Natalia Voloshina - Academia.edu (original) (raw)
Papers by Natalia Voloshina
Lecture Notes in Computer Science, 2019
In this paper, we discuss steganographic methods LSB, F5, and WF5 for embedding information into ... more In this paper, we discuss steganographic methods LSB, F5, and WF5 for embedding information into a container to enable copyright protection. We analyze the difference between selected methods and show how to decrease the container distortion by dividing codewords into several zones of significance using perfect codes in the weighted Hamming metric. Additionally, we propose a number of variants for different container types and test some parameters on several images.
Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022
Digital watermarking is a technique for embedding imperceptible mark into digital content, with f... more Digital watermarking is a technique for embedding imperceptible mark into digital content, with further extraction of this mark. This paper proposes a watermarking method to embed watermark in the spatial domain using error-correcting codes. Image is divided into blocks. Two perfect error-correcting codes are used to embed watermark. Codeword of corresponding perfect code is written into one block to embed one watermark bit.
This article is dedicated to the problem of increasing the information capacity of digital images... more This article is dedicated to the problem of increasing the information capacity of digital images. It's often necessary to have an additional information about chosen images (medicine databases with X-ray photos, private photo albums, etc.). To solve this task we can add some additional information to initial images and get it by request. We propose to use unequal error-correcting codes for this task. In our scheme we use special class of error correcting codes for coding. While researching process different schemes of division image (SDI) into significant and insignificant parts were analyzed. Here we represent some results of our research for the scheme using optimal code based on generalized (L,G)-codes with two different significance zones. This scheme was realized for several SDI to find the optimal one. It was found that it is possible to use this approach for DRM, error protection and information capacity increasing purpose in telecommunication systems. The future researc...
2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018
This paper proposes a multilevel digital watermarking method (WF5) research concentrated on weigh... more This paper proposes a multilevel digital watermarking method (WF5) research concentrated on weighted container structure. The primary goal of the research is to find the way how to construct an optimal, efficient weighted container to make an embedding errors invisible. Two types of effective weighted container structures were investigated for color digital images: One Pixel-One Codeword (OP-OC) and One Pixel-Two Codeword (OP-TC) constructions. For both approaches, efficient weighted container structures (masks) that correspond with the Human Vision System (HVS) model were developed, and efficiency of WF5 Multi-Level Significant Bit (MLSB) information embedding algorithms were investigated for different types of digital images.
2019 International Conference on Localization and GNSS (ICL-GNSS), 2019
Worldwide changes in climate and increasing pollution level are tremendously affecting the need f... more Worldwide changes in climate and increasing pollution level are tremendously affecting the need for environmental monitoring solutions. Recent activities in wireless sensor networks (WSNs) together with Cloud computing paradigm brought an entirely new perspective on monitoring as part of the Industrial Internet of Things (IIoT). However, most of the systems developed today are still facing lack of flexibility and security. This work presents the results of prototyping the IIoT wireless environmental monitoring system from both hardware and software sides. The developed mechanisms enable connectivity in infrastructure and mesh-like modes, where each sensor could act as relay allowing for improved node-failure resistance and scalability. Next, the authentication mechanism is proposed to enable transparent migration of any node between different network segments while keeping the overall operation secure. Finally, proof of the concept prototype deployment in real-life conditions shows ...
Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decr... more Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decrease road congestions. These systems require secure communication between both infrastructure and vehicles.
Digital watermarking is an efficient method for digital access rights management utilized in the ... more Digital watermarking is an efficient method for digital access rights management utilized in the scope of multimedia data. A possibility to combine the procedure of compression and watermarking in effective way for digital images is proposed in this manuscript. This research is focused on the compression methods considering the significance of the initial multimedia object (for example image) different elements to increase the quality of process (compressed) image. One of the most effective approaches for this task is to utilize Error Correcting Codes (ECC) allowing to maintain the number of resulting errors (distortion) as well as the value of resulting compression ratio. The application of such codes enables to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach based on Weighted Hamming Metric guarantying the limitation of maximum errors (distortions) with predefined signific...
2021 30th Conference of Open Innovations Association FRUCT, 2021
Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo ... more Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo antologi Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo antologi 20 te, også når han eller hun befinder sig ved en sådan ydergraense", skriver hun og fortsaetter med et udsagn om, at dette er et politisk projekt, som det internationale samfund aldrig har magtet at formulere (Kristeva, 2008, s. 66). 22 Med det mener hun, at anerkendelse i form af solidaritet er den bastion, der aktuelt skal kaempes for. Sammenholder vi Kristevas tanker med Jolliens pointe, bliver det synligt, at hvor Kristeva taler om individer, der bliver sig deres skrøbelighed bevidst, taler Jollien om, hvordan "fremmedheden" hos den Anden gør relationen skrøbelig. Den solidaritet, Kristeva taler om, kraever mere end professionel viden om bestemte diagnoser. Den kraever viden af specifik art for at kunne overvinde relationens fremmedhed. Men den kraever også empati og mod til at se sin egen sårbarhed, usikkerhed og tidvise professionelle uformåenhed i øjnene.
2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2017
Image compression is a widely adopted technique used for effective image storage and transmission... more Image compression is a widely adopted technique used for effective image storage and transmission over open communication channels in cyber-physical systems. Standard cryptographic algorithms are usually used to reach this goal. Therefore, in order to organize effective and secure storage of images it is required to follow two independent and sequential procedures — compression and encryption. In the scenario of interest, it is needed to do compression and encryption transformations in reverse order to restore the original image, i.e. it is necessary to have a so-called “code book” similarly as for encryption and decryption to have a secret key. An effective way of combining these procedures for digital images is proposed in this manuscript. This research is mainly focused on the compression methods that consider significance of the initial multimedia object (for example image) different parts to increase the quality of resulting (decompressed) image. One of the most effective approaches for this task is to utilize error-correcting codes (ECC) that allow to limit the number of resulting errors (distortion) as well as to ensure the value of resulting compression ratio. Application of such codes enable to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach that is based on weighted Hamming metric that makes it possible to guaranty the limitation of maximum error number (distortions) that takes into consideration predefined significance of the image zones is represented as an example. The way to use subclass of Goppa codes perfect in weighted Hamming metric when Goppa polynomials are used as a secret key is presented as well. The additional effect of such encrypted compression methods is auto-watermarking of the resulting image.
Lecture Notes in Computer Science, 2018
Среди архивных материалов И.П. Сахарова (1807-1863) имеется подборка писем и фольклорных материал... more Среди архивных материалов И.П. Сахарова (1807-1863) имеется подборка писем и фольклорных материалов, присланных ему из Тихвина купцом Григорием Ивановичем Парихиным в 1839 г. Тихвинский собиратель передал Сахарову 22 песни, 70 загадок, 16 заговоров, одну сказку и другие тексты, которые позднее были частично опубликованы в сборниках Сахарова «Сказания русского народа о семейной жизни своих предков» и «Песни русского народа». Сверка текстов показала, что Сахаров правил и сокращал тексты, которые присылал ему Парихин. Письма из Тихвина позволяют выяснить факты из жизни одного из первых собирателей русского фольклора, его литературные вкусы, взаимоотношения с окружающими людьми. Публикуемые материалы представляют интерес и с точки зрения истории чтения и библиотечного дела. Второе письмо к Сахарову представляет собой своеобразную автобиографию, причем история жизни Парихина пишется главным образом как история добывания книг и их чтения. Знакомство Парихина с литературой началось с чтения подписей к лубочным картинкам, а затем продолжилось чтением русских и переводных сказок и повестей. Парихин не только выписывал для себя книги из Петербурга, но и давал их читать желающим, то есть создал небольшую частную библиотеку. В письмах проявляются литературные вкусы Парихина, в частности его отношение к поэзии А.С. Пушкина и прозе А.А. Марлинского. В стилистическом отношении письма можно рассматривать как пример смешения стилей деловой переписки и романтической художественной прозы в духе А.А. Марлинского. В письмах Парихина много диалектных и просторечных слов и выражений; благодаря фонетическому письму они позволяют воссоздать повседневную купеческую речь 1830-х гг.
2013 13th Conference of Open Innovations Association (FRUCT), 2013
The problem of joint safety and security analysis is considered. For complex systems method of fa... more The problem of joint safety and security analysis is considered. For complex systems method of fault tree analysis for safety and security is proposed. The effectiveness of new approach of joint safety and security analysis is shown on example of the European Railway Traffic Management System (ERTMS).
Sensors, 2019
Almost inevitable climate change and increasing pollution levels around the world are the most si... more Almost inevitable climate change and increasing pollution levels around the world are the most significant drivers for the environmental monitoring evolution. Recent activities in the field of wireless sensor networks have made tremendous progress concerning conventional centralized sensor networks known for decades. However, most systems developed today still face challenges while estimating the trade-off between their flexibility and security. In this work, we provide an overview of the environmental monitoring strategies and applications. We conclude that wireless sensor networks of tomorrow would mostly have a distributed nature. Furthermore, we present the results of the developed secure distributed monitoring framework from both hardware and software perspectives. The developed mechanisms provide an ability for sensors to communicate in both infrastructure and mesh modes. The system allows each sensor node to act as a relay, which increases the system failure resistance and im...
2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY), 2016
The comparison of efficiency of two such approaches LEBC embedding method and Weighted F5 embeddi... more The comparison of efficiency of two such approaches LEBC embedding method and Weighted F5 embedding that are used for weighted structures of container and F5 method that is used for least significant bit(LSB) embedding is made. The comparison metric was found for correct comparison of weighted and unweighted syndrome coding embedding. As a result the efficiency of weighted approach is shown on the example.
Communications in Computer and Information Science, 2016
Owing to significant progress in the Internet of Things (IoT) within both academia and industry, ... more Owing to significant progress in the Internet of Things (IoT) within both academia and industry, this breakthrough technology is increasingly penetrating our everyday lives. However, the levels of user adoption and business revenue are still lagging behind the original expectations. The reasons include strong security and privacy concerns behind the IoT, which become critically important in the smart home environment. Our envisioned smart home scenario comprises a variety of sensors, actuators, and end-user devices interacting and sharing data securely. Correspondingly, we aim at investigating and verifying in practice the Yoking-proof protocol, which is a multi-factor authentication solution for smart home systems with an emphasis on data confidentiality and mutual authentication. Our international team conducted a large trial featuring the Yoking-proof protocol, RFID technology, as well as various sensors and user terminals. This paper outlines the essentials of this trial, reports on our practical experience, and summarizes the main lessons learned.
2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT), 2016
Advances in Intelligent Systems and Computing, 2016
In this paper the weighted container concept of cover image jointly with error correcting codes p... more In this paper the weighted container concept of cover image jointly with error correcting codes perfect in weighted Hamming metric (ECCPWH) is consider. Such approach can improve the efficient of the ECC embedding schemes based on syndrome coding. To show the effectiveness of ECCPWH based scheme the example of multi-level significant bit (MLSB)embedding scheme applied to digital image is provided. ECCPWH based method is compared with the linear error-block codes (LEBC) steganography method that is based on linear error-block codes perfect in \(\pi \)- metric. The examples show that proposed MLSB embedding scheme that is based on ECCPWH approach is efficient for syndrome coding embedding algorithms.
Lecture Notes in Computer Science, 2019
In this paper, we discuss steganographic methods LSB, F5, and WF5 for embedding information into ... more In this paper, we discuss steganographic methods LSB, F5, and WF5 for embedding information into a container to enable copyright protection. We analyze the difference between selected methods and show how to decrease the container distortion by dividing codewords into several zones of significance using perfect codes in the weighted Hamming metric. Additionally, we propose a number of variants for different container types and test some parameters on several images.
Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022
Digital watermarking is a technique for embedding imperceptible mark into digital content, with f... more Digital watermarking is a technique for embedding imperceptible mark into digital content, with further extraction of this mark. This paper proposes a watermarking method to embed watermark in the spatial domain using error-correcting codes. Image is divided into blocks. Two perfect error-correcting codes are used to embed watermark. Codeword of corresponding perfect code is written into one block to embed one watermark bit.
This article is dedicated to the problem of increasing the information capacity of digital images... more This article is dedicated to the problem of increasing the information capacity of digital images. It's often necessary to have an additional information about chosen images (medicine databases with X-ray photos, private photo albums, etc.). To solve this task we can add some additional information to initial images and get it by request. We propose to use unequal error-correcting codes for this task. In our scheme we use special class of error correcting codes for coding. While researching process different schemes of division image (SDI) into significant and insignificant parts were analyzed. Here we represent some results of our research for the scheme using optimal code based on generalized (L,G)-codes with two different significance zones. This scheme was realized for several SDI to find the optimal one. It was found that it is possible to use this approach for DRM, error protection and information capacity increasing purpose in telecommunication systems. The future researc...
2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018
This paper proposes a multilevel digital watermarking method (WF5) research concentrated on weigh... more This paper proposes a multilevel digital watermarking method (WF5) research concentrated on weighted container structure. The primary goal of the research is to find the way how to construct an optimal, efficient weighted container to make an embedding errors invisible. Two types of effective weighted container structures were investigated for color digital images: One Pixel-One Codeword (OP-OC) and One Pixel-Two Codeword (OP-TC) constructions. For both approaches, efficient weighted container structures (masks) that correspond with the Human Vision System (HVS) model were developed, and efficiency of WF5 Multi-Level Significant Bit (MLSB) information embedding algorithms were investigated for different types of digital images.
2019 International Conference on Localization and GNSS (ICL-GNSS), 2019
Worldwide changes in climate and increasing pollution level are tremendously affecting the need f... more Worldwide changes in climate and increasing pollution level are tremendously affecting the need for environmental monitoring solutions. Recent activities in wireless sensor networks (WSNs) together with Cloud computing paradigm brought an entirely new perspective on monitoring as part of the Industrial Internet of Things (IIoT). However, most of the systems developed today are still facing lack of flexibility and security. This work presents the results of prototyping the IIoT wireless environmental monitoring system from both hardware and software sides. The developed mechanisms enable connectivity in infrastructure and mesh-like modes, where each sensor could act as relay allowing for improved node-failure resistance and scalability. Next, the authentication mechanism is proposed to enable transparent migration of any node between different network segments while keeping the overall operation secure. Finally, proof of the concept prototype deployment in real-life conditions shows ...
Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decr... more Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decrease road congestions. These systems require secure communication between both infrastructure and vehicles.
Digital watermarking is an efficient method for digital access rights management utilized in the ... more Digital watermarking is an efficient method for digital access rights management utilized in the scope of multimedia data. A possibility to combine the procedure of compression and watermarking in effective way for digital images is proposed in this manuscript. This research is focused on the compression methods considering the significance of the initial multimedia object (for example image) different elements to increase the quality of process (compressed) image. One of the most effective approaches for this task is to utilize Error Correcting Codes (ECC) allowing to maintain the number of resulting errors (distortion) as well as the value of resulting compression ratio. The application of such codes enables to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach based on Weighted Hamming Metric guarantying the limitation of maximum errors (distortions) with predefined signific...
2021 30th Conference of Open Innovations Association FRUCT, 2021
Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo ... more Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo antologi Perspektiver på paedagogisk faglighed i botilbud for voksne med udviklingshaemning-en KvaliKomBo antologi 20 te, også når han eller hun befinder sig ved en sådan ydergraense", skriver hun og fortsaetter med et udsagn om, at dette er et politisk projekt, som det internationale samfund aldrig har magtet at formulere (Kristeva, 2008, s. 66). 22 Med det mener hun, at anerkendelse i form af solidaritet er den bastion, der aktuelt skal kaempes for. Sammenholder vi Kristevas tanker med Jolliens pointe, bliver det synligt, at hvor Kristeva taler om individer, der bliver sig deres skrøbelighed bevidst, taler Jollien om, hvordan "fremmedheden" hos den Anden gør relationen skrøbelig. Den solidaritet, Kristeva taler om, kraever mere end professionel viden om bestemte diagnoser. Den kraever viden af specifik art for at kunne overvinde relationens fremmedhed. Men den kraever også empati og mod til at se sin egen sårbarhed, usikkerhed og tidvise professionelle uformåenhed i øjnene.
2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2017
Image compression is a widely adopted technique used for effective image storage and transmission... more Image compression is a widely adopted technique used for effective image storage and transmission over open communication channels in cyber-physical systems. Standard cryptographic algorithms are usually used to reach this goal. Therefore, in order to organize effective and secure storage of images it is required to follow two independent and sequential procedures — compression and encryption. In the scenario of interest, it is needed to do compression and encryption transformations in reverse order to restore the original image, i.e. it is necessary to have a so-called “code book” similarly as for encryption and decryption to have a secret key. An effective way of combining these procedures for digital images is proposed in this manuscript. This research is mainly focused on the compression methods that consider significance of the initial multimedia object (for example image) different parts to increase the quality of resulting (decompressed) image. One of the most effective approaches for this task is to utilize error-correcting codes (ECC) that allow to limit the number of resulting errors (distortion) as well as to ensure the value of resulting compression ratio. Application of such codes enable to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach that is based on weighted Hamming metric that makes it possible to guaranty the limitation of maximum error number (distortions) that takes into consideration predefined significance of the image zones is represented as an example. The way to use subclass of Goppa codes perfect in weighted Hamming metric when Goppa polynomials are used as a secret key is presented as well. The additional effect of such encrypted compression methods is auto-watermarking of the resulting image.
Lecture Notes in Computer Science, 2018
Среди архивных материалов И.П. Сахарова (1807-1863) имеется подборка писем и фольклорных материал... more Среди архивных материалов И.П. Сахарова (1807-1863) имеется подборка писем и фольклорных материалов, присланных ему из Тихвина купцом Григорием Ивановичем Парихиным в 1839 г. Тихвинский собиратель передал Сахарову 22 песни, 70 загадок, 16 заговоров, одну сказку и другие тексты, которые позднее были частично опубликованы в сборниках Сахарова «Сказания русского народа о семейной жизни своих предков» и «Песни русского народа». Сверка текстов показала, что Сахаров правил и сокращал тексты, которые присылал ему Парихин. Письма из Тихвина позволяют выяснить факты из жизни одного из первых собирателей русского фольклора, его литературные вкусы, взаимоотношения с окружающими людьми. Публикуемые материалы представляют интерес и с точки зрения истории чтения и библиотечного дела. Второе письмо к Сахарову представляет собой своеобразную автобиографию, причем история жизни Парихина пишется главным образом как история добывания книг и их чтения. Знакомство Парихина с литературой началось с чтения подписей к лубочным картинкам, а затем продолжилось чтением русских и переводных сказок и повестей. Парихин не только выписывал для себя книги из Петербурга, но и давал их читать желающим, то есть создал небольшую частную библиотеку. В письмах проявляются литературные вкусы Парихина, в частности его отношение к поэзии А.С. Пушкина и прозе А.А. Марлинского. В стилистическом отношении письма можно рассматривать как пример смешения стилей деловой переписки и романтической художественной прозы в духе А.А. Марлинского. В письмах Парихина много диалектных и просторечных слов и выражений; благодаря фонетическому письму они позволяют воссоздать повседневную купеческую речь 1830-х гг.
2013 13th Conference of Open Innovations Association (FRUCT), 2013
The problem of joint safety and security analysis is considered. For complex systems method of fa... more The problem of joint safety and security analysis is considered. For complex systems method of fault tree analysis for safety and security is proposed. The effectiveness of new approach of joint safety and security analysis is shown on example of the European Railway Traffic Management System (ERTMS).
Sensors, 2019
Almost inevitable climate change and increasing pollution levels around the world are the most si... more Almost inevitable climate change and increasing pollution levels around the world are the most significant drivers for the environmental monitoring evolution. Recent activities in the field of wireless sensor networks have made tremendous progress concerning conventional centralized sensor networks known for decades. However, most systems developed today still face challenges while estimating the trade-off between their flexibility and security. In this work, we provide an overview of the environmental monitoring strategies and applications. We conclude that wireless sensor networks of tomorrow would mostly have a distributed nature. Furthermore, we present the results of the developed secure distributed monitoring framework from both hardware and software perspectives. The developed mechanisms provide an ability for sensors to communicate in both infrastructure and mesh modes. The system allows each sensor node to act as a relay, which increases the system failure resistance and im...
2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY), 2016
The comparison of efficiency of two such approaches LEBC embedding method and Weighted F5 embeddi... more The comparison of efficiency of two such approaches LEBC embedding method and Weighted F5 embedding that are used for weighted structures of container and F5 method that is used for least significant bit(LSB) embedding is made. The comparison metric was found for correct comparison of weighted and unweighted syndrome coding embedding. As a result the efficiency of weighted approach is shown on the example.
Communications in Computer and Information Science, 2016
Owing to significant progress in the Internet of Things (IoT) within both academia and industry, ... more Owing to significant progress in the Internet of Things (IoT) within both academia and industry, this breakthrough technology is increasingly penetrating our everyday lives. However, the levels of user adoption and business revenue are still lagging behind the original expectations. The reasons include strong security and privacy concerns behind the IoT, which become critically important in the smart home environment. Our envisioned smart home scenario comprises a variety of sensors, actuators, and end-user devices interacting and sharing data securely. Correspondingly, we aim at investigating and verifying in practice the Yoking-proof protocol, which is a multi-factor authentication solution for smart home systems with an emphasis on data confidentiality and mutual authentication. Our international team conducted a large trial featuring the Yoking-proof protocol, RFID technology, as well as various sensors and user terminals. This paper outlines the essentials of this trial, reports on our practical experience, and summarizes the main lessons learned.
2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT), 2016
Advances in Intelligent Systems and Computing, 2016
In this paper the weighted container concept of cover image jointly with error correcting codes p... more In this paper the weighted container concept of cover image jointly with error correcting codes perfect in weighted Hamming metric (ECCPWH) is consider. Such approach can improve the efficient of the ECC embedding schemes based on syndrome coding. To show the effectiveness of ECCPWH based scheme the example of multi-level significant bit (MLSB)embedding scheme applied to digital image is provided. ECCPWH based method is compared with the linear error-block codes (LEBC) steganography method that is based on linear error-block codes perfect in \(\pi \)- metric. The examples show that proposed MLSB embedding scheme that is based on ECCPWH approach is efficient for syndrome coding embedding algorithms.