STEGANOGRAPHY – THEORY AND PRACTICE
Journal Title: Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska - Year 2019, Vol 9, Issue 1
Abstract
Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems.<br/><br/>
Authors and Affiliations
Vladimir Barannik, Bogdan Gorodetsky, Natalia Barannik
COMPUTER MODELLING OF AUTOMATIC CONTROL PROCESS OF DISTILLATION COLUMN
Here the process of distillation in the production of ethanol is considered. Developed a mathematical model of determination and regulation of ratio of distillation column and its impact on concentration and quantit...
AN APPLICATION OF IRIDM IN THE DECISION MAKING PROCESS ON FUEL CONVERSION OF THE MARIA REACTOR
Poland, when acceded to GTRI (Global Threat Reduction Initiative) in 2004, has committed to convert the nuclear fuel of the Research Reactor MARIA, operated by the National Centre for Nuclear Research (NCBJ) in Świerk. T...
ODDZIAŁYWANIE POLA MAGNETYCZNEGO NA PŁYNĄCĄ CIECZ O WYBRANYCH WŁAŚCIWOŚCIACH MAGNETYCZNYCH
W artykule przedstawiono wyniki badań oddziaływania pola magnetycznego na płynącą ciecz o właściwościach paramagnetycznych. W obszarze działania stałego w czasie pola magnetycznego indukują się w płynącej cieczy prądy wi...
BUDOWA SYSTEMÓW WYKRYWANIA ATAKÓW NA PODSTAWIE METOD INTELIGENTNEJ ANALIZY DANYCH
W chwili obecnej szybki rozwój technologii sieciowych i globalnej informatyzacji społeczeństwa uwypukla problemy związane z zapewnieniem wysokiego poziomu bezpieczeństwa systemów informacyjnych. Wraz ze wzrostem liczby i...
SYSTEM OF KNOWLEDGE EXTRACTION FROM ONTOLOGY OF ELECTRONIC EDUCATIONAL RESOURCE
This article describes the system having the main function of extraction of knowledge from the document corresponding to the knowledge stored in ontology of electronic educational resource.