова (1807-1863) имеется подборка писем и фольклорных материалов, присланных ему из Тихвина купцом Григорием Ивановичем Парихиным в 1839 г. Тихвинский собиратель передал Сахарову 22 песни, 70 загадок, 16 заговоров, одну сказку и другие тексты, которые позднее были частично опубликованы в сборниках Сахарова «Сказания русского народа о семейной жизни своих предков» и «Песни русского народа». Сверка текстов показала, что Сахаров правил и сокращал тексты, которые присылал ему Парихин. Письма из Тихвина позволяют выяснить факты из жизни одного из первых собирателей русского фольклора, его литературные вкусы, взаимоотношения с окружающими людьми. Публикуемые материалы представляют интерес и с точки зрения истории чтения и библиотечного дела. Второе письмо к Сахарову представляет собой своеобразную автобиографию, причем история жизни Парихина пишется главным образом как история добывания книг и их чтения. Знакомство Парихина с литературой началось с чтения подписей к лубочным картинкам, а затем продолжилось чтением русских и переводных сказок и повестей. Парихин не только выписывал для себя книги из Петербурга, но и давал их читать желающим, то есть создал небольшую частную библиотеку. В письмах проявляются литературные вкусы Парихина, в частности его отношение к поэзии А.С. Пушкина и прозе А.А. Марлинского. В стилистическом отношении письма можно рассматривать как пример смешения стилей деловой переписки и романтической художественной прозы в духе А.А. Марлинского. В письмах Парихина много диалектных и просторечных слов и выражений; благодаря фонетическому письму они позволяют воссоздать повседневную купеческую речь 1830-х гг.

Research paper thumbnail of Joint safety and security analysis for complex systems

2013 13th Conference of Open Innovations Association (FRUCT), 2013

The problem of joint safety and security analysis is considered. For complex systems method of fa... more The problem of joint safety and security analysis is considered. For complex systems method of fault tree analysis for safety and security is proposed. The effectiveness of new approach of joint safety and security analysis is shown on example of the European Railway Traffic Management System (ERTMS).

Research paper thumbnail of Environmental Monitoring with Distributed Mesh Networks: An Overview and Practical Implementation Perspective for Urban Scenario

Sensors, 2019

Almost inevitable climate change and increasing pollution levels around the world are the most si... more Almost inevitable climate change and increasing pollution levels around the world are the most significant drivers for the environmental monitoring evolution. Recent activities in the field of wireless sensor networks have made tremendous progress concerning conventional centralized sensor networks known for decades. However, most systems developed today still face challenges while estimating the trade-off between their flexibility and security. In this work, we provide an overview of the environmental monitoring strategies and applications. We conclude that wireless sensor networks of tomorrow would mostly have a distributed nature. Furthermore, we present the results of the developed secure distributed monitoring framework from both hardware and software perspectives. The developed mechanisms provide an ability for sensors to communicate in both infrastructure and mesh modes. The system allows each sensor node to act as a relay, which increases the system failure resistance and im...

Research paper thumbnail of Weighted digital watermarking approaches comparison

2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY), 2016

The comparison of efficiency of two such approaches LEBC embedding method and Weighted F5 embeddi... more The comparison of efficiency of two such approaches LEBC embedding method and Weighted F5 embedding that are used for weighted structures of container and F5 method that is used for least significant bit(LSB) embedding is made. The comparison metric was found for correct comparison of weighted and unweighted syndrome coding embedding. As a result the efficiency of weighted approach is shown on the example.

Research paper thumbnail of A Trial of Yoking-Proof Protocol in RFID-based Smart-Home Environment

Communications in Computer and Information Science, 2016

Owing to significant progress in the Internet of Things (IoT) within both academia and industry, ... more Owing to significant progress in the Internet of Things (IoT) within both academia and industry, this breakthrough technology is increasingly penetrating our everyday lives. However, the levels of user adoption and business revenue are still lagging behind the original expectations. The reasons include strong security and privacy concerns behind the IoT, which become critically important in the smart home environment. Our envisioned smart home scenario comprises a variety of sensors, actuators, and end-user devices interacting and sharing data securely. Correspondingly, we aim at investigating and verifying in practice the Yoking-proof protocol, which is a multi-factor authentication solution for smart home systems with an emphasis on data confidentiality and mutual authentication. Our international team conducted a large trial featuring the Yoking-proof protocol, RFID technology, as well as various sensors and user terminals. This paper outlines the essentials of this trial, reports on our practical experience, and summarizes the main lessons learned.

Research paper thumbnail of Effectiveness of LSB and MLSB information embedding for BMP images

2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT), 2016

Research paper thumbnail of Multi-level Significant Bit (MLSB) Embedding Based on Weighted Container Model and Weighted F5 Concept

Advances in Intelligent Systems and Computing, 2016

In this paper the weighted container concept of cover image jointly with error correcting codes p... more In this paper the weighted container concept of cover image jointly with error correcting codes perfect in weighted Hamming metric (ECCPWH) is consider. Such approach can improve the efficient of the ECC embedding schemes based on syndrome coding. To show the effectiveness of ECCPWH based scheme the example of multi-level significant bit (MLSB)embedding scheme applied to digital image is provided. ECCPWH based method is compared with the linear error-block codes (LEBC) steganography method that is based on linear error-block codes perfect in \(\pi \)- metric. The examples show that proposed MLSB embedding scheme that is based on ECCPWH approach is efficient for syndrome coding embedding algorithms.