STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Journal Title: Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska - Year 2018, Vol 8, Issue 4
Abstract
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.<br/><br/>
Authors and Affiliations
Anna Romanova, Sergiy Toliupa
APPLIED QUASIPOTENTIAL METHOD FOR SOLVING THE COEFFICIENT PROBLEMS OF PARAMETER IDENTIFICATION OF ANISOTROPIC MEDIA
A numerical method of quasiconformal mappings for solving the coefficient problems of finding eigenvalues of the conductivity tensor having information about its directions in an anisotropic medium using applied quasipot...
INTERACTIVE, MULTIFUNCTIONAL MIRROR – PART OF A SMART HOME
This paper presents a possible implementation of a personal assistant and control interface for a smart home. A prototype is presented, featuring functions such as appliance and light control, a map system based on...
CALCULATION OF THE IMPROPER INTEGRALS FOR FOURIER BOUNDARY ELEMENT METHOD
The traditional Boundary Element Method (BEM) is a collection of numerical techniques for solving some partial differential equations. The classical BEM produces a fully populated coefficients matrix. With Galerkin Bound...
MODEL DYNAMICZNEGO STEROWANIA WINDĄ Z WYKORZYSTANIEM SERWERA CENTRALNEGO
Proces zarządzania wezwaniami i dyspozycjami w większości z dostępnych wind realizują lokalne urządzenia mikroprocesorowe. Rozwiązanie to posiada znaczne ograniczenia. Wśród nich można wymienić niską moc obliczeniową pro...
TOUCHSCREEN TFT HUMAN MACHINE INTERFACE FOR USE IN GROW LIGHT SYSTEM
TFT Human Machine Interface with touchscreen is presented. It is designed to work in plant grow light system. It allows forming the light emission in time, space and spectrum. It can replay different prepared programs fo...