2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) 2019
DOI: 10.1109/atit49449.2019.9030473
|View full text |Cite
|
Sign up to set email alerts
|

Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The specific structure of all audio recording systems implies the presence of interference created by the system itself and environmental sounds during recording. In this case, it is possible to evaluate the system performance using the signal-to-noise ratio (SNR) [13,14,25].…”
Section: Discussion Of the Results Of The Introduction Of Methods For Identifying The Audio Characteristics Of The Voiced Uav Operator Simentioning
confidence: 99%
See 2 more Smart Citations
“…The specific structure of all audio recording systems implies the presence of interference created by the system itself and environmental sounds during recording. In this case, it is possible to evaluate the system performance using the signal-to-noise ratio (SNR) [13,14,25].…”
Section: Discussion Of the Results Of The Introduction Of Methods For Identifying The Audio Characteristics Of The Voiced Uav Operator Simentioning
confidence: 99%
“…An effective spectrum width method has been developed on the basis of multi-alternative decision-making rules by processing the input signal spectrum Ssp l,i of a fixed range and all reference spectral Ssp k,i models from an existing database of objects of various classes according to a specific attribute space. This method is designed to identify a voiced command set of the operator of an unmanned aerial vehicle with biometric characteristics under conditions of a high level of interference [6,8,13].…”
Section: Development Of a Methods Of Effective Spectrum Width Of Voiced Operator Signalmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the QR-code's image binary format is well combined with the formats, which are used in LSB-steganography for the conspiracy of message transmission. This is clearly shown in [20,21]. The authors propose a new method for protecting text data.…”
Section: Work Related Analysismentioning
confidence: 93%
“…The program's function for generating QR-codes is activated when it is necessary to preserve the confidentiality of information obtained during recognition. The images with QR-codes are used as embedded images in a cover image due to what the information transmitted via communication channel obtains protection, for instance, through the LSB-steganography technique [13,14]. This method of encrypting messages and, simulta- neously, ensuring the data transfer secrecy seems to be very promising and in demand in various applications.…”
Section: Factors Of Negative Effectsmentioning
confidence: 99%