scholarly journals Text documents marking algorithm based on interword distances shifting invariant to format conversion

2021 ◽  
Vol 33 (4) ◽  
pp. 131-146
Author(s):  
Alexander Vasilievich Kozachok ◽  
Sergey Alexandrovich Kopylov ◽  
Pavel Nikolaevich Gorbachev ◽  
Artur Evgenevich Gaynov ◽  
Boris Vladimirovich Kondrat’ev

The article presents an electronic text documents marking algorithm based on the identification information embedding by changing the values of the intervals between words (interwords distance shifting). The algorithm development is aimed at increasing the documents containing text information security from leakage through the channel due to the transfer of documents printed on paper, as well as the corresponding electronic copies of paper documents. In the marking algorithm developing process, an existing tools analysis of protecting paper documents from leakage was carried out, practical solutions in the field of protecting text documents were considered, their advantages and disadvantages were determined. The interwods distance shifting algorithm acts as an approach to the information embedding in electronic documents. Changing the values of interwords distance is based on embedding the normalized space in the selected areas of text lines and adjusting the remaining values of the spacing between words by the calculated values. To invariance ensure of the embedded marker for printing and subsequent scanning or photographing, formation algorithms of embedding regions and embedding matrix have been developed. In the embedding regions forming process from the text lines of the source document, arrays of spaces are formed, consisting of pairs: four and two spaces or two spaces. By means of the embedded information in the formed areas, the places where the normalized space is inserted is determined. In the embedding a marker process, an embedding matrix is formed, containing the values of the word displacement, and it is embedded in the original document in the process of printing. The developed marking algorithm usage makes it possible to introduce a marker into the electronic document text structure that is invariant to the format transformation of an electronic document into a paper one and vice versa. In addition, the developed marking algorithm features and limitations are presented. Directions for further research identified.

Author(s):  
E. A. Blinova ◽  
A. A. Sushchenia

The description of the method and algorithm for embedding a hidden message or a digital watermark into files of Microsoft Word electronic documents in .DOCX format based on two steganographic methods is given. A Microsoft Word electronic document in .DOCX format is used as a steganographic container. One of the methods uses the features of displaying a document by a word processor and the word processor allows the displacement of hidden characters, such as spaces, tabs and paragraphs, in the text relatively to the line of text. The second method uses the feature of the .DOCX format electronic text document that a document is an archive containing Open XML format files and media files, so specialized steganographic methods for XML files can be used for embedding a hidden message. In this case the quotes replacement method is used. The embedding of a hidden message by one of the methods is used for checking the integrity of the other message through the second method. Depending on the capacity of the steganographic container a method can be chosen to embed the message anda method to control the integrity of the message. The algorithm of the inverse steganographic transformation for extracting a message and confirming the integrity of an electronic document is considered. The application is developed to perform the embedding of a hidden message in an electronic text document depending on the capacity of the container. The possibility of using of some steganographic methods is analyzed with the aim of forming a multi-key steganographic system intended for a digital watermarking of an electronic document Microsoft Word format .DOCX.


Author(s):  
O.I. Afonyushkina

Now electronic documents are more used in various fields and spheres of human activity. Electronic circulation of documents increases the possibilities to use electronic documents raising the functioning efficiency of any organization. But nevertheless it is necessary to consider special properties of the electronic document at all stages of its life cycle. From here follows, that at introduction of electronic circulation of document, technological, standard-legal and organizational problems demanding corresponding solution are possible.


Author(s):  
D. Zaharov ◽  
YEkatyerina Kashtanova

This article discusses the features of ensuring electronic storage of personnel documents in an organization. Basic terms have been defined, such as an automated system for maintaining an archive of electronic document management, access rights, and electronic business. The procedure for recording an electronic personnel document per storage unit has been laid out. The types of documents that can be stored in electronic form are indicated. The procedure for storing an electronic personnel document is considered in detail. The process of ensuring information security of personnel documentation, as well as the procedure for submitting electronic documents at the request of authorized organizations or the application of employees, is considered. The procedure for access of officials to electronic personnel documents is considered separately.


2019 ◽  
Vol 18 (6) ◽  
pp. 1269-1300
Author(s):  
Yuri Yazov ◽  
Oleg Avsentev ◽  
Alexander Avsentev ◽  
Irina Rubtsova

Traditional approaches to assessing the effectiveness of information security, based on a comparison of the possibilities of realizing threats to information security in absence and application of protection measures, do not allow to analyze the dynamics of suppression by security measures of the process of implementing threats. The paper proposes a new indicator of the effectiveness of protection of electronic documents, aimed at assessing the possibility of advancing security measures of the process of implementing threats in electronic document management systems using the probability-time characteristics of the dynamics of the application of protection measures and the implementation of threats to electronic documents. Mathematical models were developed using the Petri-Markov network apparatus and analytical relationships were obtained for calculating the proposed indicator using the example of the "traffic tunneling" threat (placing intruder packets in trusted user packets) and unauthorized access (network attacks) to electronic documents, as well as the threat of intrusion of malicious program by carrying out an "blind IP spoofing" attack (network address spoofing). Examples of calculating the proposed indicator and graphs of its dependence on the probability of detecting network attacks by the intrusion detection system and on the probability of malware detection by the anti-virus protection system are given. Quantitative dependencies are obtained for the effectiveness of protection of electronic documents due to being ahead of protection measures for threat realization processes, both on the probability of detecting an intrusion or the probability of detecting a malicious program, and on the ratio of the time spent by the protection system on detecting an attempt to implement a threat and taking measures to curb its implementation, and threat implementation time. Models allow not only to evaluate the effectiveness of measures to protect electronic documents from threats of destruction, copying, unauthorized changes, etc., but also to quantify the requirements for the response time of adaptive security systems to detectable actions aimed at violating the security of electronic documents, depending on the probability -temporal characteristics of threat realization processes, to identify weaknesses in protection systems related to the dynamics of threat realization and the reaction of defense systems to such threats electronic document.


Author(s):  
Tetyana Bozhko

The relevance of this publication is linked to the constant expansion of the range of packing products offered to the consumer market and the need to ensure the communicative function of packaging that embodies the dual requirements, one of which is the need for assimilation products to existing trade row, and the other - the selection of merchandise goods number by packing. The goal is to highlight all aspects of the problem associated with the communicative function of packaging products and outline the ways to solve them. Research Methodology: a tested method of complex analysis is introduced. It establishes the presence of domestic communicative aspects relevant to each of the above requirements and ways to implement them through the provision of a number of design techniques that can be guided by the designer in the implementation of project tasks. The scientific novelty is to identify all aspects of the communication requirements for packaging products and to establish conformity between each aspect and design methods that ensures their implementation. The advantages and disadvantages of each of the methods are considered in detail, namely: demonstration of images of the idealized consumer (advertising character) or the image of the idealized commodity producer; demonstration of hyperbolized consumer goods characteristics; accentuation of awards and signs of ecological safety; the dominance of typographic design and advertising block units over figurative elements; introduction of innovative and original shaping in packing designs. The importance of formulation of assortment of packaging products is separately highlighted, which represents a specific visual text - information that allows to trace the functional purpose of packaging and the presence of common and distinctive features. The studies have found that methods of demonstration images of idealized consumer (advertising character) or an idealized image producers meet the communication requirements such as: instant identification of goods, providing clear and unambiguous information about its content; the requirements for attracting attention through the visual images embodied in the packaging; creation of attractive communicative images from consciously active to accented-neutral. However, advertising characters are more likely to personally consciously active images. At the same time not all consumers are convinced of the perception of such an active position. The consideration of the mentality of such consumers makes it possible to resort to demonstration of images of the final product with hyperbolized consumer qualities. The use of such reception is the most common way of presenting food products under the conditions present in Slavic commodity markets and sometimes leads to the effect of over-supply of properties of such goods in an idealized form that loses communication product in real disposable bag. Obviously, the observation of differences between desired and available product features can lead only to a single act of purchase, and not contribute to the establishing the long-term relationships that can work for the nprestige and multiple acquisition of a proposed brand. Further, correlating techniques of sense formation with the communicative aspects of packaging products, the matching between the methods of emphasis of awards and signs of environmental safety requirements of trusted sources of information were found, that leads to the creation of the impression of reliability. Specific kind of project reception focused on building confidence in the source of information, creation of a correlation to such a source of impression of reliability is the introduction of TM with loud names such as "Our product", "Without GMOs". Names such as awards and environmental safety receive dominant positions in the system of information and communication elements of packaging products and focus on consumers' attention. The next communicative aspect of packaging products is the requirement to "tune" consumers into prolonged communication, to promote interest and willingness to acquire goods. Typically, the implementation of such a requirement is carried out through the introduction of font elements and their clear structuring with the help of a system of decorative planes, so-called "dies". Font alphabets, unlike realistic or photographic images, can most accurately tell about the properties of a product in each of the packaging volumes, explaining to the consumer what to expect from the product. The next project design, which also ensures the implementation of the above requirement, is the original formulation that is executed on the basis of standardized structural elements provided that there is a clear interaction between the constructive and graphic solutions of the packaging products. Consequently, the more noticeable the allocation of packaging in the cell to the same of a similar kind is, the better the process of forming factor is worked out. Of course, informational and communicative elements do not lose their significance in this case, but their design must be logically subordinated to the constructive properties of the form of detection. Conclusions: Tasks for the design of packaging products include the professional use of professional techniques of graphic design that make it possible to implement dualistic-oriented requirements. A specific feature of the use of such techniques is the refusal to follow the compositional schemes and plastic-shaped characteristics of the communicative elements of the already sold packaging products. Instead, resistance rests on the content fulfillment of each of the techniques which allows to implement an individualized approach to each of the projected packaging. The study shows the influence and significance of each of the communicative aspects that are considered in detail through a comprehensive analysis


Author(s):  
Laith Mohammad Abualigah ◽  
Essam Said Hanandeh ◽  
Ahamad Tajudin Khader ◽  
Mohammed Abdallh Otair ◽  
Shishir Kumar Shandilya

Background: Considering the increasing volume of text document information on Internet pages, dealing with such a tremendous amount of knowledge becomes totally complex due to its large size. Text clustering is a common optimization problem used to manage a large amount of text information into a subset of comparable and coherent clusters. Aims: This paper presents a novel local clustering technique, namely, β-hill climbing, to solve the problem of the text document clustering through modeling the β-hill climbing technique for partitioning the similar documents into the same cluster. Methods: The β parameter is the primary innovation in β-hill climbing technique. It has been introduced in order to perform a balance between local and global search. Local search methods are successfully applied to solve the problem of the text document clustering such as; k-medoid and kmean techniques. Results: Experiments were conducted on eight benchmark standard text datasets with different characteristics taken from the Laboratory of Computational Intelligence (LABIC). The results proved that the proposed β-hill climbing achieved better results in comparison with the original hill climbing technique in solving the text clustering problem. Conclusion: The performance of the text clustering is useful by adding the β operator to the hill climbing.


Author(s):  
K. G. Yashchenkov ◽  
K. S. Dymko ◽  
N. O. Ukhanov ◽  
A. V. Khnykin

The issues of using data analysis methods to find and correct errors in the reports issued by meteorologists are considered. The features of processing various types of meteorological messages are studied. The advantages and disadvantages of existing methods of classification of text information are considered. The classification methods are compared in order to identify the optimal method that will be used in the developed algorithm for analyzing meteorological messages. The prospects of using each of the methods in the developed algorithm are described. An algorithm for processing the source data is proposed, which consists in using syntactic and logical analysis to preclean the data from various kinds of noise and determine format errors for each type of message. After preliminary preparation the classification method correlates the received set of message characteristics with the previously trained model to determine the error of the current weather report and output the corresponding message to the operator in real time. The software tools used in the algorithm development and implementation processes are described. A complete description of the process of processing a meteorological message is presented from the moment when the message is entered in a text editor until the message is sent to the international weather message exchange service. The developed software is demonstrated, in which the proposed algorithm is implemented, which allows to improve the quality of messages and, as a result, the quality of meteorological forecasts. The results of the implementation of the new algorithm are described by comparing the number of messages containing various types of errors before the implementation of the algorithm and after the implementation.


Author(s):  
M A Mikheev ◽  
P Y Yakimov

The article is devoted to solving the problem of document versions comparison in electronic document management systems. Systems-analogues were considered, the process of comparing text documents was studied. In order to recognize the text on the scanned image, the technology of optical character recognition and its implementation — Tesseract library were chosen. The Myers algorithm is applied to compare received texts. The software implementation of the text document comparison module was implemented using the solutions described above.


2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.


Author(s):  
І. Андрущак ◽  
В. Марценюк ◽  
I. Андрощук ◽  
В. Чудовець ◽  
М. Потейчук

The article discusses the current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. The standards, regulations and guidance documents in the field of cloud computing information security are developed and analyzed, developed by the Cloud Security Alliance (CSA), the European Network and Information Security Agency (ENISA) and the National Institute of Standards and Technology (NIST), and the results of a detailed analysis of the issues information security in the cloud.


Sign in / Sign up

Export Citation Format

Share Document