The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. This has necessitated to solve the following information security tasks in relation to multimedia data: protection against leakage of confidential information, as well as identifying the source of the leak; ensuring the impossibility of unauthorized changes; copyright protection for digital objects. To solve such kind of problems, methods of steganography and watermarking are designed that implement embedding in digital objects hidden information sequences for various purposes. In this paper, an overview of promising research in the specified area is provided. First of all, we provide basic information about this field of research and consider the main applications of its methods. Next, we review works demonstrating current trends in the development of methods and algorithms for data hiding in digital images. This review is not exhaustive; it focuses on contemporary works illustrating current research directions in the field of information embedding in digital images. This is the main feature of review, which distinguishes it from previously published reviews. The paper concludes with an analysis of identified problems in the field of digital steganography and digital watermarking.
Cyber-physical systems and the Internet of things (IoT) are becoming an integral part of the digital society. The use of IoT services improves human life in many ways. Protection against cyber threats is an utmost important prospect of IoT devices operation. Malicious activities lead to confidential data leakage and incorrect performance of devices becomes critical. Therefore, development of effective solutions that can protect both IoT devices data and data exchange networks turns in to a real challenge. This study provides a critical analysis of the feasibility of using blockchain technology to protect constrained IoT devices data, justifies the choice of Practical Byzantine Fault Tolerance (PBFT) consensus algorithm for implementation on such devices, and simulates the main distributed ledger scenarios using PBFT. In this paper we investigate typical IoT network scenarios that can disrupt system performance. To ensure the adequacy of the models under study, we have analyzed the characteristics of real constrained IoT devices in terms of computing power and data rate. The simulation results demonstrate efficiency of the blockchain technology for constrained devices and make it possible to evaluate applicability limits of the chosen consensus algorithm.
Prompt development of information technology has made an essential impact on many industries. There appeared a concept “Industry 4.0” symbolizing the fourth industrial revolution. The given concept is closely connected with such promising technologies as the Internet of Things, blockchain, fog computing, Big Data. In the present research, the sphere of the mining industry is examined. We discuss the possibility to increase the efficiency of mining enterprises at the expense of the development of common information space based on modern digital technologies. We analyze security problems at the level of data flow between the participants of the production process on a mining enterprise. We define the problem of providing the reliability of data on the production course on mining enterprise in the conditions of the possible connection loss between the control center and separate technological units. We offer a new approach to the solution of the given problems, based on the technology of blockchain and digital watermarking. The computing experiment is conducted presenting a possibility to implement the offered approaches on common models of microcontrollers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.