Approaches to optimizing thes of reading steganographic information in vector images
This research addresses the significant challenge of low retrieval performance when extracting steganographic information from vector images, specifically within the context of CAD documentation used in information security systems. It is demonstrated that without prior knowledge of data placement,...
Saved in:
| Date: | 2026 |
|---|---|
| Main Authors: | Казміді, І. Д., Зубок, В. Ю. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2026
|
| Subjects: | |
| Online Access: | https://drsp.ipri.kiev.ua/article/view/358613 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Synergy of quantum computing and federated learning in information technology detection of hidden target groups
by: Fadeichev, Serhii, et al.
Published: (2025)
by: Fadeichev, Serhii, et al.
Published: (2025)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Digital platform for managing investment projects within the "government-business-society" relations based on partnership
by: Petrova, I.
Published: (2024)
by: Petrova, I.
Published: (2024)
Conceptual model of a manufacturing enterprise’s digital ecosystem in the context of Industry 4.0.
by: Loza, S.
Published: (2025)
by: Loza, S.
Published: (2025)
Considering risks when using information technology
by: Diachenko, V.
Published: (2024)
by: Diachenko, V.
Published: (2024)
The Economic Impact of Cloud Technologies on the Industry 4.0 Development
by: Reznikov, R.
Published: (2023)
by: Reznikov, R.
Published: (2023)
World Experience in the Digitalization of Public Administration in the Development of the Tourist and Recreational Sphere
by: Boretska, N., et al.
Published: (2021)
by: Boretska, N., et al.
Published: (2021)
Platform Strategiarchy as a Tool for Reducing Information Asymmetry, Taking into Account the Scale, Cardinality and Order of the Strategy
by: Vyshnevskyi, O.
Published: (2023)
by: Vyshnevskyi, O.
Published: (2023)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Method of detecting falsification in medical images
by: Zorylo, V. V., et al.
Published: (2015)
by: Zorylo, V. V., et al.
Published: (2015)
Theoretical basis for a new approach to the problem of identifying the results of cloning in digital images stored in lossy formats
by: Kobozeva, A. A., et al.
Published: (2015)
by: Kobozeva, A. A., et al.
Published: (2015)
Storing Ukrainian folk music collections by digitizing the Osyp Rozdolskyj phonographic collection
by: Kryuchyn, A. A., et al.
Published: (2016)
by: Kryuchyn, A. A., et al.
Published: (2016)
Security of decision support systems based on decentralized data platforms
by: Савченко, М. М.
Published: (2023)
by: Савченко, М. М.
Published: (2023)
Digitization of archival and historical data on destroyed cultural heritage objects within the Zelenyi Hai archaeological complex of the 8th-13th centuries
by: Pavlenko, Ivan, et al.
Published: (2025)
by: Pavlenko, Ivan, et al.
Published: (2025)
A method for integrating images of different wave bands with the goal of creating universal references for combined correlation-extreme navigation systems
by: Mezentsev, A. V., et al.
Published: (2018)
by: Mezentsev, A. V., et al.
Published: (2018)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Security challenges and semantic risks in distributed information systems with a unified information space
by: Храмова , І. О.
Published: (2026)
by: Храмова , І. О.
Published: (2026)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2020)
Published: (2020)
Workshop with International Participation ‘‘New Trends in Cancer Research and Innovative Tumor Vaccines’’, May 11–12, 2017, Kyiv, Ukraine
Published: (2017)
Published: (2017)
For contributors to SPQEO
Published: (2019)
Published: (2019)
The III Swedish-Ukrainian meeting on cancer diseases
Published: (2016)
Published: (2016)
Information for contributors to SPQEO
Published: (2020)
Published: (2020)
Symposium and Summer School “Fundamental principles of cancer biotherapy” Kyiv, Ukraine, May 21-24, 2018
Published: (2018)
Published: (2018)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
International scientific conference ‘‘Normal and cancer stem cells: discovery, diagnosis and therapy’’ october 5–6, 2017 Kyiv, Ukraine
Published: (2017)
Published: (2017)
Oncology. Selected lectures
Published: (2011)
Published: (2011)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
For contributors to SPQEO
Published: (2019)
Published: (2019)
Analysis of Nearfield Method for Optical Data Storage Using Microstrip Probe Under Illumi-nating Mode
by: Lapchuk, A. S., et al.
Published: (2013)
by: Lapchuk, A. S., et al.
Published: (2013)
Similar Items
-
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019) -
Synergy of quantum computing and federated learning in information technology detection of hidden target groups
by: Fadeichev, Serhii, et al.
Published: (2025) -
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025) -
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016) -
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)